Make some noise. unleashing the power of convolutional neural networks for profiled side-channel analysis

J Kim, S Picek, A Heuser, S Bhasin… - IACR Transactions on …, 2019 - tches.iacr.org
Profiled side-channel analysis based on deep learning, and more precisely Convolutional
Neural Networks, is a paradigm showing significant potential. The results, although scarce …

The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations

S Picek, A Heuser, A Jovic, S Bhasin… - IACR Transactions on …, 2019 - tches.iacr.org
We concentrate on machine learning techniques used for profiled sidechannel analysis in
the presence of imbalanced data. Such scenarios are realistic and often occurring, for …

Improving attacks on round-reduced speck32/64 using deep learning

A Gohr - Advances in Cryptology–CRYPTO 2019: 39th Annual …, 2019 - Springer
This paper has four main contributions. First, we calculate the predicted difference
distribution of Speck32/64 with one specific input difference under the Markov assumption …

One trace is all it takes: Machine learning-based side-channel attack on eddsa

L Weissbart, S Picek, L Batina - … 2019, Gandhinagar, India, December 3–7 …, 2019 - Springer
Profiling attacks, especially those based on machine learning proved as very successful
techniques in recent years when considering side-channel analysis of block ciphers …

Gradient visualization for general characterization in profiling attacks

L Masure, C Dumas, E Prouff - … Side-Channel Analysis and Secure Design …, 2019 - Springer
Abstract In Side-Channel Analysis (SCA), several papers have shown that neural networks
could be trained to efficiently extract sensitive information from implementations running on …

Improving CEMA using correlation optimization

P Robyns, P Quax, W Lamotte - IACR Transactions on Cryptographic …, 2019 - tches.iacr.org
Sensitive cryptographic information, eg AES secret keys, can be extracted from the
electromagnetic (EM) leakages unintentionally emitted by a device using techniques such …

A systematic evaluation of profiling through focused feature selection

S Picek, A Heuser, A Jovic… - IEEE Transactions on Very …, 2019 - ieeexplore.ieee.org
Profiled side-channel attacks consist of several steps one needs to take. An important, but
sometimes ignored, step is a selection of the points of interest (features) within side-channel …

Convolutional neural network based side-channel attacks in time-frequency representations

G Yang, H Li, J Ming, Y Zhou - … 2018, Montpellier, France, November 12–14 …, 2019 - Springer
Profiled attacks play a fundamental role in the evaluation of cryptographic implementation
worst-case security. For the past sixteen years, great efforts have been paid to develop …

Side-channel analysis of AES based on deep learning

H Wang - 2019 - diva-portal.org
Side-channel attacks avoid complex analysis of cryptographic algorithms, instead they use
side-channel signals captured from a software or a hardware implementation of the …

On the performance of multilayer perceptron in profiling side-channel analysis

L Weissbart - Cryptology ePrint Archive, 2019 - eprint.iacr.org
In profiling side-channel analysis, machine learning-based analysis nowadays offers the
most powerful performance. This holds especially for techniques stemming from the neural …