Make some noise. unleashing the power of convolutional neural networks for profiled side-channel analysis
Profiled side-channel analysis based on deep learning, and more precisely Convolutional
Neural Networks, is a paradigm showing significant potential. The results, although scarce …
Neural Networks, is a paradigm showing significant potential. The results, although scarce …
The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations
We concentrate on machine learning techniques used for profiled sidechannel analysis in
the presence of imbalanced data. Such scenarios are realistic and often occurring, for …
the presence of imbalanced data. Such scenarios are realistic and often occurring, for …
Improving attacks on round-reduced speck32/64 using deep learning
A Gohr - Advances in Cryptology–CRYPTO 2019: 39th Annual …, 2019 - Springer
This paper has four main contributions. First, we calculate the predicted difference
distribution of Speck32/64 with one specific input difference under the Markov assumption …
distribution of Speck32/64 with one specific input difference under the Markov assumption …
One trace is all it takes: Machine learning-based side-channel attack on eddsa
Profiling attacks, especially those based on machine learning proved as very successful
techniques in recent years when considering side-channel analysis of block ciphers …
techniques in recent years when considering side-channel analysis of block ciphers …
Gradient visualization for general characterization in profiling attacks
Abstract In Side-Channel Analysis (SCA), several papers have shown that neural networks
could be trained to efficiently extract sensitive information from implementations running on …
could be trained to efficiently extract sensitive information from implementations running on …
Improving CEMA using correlation optimization
Sensitive cryptographic information, eg AES secret keys, can be extracted from the
electromagnetic (EM) leakages unintentionally emitted by a device using techniques such …
electromagnetic (EM) leakages unintentionally emitted by a device using techniques such …
A systematic evaluation of profiling through focused feature selection
Profiled side-channel attacks consist of several steps one needs to take. An important, but
sometimes ignored, step is a selection of the points of interest (features) within side-channel …
sometimes ignored, step is a selection of the points of interest (features) within side-channel …
Convolutional neural network based side-channel attacks in time-frequency representations
G Yang, H Li, J Ming, Y Zhou - … 2018, Montpellier, France, November 12–14 …, 2019 - Springer
Profiled attacks play a fundamental role in the evaluation of cryptographic implementation
worst-case security. For the past sixteen years, great efforts have been paid to develop …
worst-case security. For the past sixteen years, great efforts have been paid to develop …
Side-channel analysis of AES based on deep learning
H Wang - 2019 - diva-portal.org
Side-channel attacks avoid complex analysis of cryptographic algorithms, instead they use
side-channel signals captured from a software or a hardware implementation of the …
side-channel signals captured from a software or a hardware implementation of the …
On the performance of multilayer perceptron in profiling side-channel analysis
L Weissbart - Cryptology ePrint Archive, 2019 - eprint.iacr.org
In profiling side-channel analysis, machine learning-based analysis nowadays offers the
most powerful performance. This holds especially for techniques stemming from the neural …
most powerful performance. This holds especially for techniques stemming from the neural …