Estranet: An efficient shift-invariant transformer network for side-channel analysis
S Hajra, S Chowdhury… - IACR Transactions on …, 2024 - tches.iacr.org
Abstract Deep Learning (DL) based Side-Channel Analysis (SCA) has been extremely
popular recently. DL-based SCA can easily break implementations protected by masking …
popular recently. DL-based SCA can easily break implementations protected by masking …
A new perspective exploration of machine learning algorithms for defending Side-Channel attacks
VT Ramakrishnan, M Seethapathy, R Sundar… - Multimedia Tools and …, 2024 - Springer
Abstract Machine learning algorithms are used in various real-time applications, where
security is one of the major problems. Security is applied in various aspects of the …
security is one of the major problems. Security is applied in various aspects of the …
A Side-Channel Attack on a Higher-Order Masked CRYSTALS-Kyber Implementation
In response to side-channel attacks on masked implementations of post-quantum
cryptographic algorithms, a new bitsliced higher-order masked implementation of …
cryptographic algorithms, a new bitsliced higher-order masked implementation of …
Deep Learning-Based Power Analysis Attack for Extracting AES Keys on ATmega328P Microcontroller
I Negabi, S Ait El Asri, S El Adib… - Arabian Journal for …, 2024 - Springer
In recent years, several deep learning (DL) approaches, such as convolutional neural
networks (CNN) and recurrent neural networks (RNN), have been utilized to carry out side …
networks (CNN) and recurrent neural networks (RNN), have been utilized to carry out side …
Mixture Differential Cryptanalysis on Round-Reduced SIMON32/64 Using Machine Learning
With the development of artificial intelligence (AI), deep learning is widely used in various
industries. At CRYPTO 2019, researchers used deep learning to analyze the block cipher for …
industries. At CRYPTO 2019, researchers used deep learning to analyze the block cipher for …
Everything All at Once: Deep Learning Side-Channel Analysis Optimization Framework
G Serafini, L Weissbart, L Batina - International Conference on Applied …, 2024 - Springer
Deep learning is becoming an increasingly proficient tool for side-channel analysis. While
deep learning has been evolving around the tasks of image and speech recognition for …
deep learning has been evolving around the tasks of image and speech recognition for …
Profiled Side Channel Power Attack on Charge Balancing Symmetric Pre‐Resolve Adiabatic Logic PRESENT S‐Box Using Convolutional Neural Networks
AJ Banu, A Prathiba, S Shyam Krishna… - Smart Grids as …, 2024 - Wiley Online Library
Cipher implementations offering security to smart grid infrastructure are vulnerable to the
side channel attacks; the most popular being is the power analysis attack. Circuit level …
side channel attacks; the most popular being is the power analysis attack. Circuit level …
[HTML][HTML] Amplitude-modulated EM side-channel attack on provably secure masked AES
H Wang - Journal of Cryptographic Engineering, 2024 - Springer
Recently a new type of side channels was discovered, called amplitude-modulated
electromagnetic (EM) emanations from mixed-signal circuits. Unlike power analysis or near …
electromagnetic (EM) emanations from mixed-signal circuits. Unlike power analysis or near …