SoK: 5 Years of Neural Differential Cryptanalysis
D Gerault, A Hambitzer, M Huppert… - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Abstract At CRYPTO 2019, A. Gohr introduced Neural Differential Cryptanalysis by applying
deep learning to modern block cipher cryptanalysis. Surprisingly, the resulting neural …
deep learning to modern block cipher cryptanalysis. Surprisingly, the resulting neural …
I know what your layers did: Layer-wise explainability of deep learning side-channel analysis
Masked cryptographic implementations can be vulnerable to higher-order attacks. For
instance, deep neural networks have proven effective for second-order profiling side …
instance, deep neural networks have proven effective for second-order profiling side …
OccPoIs: Points of Interest based on Neural Network's Key Recovery in Side-Channel Analysis through Occlusion
Deep neural networks (DNNs) represent a powerful technique for assessing cryptographic
security concerning side-channel analysis (SCA) due to their ability to aggregate leakages …
security concerning side-channel analysis (SCA) due to their ability to aggregate leakages …
TinyPower: Side-Channel Attacks with Tiny Neural Networks
Side-channel attacks leverage correlations between power consumption and intermediate
encryption results to infer encryption keys. Recent studies show that deep learning offers …
encryption results to infer encryption keys. Recent studies show that deep learning offers …
[HTML][HTML] Improved Hybrid Bagging Resampling Framework for Deep Learning-Based Side-Channel Analysis
F Hameed, SM Ramesh, H Alkhzaimi - Computers, 2024 - mdpi.com
As cryptographic implementations leak secret information through side-channel emissions,
the Hamming weight (HW) leakage model is widely used in deep learning profiling side …
the Hamming weight (HW) leakage model is widely used in deep learning profiling side …
A novel framework for explainable leakage assessment
S Gao, E Oswald - Annual International Conference on the Theory and …, 2024 - Springer
Abstract Schemes such as Common Criteria or FIPS 140-3 require the assessment of
cryptographic implementations with respect to side channels at high security levels. Instead …
cryptographic implementations with respect to side channels at high security levels. Instead …
Can KANs Do It? Toward Interpretable Deep Learning-based Side-channel Analysis
Recently, deep learning-based side-channel analysis (DLSCA) has emerged as a serious
threat against cryptographic implementations. These methods can efficiently break …
threat against cryptographic implementations. These methods can efficiently break …
Domain‐Adaptive Power Profiling Analysis Strategy for the Metaverse
X Li, N Yang, W Liu, A Chen, Y Zhang… - … Journal of Network …, 2024 - Wiley Online Library
In the surge of the digital era, the metaverse, as a groundbreaking concept, has become a
focal point in the technology sector. It is reshaping human work and life patterns, carving out …
focal point in the technology sector. It is reshaping human work and life patterns, carving out …
Ablation analysis for multi-device deep learning-based physical side-channel analysis
The use of deep learning-based side-channel analysis is an effective way of performing
profiling attacks on power and electromagnetic leakages, even against targets protected …
profiling attacks on power and electromagnetic leakages, even against targets protected …
CPSGD: A Novel Optimization Algorithm and Its Application in Side-Channel Analysis
Y Zhang, D Zhao, H Li, C Pan - Mathematics, 2024 - search.proquest.com
In recent years, side-channel analysis based on deep learning has garnered significant
attention from researchers. A pivotal reason for this lies in the fact that deep learning-based …
attention from researchers. A pivotal reason for this lies in the fact that deep learning-based …