共 40 条
- [1] Brier Eric, Clavier Christophe, Olivier Francis, Correlation Power Analysis with a Leakage Model, CHES, volume 3156 of LNCS, pp. 16-29, (2004)
- [2] Bishop Chris M, Training with noise is equivalent to tikhonov regularization, Neural computation, 7, 1, pp. 108-116, (1995)
- [3] Breiman Leo, Random Forests, Machine Learning, 45, 1, pp. 5-32, (2001)
- [4] Cagli Eleonora, Dumas Cecile, Prouff Emmanuel, Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures-Profiling Attacks Without Pre-processing, Cryptographic Hardware and Embedded Systems-CHES 2017-19th International Conference, pp. 45-68, (2017)
- [5] Coron Jean-Sebastien, Kizhvatov Ilya, An Efficient Method for Random Delay Generation in Embedded Software, Cryptographic Hardware and Embedded Systems-CHES 2009, 11th International Workshop, pp. 156-170, (2009)
- [6] Choudary Omar, Kuhn Markus G., Efficient template attacks, Smart Card Research and Advanced Applications-12th International Conference, CARDIS 2013, pp. 253-270, (2013)
- [7] Chari Suresh, Rao Josyula R., Rohatgi Pankaj, Template Attacks, CHES, volume 2523 of LNCS, pp. 13-28, (2002)
- [8] Goodfellow Ian, Bengio Yoshua, Courville Aaron, Deep Learning, (2016)
- [9] Gilmore Richard, Hanley Neil, O'Neill Maire, Neural network based attack on a masked implementation of AES, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 106-111, (2015)
- [10] Hospodar Gabriel, Gierlichs Benedikt, De Mulder Elke, Verbauwhede Ingrid, Vandewalle Joos, Machine learning in side-channel analysis: a first study, Journal of Cryptographic Engineering, 1, pp. 293-302, (2011)