共 41 条
[1]
Bhasin Shivam, Chattopadhyay Anupam, Heuser Annelie, Jap Dirmanto, Picek Stjepan, Shrivastwa Ritu Ranjan, Mind the portability: A warriors guide through realistic profiled side-channel analysis, IACR Cryptology ePrint Archive, 2019, (2019)
[2]
Brier Eric, Clavier Christophe, Olivier Francis, Correlation power analysis with a leakage model, Cryptographic Hardware and Embedded Systems-CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings, volume 3156 of Lecture Notes in Computer Science, pp. 16-29, (2004)
[3]
Batina Lejla, Gierlichs Benedikt, Lemke-Rust Kerstin, Differential cluster analysis, Cryptographic Hardware and Embedded Systems-CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings, volume 5747 of Lecture Notes in Computer Science, pp. 112-127
[4]
Carbone Mathieu, Conin Vincent, Cornelie Marie-Angela, Das-sance Francois, Dufresne Guillaume, Dumas Cecile, Prouff Emmanuel, Venelli Alexandre, Deep learning to evaluate secure RSA implementations, IACR Trans. Cryptogr. Hardw. Embed. Syst, 2019, 2, pp. 132-161, (2019)
[5]
Cagli Eleonora, Dumas Cecile, Prouff Emmanuel, Convolutional neural networks with data augmentation against jitter-based countermeasures-profiling attacks without pre-processing, Cryptographic Hardware and Embedded Systems-CHES 2017-19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings, volume 10529 of Lecture Notes in Computer Science, pp. 45-68
[6]
Chari Suresh, Rao Josyula R., Rohatgi Pankaj, Template attacks, Cryptographic Hardware and Embedded Systems-CHES 2002, 4th International Workshop, pp. 13-28, (2002)
[7]
Francillon Aurelien, Rohatgi Pankaj, Smart Card Research and Advanced Applications-12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013
[8]
Gierlichs Benedikt, Batina Lejla, Tuyls Pim, Preneel Bart, Mutual information analysis, Cryptographic Hardware and Embedded Systems-CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings, volume 5154 of Lecture Notes in Computer Science, pp. 426-442, (2008)
[9]
Gardner Matt W, Dorling SR, Artificial neural networks (the multilayer perceptron)—a review of applications in the atmospheric sciences, Atmospheric environment, 32, 14-15, pp. 2627-2636, (1998)
[10]
Hettwer Benjamin, Gehrer Stefan, Guneysu Tim, Profiled power analysis attacks using convolutional neural networks with domain knowledge, Selected Areas in Cryptography-SAC 2018-25th International Conference, pp. 479-498, (2018)