共 94 条
[11]
Bronchain Olivier, Hendrickx Julien M, Massart Clement, Olshevsky Alex, Standaert Francois-Xavier, Leakage certification revisited: Bounding model errors in side-channel security evaluations, Annual Intrl. Cryptol. Conf, pp. 713-737, (2019)
[12]
Bhasin Shivam, Jap Dirmanto, Picek Stjepan, AES HD dataset-500 000 traces, AISyLab repository, (2020)
[13]
Benadjila Ryad, Prouff Emmanuel, Strullu Remi, Cagli Eleonora, Dumas Cecile, ASCADv1 Dataset: the atmega8515 sca campaigns, (2017)
[14]
Benadjila Ryad, Prouff Emmanuel, Strullu Remi, Cagli Eleonora, Dumas Cecile, Study of deep learning techniques for side-channel analysis and introduction to ascad database, (2018)
[15]
Baldominos Alejandro, Saez Yago, Isasi Pedro, On the automated, evolutionary design of neural networks: past, present, and future, Neural computing and applications, 32, 2, pp. 519-545, (2020)
[16]
Caamano Pilar, Bellas Francisco, Duro Richard J, τ-neat: Initial experiments in precise temporal processing through neuroevolution, Neuro-computing, 150, pp. 43-49, (2015)
[17]
Cagli Eleonora, Dumas Cecile, Prouff Emmanuel, Convolutional neural networks with data augmentation against jitter-based countermeasures, Intrl. Conf. on Cryptographic Hardware and Embedded Systems, pp. 45-68, (2017)
[18]
Cheng John Runwei, Gen Mitsuo, Accelerating genetic algorithms with gpu computing: A selective overview, Computers & Industrial Engineering, 128, pp. 514-525, (2019)
[19]
Cover Thomas M, Elements of information theory, (1999)
[20]
Chari Suresh, Rao Josyula R, Rohatgi Pankaj, Template attacks, Intrl. Workshop on Cryptographic Hardware and Embedded Systems, pp. 13-28, (2002)