共 94 条
[51]
Martinasek Zdenek, Hajny Jan, Malina Lukas, Optimization of power analysis using neural network, Intrl. Conf. on Smart Card Research and Advanced Applications, pp. 94-107, (2013)
[52]
Maghrebi Houssem, Portigliatti Thibault, Prouff Emmanuel, Breaking cryptographic implementations using deep learning techniques, Intrl. Conf. on Security, Privacy, and Applied Cryptography Engineering, pp. 3-26, (2016)
[53]
Morse Gregory, Stanley Kenneth O, Simple evolutionary optimization can rival stochastic gradient descent in neural networks, Proceedings of the Genetic and Evolutionary Computation Conf, 2016, pp. 477-484, (2016)
[54]
Masure Loic, Strullu Remi, Side channel analysis against the anssi’s protected aes implementation on arm, Cryptology ePrint Archive, (2021)
[55]
Murphy Kevin P, Machine Learning: A Probabilistic Perspective, (2012)
[56]
Threshold cryptography project, (2020)
[57]
Omelianenko Iaroslav, Hands-On Neuroevolution with Python: Build high-performing artificial neural network architectures using neuroevolution-based algorithms, (2019)
[58]
Perin Guilherme, Buhan Ileana, Picek Stjepan, Learning when to stop: a mutual information approach to fight overfitting in profiled side-channel analysis, IACR Cryptol. ePrint Arch, 2020, (2020)
[59]
Perin Guilherme, Chmielewski Lukasz, Picek Stjepan, Strength in numbers: Improving generalization with ensembles in machine learning-based profiled side-channel analysis, IACR Trans. on Cryptographic Hardware and Embedded Systems, pp. 337-364, (2020)
[60]
Picek Stjepan, Heuser Annelie, Jovic Alan, Bhasin Shivam, Regazzoni Francesco, The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations, IACR Trans. on Cryptographic Hardware and Embedded Systems, 2019, 1, pp. 1-29, (2019)