Ni et al., 2022 - Google Patents
Side channel analysis based on feature fusion networkNi et al., 2022
View HTML- Document ID
- 5246765055201240604
- Author
- Ni F
- Wang J
- Tang J
- Yu W
- Xu R
- Publication year
- Publication venue
- Plos one
External Links
Snippet
Various physical information can be leaked while the encryption algorithm is running in the device. Side-channel analysis exploits these leakages to recover keys. Due to the sensitivity of deep learning to the data features, the efficiency and accuracy of side channel analysis …
- 238000004458 analytical method 0 title abstract description 30
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Torres et al. | Active learning approach to label network traffic datasets | |
| Panoff et al. | A review and comparison of AI-enhanced side channel analysis | |
| Lee et al. | Lightweight block cipher security evaluation based on machine learning classifiers and active S-boxes | |
| Zhu et al. | Data forensics in diffusion models: A systematic analysis of membership privacy | |
| Ahmed et al. | Review on hybrid deep learning models for enhancing encryption techniques against side channel attacks | |
| Wu et al. | p2detect: Electricity theft detection with privacy preservation for both data and model in smart grid | |
| Karayalçın et al. | It’sa kind of magic: a novel conditional GAN framework for efficient profiling side-channel analysis | |
| Ahmed et al. | Design of lightweight cryptography based deep learning model for side channel attacks | |
| Hu et al. | Cross subkey side channel analysis based on small samples | |
| Huang et al. | Deep learning-based improved side-channel attacks using data denoising and feature fusion | |
| Xiao et al. | Less traces are all it takes: Efficient side-channel analysis on AES | |
| Ni et al. | Side channel analysis based on feature fusion network | |
| Paguada et al. | Controlling the deep learning-based side-channel analysis: A way to leverage from heuristics | |
| Schamberger et al. | Hide and Seek: Using Occlusion Techniques for Side-Channel Leakage Attribution in CNNs: An Evaluation of the ASCAD Databases | |
| Li et al. | Side-channel analysis based on Siamese neural network | |
| Tao et al. | A sector fast encryption algorithm for color images based on one-dimensional composite sinusoidal chaos map | |
| Xiangliang et al. | Non‐profiled deep‐learning‐based power analysis of the SM4 and DES algorithms | |
| WO2021255019A1 (en) | Side channel leakage source identification in an electronic circuit design | |
| Deng et al. | Tripm: a multi-label deep learning SCA model for multi-byte attacks | |
| Ebrahimi et al. | Deep Learning-Based Rotational-XOR Distinguishers for AND-RX Block Ciphers: Evaluations on Simeck and Simon | |
| Kuruvila et al. | Hardware performance counters: Ready-made vs tailor-made | |
| Feng et al. | Side-channel attacks on convolutional neural networks based on the hybrid attention mechanism | |
| Li et al. | Causal Learning for Trustworthy Recommender Systems: A Survey | |
| Hu et al. | Cross-Subkey Deep-Learning Side-Channel Analysis. | |
| Rastogi et al. | Deep learning techniques for side-channel analysis on AES datasets collected from hardware and software platforms |