최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會論文誌 = Journal of the Korea Institute of Information Security and Cryptology, v.30 no.6, 2020년, pp.1271 - 1278
김주환 (국민대학교 수학과) , 우지은 (국민대학교 정보보안암호수학과) , 박소연 (국민대학교 정보보안암호수학과) , 김수진 (국민대학교 정보보안암호수학과) , 한동국 (국민대학교 금융정보보안학과)
Deep learning-based profiling side-channel analysis is a powerful analysis method that utilizes the neural network to profile the relationship between the side-channel information and the intermediate value. Since the neural network interprets each point of the signal in a different dimension, jitte...
S. Chari, J. R. Rao, and P. Rohatgi, "Template attacks," Cryptographic Hardware and Embedded Systems, CHES 2002, LNCS 2523, pp. 13-28, Aug. 2002.
W. Shindler, K. Lemke, and C. Paar, "A stochastic model for differential side channel cryptanalysis," Cryptographic Hardware and Embedded Systems, CHES 2005, LNCS 3659, pp. 30-46, Aug. 2005.
G. Hospodar, B. Gierlichs, E. D. Mulder, I. Verbaushede, and J. Vandewalle, "Machine learning in side-channel analysis: a first study," Journal of Cryptographic Engineering, pp. 293-302, Oct. 2011.
L. Lerman, R. Poussier, G. Bontempi, O. Markowitch, and F. X. Standaert, "Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis," Journal of Cryptographic Engineering, pp. 301-313, Apr. 2017.
L. Lerman, G. Bontempi, and O. Markowitch, "A machine learning approach against a masked AES," Journal of Cryptographic Engineering, pp. 123-139, Jun. 2015.
K. Hornik, M. Stinchcombe, and H. White, "Multilayer feedforward networks are universal approximators," Neural Networks, pp. 359-366, Mar. 1989.
F. Rosenblatt, Principles of neurodynamics: perceptrons and the theory of brain mechanisms, Spartan books, Mar. 1961.
Y. Lecun, L. Bottou, Y. Bengio and P. Haffner, "Gradient-based learning applied to document recognition," in Proceedings of the IEEE, vol. 86, no. 11, pp. 2278-2324, Nov. 1998.
L. Wouters, V. Arribas, B. Gierlichs, and Bart Preneel, "Revisiting a methodology for efficient CNN architectures in profiling attacks," Transactions on Cryptographic Hardware and Embedded Systems, TCHES, pp. 147-168, Jun. 2020.
J. Kim, S. Kim, J. Woo, S. Park, and D. Han, "Deep learning-based side-channel analysis method with resistance to jitter," Korea Information Processing Society Conference, pp. 180-183, May. 2020.
M. Lin, Q. Chen, and S. Yan, "Network In Network," 2nd International Conference on Learning Representations, ICLR, Jul. 2014.
F. Standaert, T. Malkin, and M. Yung, "A unified framework for the analysis of side-channel key recovery attacks," Advanced in Cryptology, EUROCRYPT'09, LNCS 5479, pp. 443-461, Apr. 2009.
M. Dworkin, E. Barker, J. Nechvatal, J. Foti, L. Bassham, E. Roback, and J. Dray Jr., "Advanced Encryption Standard (AES)," NIST FIPS 197, Nov. 2001.
D. Kingma and J. Ba, "Adam: a method for stochastic optimization," 3rd International Conference on Learning Representations (ICLR), May. 2015.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.