최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會誌 = KIISC review, v.30 no.1, 2020년, pp.43 - 53
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
LeCun, Yann, Yoshua Bengio, and Geoffrey Hinton. "Deep learning." nature 521.7553 (2015): 436.
Goodfellow, Ian, Yoshua Bengio, and Aaron Courville. Deep learning. MIT press, 2016.
Polyak, Boris T. "Some methods of speeding up the convergence of iteration methods." USSR Computational Mathematics and Mathematical Physics 4.5 (1964): 1-17.
Sutskever, Ilya, et al. "On the importance of initialization and momentum in deep learning." International conference on machine learning. 2013.
Hinton, Geoffrey, Nitish Srivastava, and Kevin Swersky. "Neural networks for machine learning lecture 6a overview of mini-batch gradient descent." Neural Netw. Machine Learn., Coursera MOOC, 2012. https://www.cs.toronto.edu/-tijmen/csc321/slides/lecture_slides_lec6.pdf
Kingma, Diederik P., and Jimmy Ba. "Adam: A method for stochastic optimization." arXiv preprint arXiv:1412.6980 (2014).
Wolpert, David H., and William G. Macready. "No free lunch theorems for optimization." IEEE transactions on evolutionary computation 1.1 (1997): 67-82.
Tikhonov, Andrey Nikolayevich. "On the stability of inverse problems." Dokl. Akad. Nauk SSSR. Vol. 39. 1943.
Tibshirani, Robert. "Regression shrinkage and selection via the lasso." Journal of the Royal Statistical Society: Series B (Methodological) 58.1 (1996): 267-288.
Srivastava, Nitish, et al. "Dropout: a simple way to prevent neural networks from overfitting." The journal of machine learning research 15.1 (2014): 1929-1958.
Ioffe, Sergey, and Christian Szegedy. "Batch normalization: Accelerating deep network training by reducing internal covariate shift." arXiv preprint arXiv:1502.03167 (2015).
Mangard, Stefan, Elisabeth Oswald, and Thomas Popp. Power analysis attacks: Revealing the secrets of smart cards. Vol. 31. Springer Science & Business Media, 2008.
Kocher, Paul, Joshua Jaffe, and Benjamin Jun. "Differential power analysis." Annual International Cryptology Conference. Springer, Berlin, Heidelberg, 1999.
Brier, Eric, Christophe Clavier, and Francis Olivier. "Correlation power analysis with a leakage model." International Workshop on Cryptographic Hardware and Embedded Systems. Springer, Berlin, Heidelberg, 2004.
Gierlichs, Benedikt, et al. "Mutual information analysis." International Workshop on Cryptographic Hardware and Embedded Systems. Springer, Berlin, Heidelberg, 2008.
van Woudenberg, Jasper GJ, Marc F. Witteman, and Bram Bakker. "Improving differential power analysis by elastic alignment." Cryptographers' Track at the RSA Conference. Springer, Berlin, Heidelberg, 2011.
Muijrers, Ruben A., Jasper GJ van Woudenberg, and Lejla Batina. "RAM: Rapid alignment method." International Conference on Smart Card Research and Advanced Applications. Springer, Berlin, Heidelberg, 2011.
Chari, Suresh, Josyula R. Rao, and Pankaj Rohatgi. "Template attacks." International Workshop on Cryptographic Hardware and Embedded Systems. Springer, Berlin, Heidelberg, 2002.
Schindler, Werner, Kerstin Lemke, and Christof Paar. "A stochastic model for differential side channel cryptanalysis." International Workshop on Cryptographic Hardware and Embedded Systems. Springer, Berlin, Heidelberg, 2005.
Archambeau, Cedric, et al. "Template attacks in principal subspaces." International Workshop on Cryptographic Hardware and Embedded Systems. Springer, Berlin, Heidelberg, 2006.
Standaert, Francois-Xavier, and Cedric Archambeau. "Using subspace-based template attacks to compare and combine power and electromagnetic information leakages." International Workshop on Cryptographic Hardware and Embedded Systems. Springer, Berlin, Heidelberg, 2008.
Choudary, Omar, and Markus G. Kuhn. "Efficient template attacks." International Conference on Smart Card Research and Advanced Applications. Springer, Cham, 2013.
Chari, Suresh, et al. "Towards sound approaches to counteract power-analysis attacks." Annual International Cryptology Conference. Springer, Berlin, Heidelberg, 1999.
Goubin, Louis, and Jacques Patarin. "DES and differential power analysis the "Duplication" method." International Workshop on Cryptographic Hardware and Embedded Systems. Springer, Berlin, Heidelberg, 1999.
Coron, Jean-Sebastien, and Ilya Kizhvatov. "An efficient method for random delay generation in embedded software." International Workshop on Cryptographic Hardware and Embedded Systems. Springer, Berlin, Heidelberg, 2009.
Coron, Jean-Sebastien, and Ilya Kizhvatov. "Analysis and improvement of the random delay countermeasure of CHES 2009." International Workshop on Cryptographic Hardware and Embedded Systems. Springer, Berlin, Heidelberg, 2010.
Veyrat-Charvillon, Nicolas, et al. "Shuffling against side-channel attacks: A comprehensive study with cautionary note." International Conference on the Theory and Application of Cryptology and Information Security. Springer, Berlin, Heidelberg, 2012.
Tiri, Kris, Moonmoon Akmal, and Ingrid Verbauwhede. "A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards." Proceedings of the 28th European solid-state circuits conference. IEEE, 2002.
Popp, Thomas, and Stefan Mangard. "Masked dual-rail pre-charge logic: DPA-resistance without routing constraints." International Workshop on Cryptographic Hardware and Embedded Systems. Springer, Berlin, Heidelberg, 2005.
Chen, Cong, et al. "Balanced encoding to mitigate power analysis: a case study." International Conference on Smart Card Research and Advanced Applications. Springer, Cham, 2014.
Maghrebi, Houssem, Victor Servant, and Julien Bringer. "There is wisdom in harnessing the strengths of your enemy: customized encoding to thwart side-channel attacks." International Conference on Fast Software Encryption. Springer, Berlin, Heidelberg, 2016.
Becker, George, et al. "Test vector leakage assessment (TVLA) methodology in practice." International Cryptographic Module Conference. Vol. 1001. 2013.
Yang, Shuguo, et al. "Back propagation neural network based leakage characterization for practical security analysis of cryptographic implementations." International Conference on Information Security and Cryptology. Springer, Berlin, Heidelberg, 2011.
Martinasek, Zdenek, and Vaclav Zeman. "Innovative method of the power analysis." Radioengineering 22.2 (2013): 586-594.
Martinasek, Zdenek, Jan Hajny, and Lukas Malina. "Optimization of power analysis using neural network." International Conference on Smart Card Research and Advanced Applications. Springer, Cham, 2013.
Gilmore, Richard, Neil Hanley, and Maire O'Neill. "Neural network based attack on a masked implementation of AES." 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, 2015.
Martinasek, Zdenek, et al. "Power analysis attack based on the MLP in DPA Contest v4." 2015 38th International Conference on Telecommunications and Signal Processing (TSP). IEEE, 2015.
Maghrebi, Houssem, Thibault Portigliatti, and Emmanuel Prouff. "Breaking cryptographic implementations using deep learning techniques." International Conference on Security, Privacy, and Applied Cryptography Engineering. Springer, Cham, 2016.
Cagli, Eleonora, Cecile Dumas, and Emmanuel Prouff. "Convolutional neural networks with data augmentation against jitter-based countermeasures." International Conference on Cryptographic Hardware and Embedded Systems. Springer, Cham, 2017.
Hettwer, Benjamin, Stefan Gehrer, and Tim Guneysu. "Profiled power analysis attacks using convolutional neural networks with domain knowledge." International Conference on Selected Areas in Cryptography. Springer, Cham, 2018.
Yang, Guang, et al. "Convolutional Neural Network Based Side-Channel Attacks in Time-Frequency Representations." International Conference on Smart Card Research and Advanced Applications. Springer, Cham, 2018.
Kim, Jaehun, et al. "Make Some Noise. Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis." IACR Transactions on Cryptographic Hardware and Embedded Systems (2019): 148-179.
Won, Yoo-Seung, and Jong-Yeon Park. "Non-Profiled Side Channel Attack based on Deep Learning using Picture Trace." IACR Cryptology ePrint Archive, Report 2019/1242, 2019.
Golder, Anupam, et al. "Practical Approaches Toward Deep-Learning-Based Cross-Device Power Side-Channel Attack." IEEE Transactions on Very Large Scale Integration (VLSI) Systems 27.12 (2019): 2720-2733.
Das, Debayan, et al. "X-DeepSCA: Cross-device deep learning side channel attack." Proceedings of the 56th Annual Design Automation Conference 2019. ACM, 2019.
Zaid, Gabriel, et al. "Methodology for efficient CNN architectures in profiling attacks." IACR Transactions on Cryptographic Hardware and Embedded Systems (2020): 1-36.
Carbone, Mathieu, et al. "Deep learning to evaluate secure RSA implementations." IACR Transactions on Cryptographic Hardware and Embedded Systems (2019): 132-161.
Weissbart, Leo, Stjepan Picek, and Lejla Batina. "One Trace Is All It Takes: Machine Learning-Based Side-Channel Attack on EdDSA." International Conference on Security, Privacy, and Applied Cryptography Engineering. Springer, Cham, 2019.
Zhou, Yuanyuan, and Francois-Xavier Standaert. "Simplified Single-Trace Side-Channel Attacks on Elliptic Curve Scalar Multiplication using Fully Convolutional Networks."
Zhou, Yuanyuan, and Francois-Xavier Standaert. "Deep learning mitigates but does not annihilate the need of aligned traces and a generalized ResNet model for side-channel attacks." Journal of Cryptographic Engineering (2019): 1-11.
Timon, Benjamin. "Non-profiled deep learning-based side-channel attacks with sensitivity analysis." IACR Transactions on Cryptographic Hardware and Embedded Systems (2019): 107-131.
Standaert, Francois-Xavier, Benedikt Gierlichs, and Ingrid Verbauwhede. "Partition vs. comparison side-channel distinguishers: An empirical evaluation of statistical tests for univariate side-channel attacks against two unprotected cmos devices." International Conference on Information Security and Cryptology. Springer, Berlin, Heidelberg, 2008.
Whitnall, Carolyn, Elisabeth Oswald, and Francois-Xavier Standaert. "The myth of generic DPA… and the magic of learning." Cryptographers' Track at the RSA Conference. Springer, Cham, 2014.
Robyns, Pieter, Peter Quax, and Wim Lamotte. "Improving CEMA using correlation optimization." IACR Transactions on Cryptographic Hardware and Embedded Systems (2019): 1-24.
Wu, Lichao, and Stjepan Picek. "Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders." IACR Cryptology ePrint Archive, Report 2019/1474, 2019.
Hettwer B., Gehrer S., Guneysu T. "Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery." Selected Areas in Cryptography - SAC 2019. Springer, Cham, 2019.
Masure, Loic, Cecile Dumas, and Emmanuel Prouff. "Gradient visualization for general characterization in profiling attacks." International Workshop on Constructive Side-Channel Analysis and Secure Design. Springer, Cham, 2019.
Wegener, Felix, Thorben Moos, and Amir Moradi. "DL-LA: deep learning leakage assessment: A modern roadmap for SCA evaluations." IACR IACR Cryptology ePrint Archive, Report 2019/505, 2019.
Benadjila, Ryad, et al. "Deep learning for side-channel analysis and introduction to ASCAD database." Journal of Cryptographic Engineering (2019): 1-26.
Masure, Loic, Cecile Dumas, and Emmanuel Prouff. "A comprehensive study of deep learning for side-channel analysis." IACR Transactions on Cryptographic Hardware and Embedded Systems (2020): 348-375.
Hua, Weizhe, Zhiru Zhang, and G. Edward Suh. "Reverse engineering convolutional neural networks through side-channel information leaks." 2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC). IEEE, 2018.
Wei, Lingxiao, et al. "I know what you see: Power side-channel attack on convolutional neural network accelerators." Proceedings of the 34th Annual Computer Security Applications Conference. ACM, 2018.
Batina, Lejla, et al. "Csi neural network: Using side-channels to recover your artificial neural network information." arXiv preprint arXiv:1810.09076 (2018).
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.