최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기한국산학기술학회논문지 = Journal of the Korea Academia-Industrial cooperation Society, v.21 no.5, 2020년, pp.14 - 21
권홍필 (호서대학교 정보보호학과) , 하재철 (호서대학교 정보보호학과)
In order to provide confidential services between two communicating parties, block data encryption using a symmetric secret key is applied. A power analysis attack on a cryptosystem is a side channel-analysis method that can extract a secret key by measuring the power consumption traces of the crypt...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
F. X. Standaert, B. Gierlichs, and I. Verbauwhede, "Partition vs. comparison side-channel Distinguishers : An empirical evaluation of statistical tests for univariate side-channel attacks against two unprotected CMOS device", ICISC'08, LNCS 5461, pp. 253-267, 2008. DOI : https://doi.org/10.1007/978-3-642-00730-9_16
S. Albawi, T. A. Mohammed, and S. Al-Zawi, "Understanding of a Convolutional Neural Network", International Conference on Engineering and Technology (ICET'17), Antalya, Turkey, pp. 1-6, Aug. 2017. DOI: https://doi.org/10.1109/ICEngTechnol.2017.8308186
J. Schmidhuber, "Deep Learning in Neural Networks: An Overview", Neural Networks, Vol. 61, pp. 85-117, 2015. DOI: https://doi.org/10.1016/j.neunet.2014.09.003
R. Collobert and S. Benjio, "Links between perceptrons, MLPs and SVMs", Proceedings of the twenty-first international conference on Machine learning(ICML'04), Banff, Canada, pp. 23-30, July 2004. DOI: https://doi.org/10.1145/1015330.1015415
E. Brier, C. Clavier, and F. Olivier, "Correlation Power Analysis with a Leakage Model", CHES'04, LNCS 3156, pp. 16-29, 2004. DOI: https://doi.org/10.1007/978-3-540-28632-5_2
S. Chari, J. R. Rao, and P. Rohatgi, "Template Attacks", CHES'02, LNCS 2523, pp. 13-28, 2002. DOI: https://doi.org/10.1007/3-540-36400-5_3
W. Schindler, K. Lemke, and C. Paar, "A Stochastic Model for Differential Side Channel Cryptanalysis", CHES'05, LNCS 3659, pp. 30-46, 2005. DOI: https://doi.org/10.1007/11545262_3
NewAE Technology Inc., "Single Board Solutions - Chipwhisperer-Lite 32-bit," Available From: https://www.newae.com/chipwhisperer, (accessed Dec. 1, 2019).
H. Wang, M. Brisfors, S. Forsmark, and E. Dubrova, "How Diversity Affects Deep-Learning Side-Channel Attacks", Cryptology ePrint Archive, Report 2019/664, Available From: https://eprint.iacr.org/2019/664 (accessed Dec. 1, 2019).
A. Golder, D. Das, J. Danial, S. Ghosh, S. Sen, and A. Raychowdhury, "Practical Approaches Towards Deep-Learning Based Cross-Device Power Side Channel Attack", IEEE Trans. on VLSI systems, Vol. 27, No. 12, pp. 2720-2733, 2019. DOI: https://doi.org/10.1109/TVLSI.2019.2926324
L. Wei, B. Luo, Y. Li, Y. Liu, and Q. Xu, "I Know What You See: Power Side-Channel Attack on Convolutional Neural Network, Accelerators", Proceedings of the 34th Annual Computer Security Applications Conference (ACSAC'18), San Juan PR USA, pp. 393-406, Dec. 2018. DOI: https://doi.org/10.1145/3274694.3274696
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.