최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會論文誌 = Journal of the Korea Institute of Information Security and Cryptology, v.32 no.5, 2022년, pp.987 - 995
Deep learning-based profiling side-channel analysis has been many proposed. Deep learning-based profiling analysis is a technique that trains the relationship between the side-channel information and the intermediate values to the neural network, then finds the secret key of the attack device using ...
P.C. Kocher, "Timing attacks onimplementations of Diffie-Hellman, RSA, DSS, and other systems.", Advances in Cryptology, CRYPTO '96, LNCSvol 1109, pp. 104-113, Jan. 2001
S. Chari, J.R. Rao, and P. Rohatgi, "Template attacks," Cryptographic Har dware and Embedded Systems, CHES 2002, LNCS 2523, pp. 13-28, Aug. 2002
S. Ghandali, S. Ghandali, and S. Tehranipoor, "Profiled power-analysis attacks by an efficient architectural extension of a CNN implementation.", Proceedings of the 2021 22nd International Symposium on Quality Electronic De sign (ISQED), pp. 395-400, Apr. 2021
S. Picek, I. P. Samiotis, J. Kim, A. Heuser, S. Bhasin, and A. Legay, "On the performance of convolutional neural networks for side-channel analysis," in International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE), LNSC 11348, pp. 157-176, Dec. 2018.
R. Benadjila, E. Prouff, R. Strullu, E. Cagli, and C. Dumas, "Deep learning for side-channel analysis and introduction to ascad database," Journal of Cryptographic Engineering, vol. 10, no. 2, pp. 163-188, Jun. 2020.
H. Yu, H. Shan, M. Panoff, and Y. Jin, "Cross-device profiled side-channel attacks using meta-transfer learning." Proceedings of the in 2021 58th ACM/IEEE Design Automation Conference (DAC), pp. 703-708, Dec. 2021.
P. Cao, C. Zhang, X. Lu, and D. Gu, "Cross-device profiled side-channel attack with unsupervised domain adaptation.", IACR Transactions on Cryptogr aphic Hardware and Embedded Systems, vol. 2021, no. 4, pp. 27-56, Aug. 2021.
F. Standaert, T. Malkin, and M.Yung,"A unified frame work for the analysis of side-channel key recovery attacks," Advanced in Cryptology, EUROCRYPT'09, LNCS 5479, pp.443-461, Apr. 2009.
Y. Ganin and V. Lempitsky, "Unsupervised domain adaptation by backpropagation.", Proceedings of the 32nd International Conference on Machine Learning, vol 37, pp.1180-1189, Jul. 2015.
Y. Won, X. Hou, D. Jap, J. Breier, and S. Bhasin, "Back to the basics: Seamless integration of side-channel preprocessing in deep neural networks." IEEE Transactions on Information Forensics and Security, vol. 16, pp. 3215-3227. Apr. 2021
A. Gretton, A. A.J. Smola, J. Huang,M. Schmittfull, K.M. Borgwardt, andB. Scholkopf, "Covariate shift andlocal learning by distribution matching", Dataset Shift in Machine Learning, MIT Press, Cambridge, MA, USA, pp. 131-160, 2009
CW1173 ChipWhisperer-Lite, "ChipWhisperer-Lite", https://wiki.newae.com/CW1173_ChipWhispererLite, Sep. 27,2022
Trusthingz, "trusthingz", https://trusthingz.org/, Sep. 27, 2022
D. Kingma and J. Ba, "Adam: amethod for stochastic optimization," 3rd International Conference on Learning Representations (ICLR), May. 2015.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.