- document
-
Perin, G. (author), Wu, L. (author), Picek, S. (author)The adoption of deep neural networks for profiling side-channel attacks opened new perspectives for leakage detection. Recent publications showed that cryptographic implementations featuring different countermeasures could be broken without feature selection or trace preprocessing. This success comes with a high price: an extensive...journal article 2023