Searched for: +
(1 - 2 of 2)
document
Weissbart, L.J.A. (author), Chmielewski, Ɓukasz (author), Picek, S. (author), Batina, Lejla (author)
Profiling attacks, especially those based on machine learning, proved to be very successful techniques in recent years when considering the side-channel analysis of symmetric-key crypto implementations. At the same time, the results for implementations of asymmetric-key cryptosystems are very sparse. This paper considers several machine learning...
journal article 2020
document
Kim, Jaehun (author), Picek, S. (author), Heuser, Annelie (author), Bhasin, Shivam (author), Hanjalic, A. (author)
Profiled side-channel analysis based on deep learning, and more precisely Convolutional Neural Networks, is a paradigm showing significant potential. The results, although scarce for now, suggest that such techniques are even able to break cryptographic implementations protected with countermeasures. In this paper, we start by proposing a new...
journal article 2019