- document
-
Kok, Wim (author)Power analysis can be used to retrieve key information as secure systems leak data-dependent information over side channels. A proposed solution to break the correlation between side channel information and secret information was to replace a vulnerable part of the cryptography implementation with a neural network. This uses the inherent...master thesis 2024