Searched for: %2520
(1 - 2 of 2)
document
Perin, G. (author), Wu, L. (author), Picek, S. (author)
The adoption of deep neural networks for profiling side-channel attacks opened new perspectives for leakage detection. Recent publications showed that cryptographic implementations featuring different countermeasures could be broken without feature selection or trace preprocessing. This success comes with a high price: an extensive...
journal article 2023
document
Slooff, Tom (author)
One of the most potent attacks against cryptographic implementations nowadays is side-channel attacks. Side-channel attacks use unintended leakages in the implementation, for example, electromagnetic radiation, to retrieve the secret key. Over time side-channel attacks have become more powerful, and recently the community has shifted towards...
master thesis 2021