- document
-
Weissbart, L.J.A. (author), Chmielewski, Ćukasz (author), Picek, S. (author), Batina, Lejla (author)Profiling attacks, especially those based on machine learning, proved to be very successful techniques in recent years when considering the side-channel analysis of symmetric-key crypto implementations. At the same time, the results for implementations of asymmetric-key cryptosystems are very sparse. This paper considers several machine learning...journal article 2020
- document
-
Picek, S. (author), Heuser, Annelie (author), Jovic, Alan (author), Batina, Lejla (author)Profiled side-channel attacks consist of several steps one needs to take. An important, but sometimes ignored, step is a selection of the points of interest (features) within side-channel measurement traces. A large majority of the related works start the analyses with an assumption that the features are preselected. Contrary to this...journal article 2019