Searched for: contributor%3A%22Picek%2C+S.+%28mentor%29%22
(1 - 1 of 1)
document
Kok, Jim (author)
Analysing physical leakages (e.g. power consumption and electromagnetic radiation) of cryptographic devices can be used by adversaries to extract secret keys. Over the last couple of years, researchers have shown that machine learning has potential for this process. Machine learning models need to be fine-tuned to enhance key extraction...
bachelor thesis 2020