- document
-
Weissbart, L.J.A. (author), Chmielewski, Ćukasz (author), Picek, S. (author), Batina, Lejla (author)Profiling attacks, especially those based on machine learning, proved to be very successful techniques in recent years when considering the side-channel analysis of symmetric-key crypto implementations. At the same time, the results for implementations of asymmetric-key cryptosystems are very sparse. This paper considers several machine learning...journal article 2020