- document
-
Perin, G. (author), Chmielewski, Łukasz (author), Batina, Lejla (author), Picek, S. (author)To mitigate side-channel attacks, real-world implementations of public-key cryptosystems adopt state-of-the-art countermeasures based on randomization of the private or ephemeral keys. Usually, for each private key operation, a “scalar blinding” is performed using 32 or 64 randomly generated bits. Nevertheless, horizontal attacks based on a...journal article 2020
- document
-
Perin, G. (author), Chmielewski, Łukasz (author), Picek, S. (author)The adoption of deep neural networks for profiled side-channel attacks provides powerful options for leakage detection and key retrieval of secure products. When training a neural network for side-channel analysis, it is expected that the trained model can implement an approximation function that can detect leaking side-channel samples and, at...journal article 2020
- document
-
Weissbart, L.J.A. (author), Chmielewski, Łukasz (author), Picek, S. (author), Batina, Lejla (author)Profiling attacks, especially those based on machine learning, proved to be very successful techniques in recent years when considering the side-channel analysis of symmetric-key crypto implementations. At the same time, the results for implementations of asymmetric-key cryptosystems are very sparse. This paper considers several machine learning...journal article 2020