-
document
-
Weissbart, L.J.A. (author), Chmielewski, Ćukasz (author), Picek, S. (author), Batina, Lejla (author)
Profiling attacks, especially those based on machine learning, proved to be very successful techniques in recent years when considering the side-channel analysis of symmetric-key crypto implementations. At the same time, the results for implementations of asymmetric-key cryptosystems are very sparse. This paper considers several machine learning...
journal article 2020
-
document
-
Picek, S. (author), Heuser, Annelie (author), Jovic, Alan (author), Batina, Lejla (author)
Profiled side-channel attacks consist of several steps one needs to take. An important, but sometimes ignored, step is a selection of the points of interest (features) within side-channel measurement traces. A large majority of the related works start the analyses with an assumption that the features are preselected. Contrary to this...
journal article 2019
Source URL (retrieved on 2024-06-08 02:13): https://repository.tudelft.nl/islandora/search/%2520?amp%253Bamp%253Bf%255B0%255D=mods_subject_topic_ss%253A%2522perception%2522&%253Bamp%253Bf%255B1%255D=mods_name_personal_author_namePart_family_ss%253A%2522Bittermann%2522&%253Bf%255B0%255D=mods_genre_s%253A%2522abstract%2522&collection=research&f%255B0%255D=mods_name_personal_author_namePart_family_ss%253A%2522Mulder%2522&f%5B0%5D=mods_subject_topic_ss%3A%22Machine%5C%20learning%22&f%5B1%5D=mods_name_personal_author_namePart_family_ss%3A%22Batina%22