References
- F. X. Standaert, B. Gierlichs, and I. Verbauwhede, "Partition vs. comparison side-channel Distinguishers : An empirical evaluation of statistical tests for univariate side-channel attacks against two unprotected CMOS device", ICISC'08, LNCS 5461, pp. 253-267, 2008. DOI : https://doi.org/10.1007/978-3-642-00730-9_16
- S. Mangard, E. Oswald, and T. Poop, "Power analysis attacks: Revealing the secrets of smart cards", p. 333, Springer, 2008, pp. 119-165. DOI : https://doi.org/10.1007/978-0-387-38162-6
- S. Albawi, T. A. Mohammed, and S. Al-Zawi, "Understanding of a Convolutional Neural Network", International Conference on Engineering and Technology (ICET'17), Antalya, Turkey, pp. 1-6, Aug. 2017. DOI: https://doi.org/10.1109/ICEngTechnol.2017.8308186
- J. Schmidhuber, "Deep Learning in Neural Networks: An Overview", Neural Networks, Vol. 61, pp. 85-117, 2015. DOI: https://doi.org/10.1016/j.neunet.2014.09.003
- R. Collobert and S. Benjio, "Links between perceptrons, MLPs and SVMs", Proceedings of the twenty-first international conference on Machine learning(ICML'04), Banff, Canada, pp. 23-30, July 2004. DOI: https://doi.org/10.1145/1015330.1015415
- Federal Information Processing Standards Publication (FIPS 197), "Advanced Encryption Standard(AES)", National Institute of Standards and Technology (NIST), 2001. DOI: https://doi.org/10.6028%2FNIST.FIPS.197
- N. Hatami, Y. Gavet, and J. Debayle, "Classification of Time-Series Images Using Deep Convolutional Neural Networks", International Conference on Machine Vision(ICMV '17), Vienna, Austria, Vol. 10696. pp. 106960Y-1-106960Y-8, Nov. 2017. DOI: https://doi.org/10.1117/12.2309486
- P. Kocher, J. Jaffe, and B. Jun, "Differential Power Analysis", CRYPTO'99, LNCS 1666, pp. 388-397, 1999. DOI: https://doi.org/10.1007/3-540-48405-1_25
- E. Brier, C. Clavier, and F. Olivier, "Correlation Power Analysis with a Leakage Model", CHES'04, LNCS 3156, pp. 16-29, 2004. DOI: https://doi.org/10.1007/978-3-540-28632-5_2
- S. Chari, J. R. Rao, and P. Rohatgi, "Template Attacks", CHES'02, LNCS 2523, pp. 13-28, 2002. DOI: https://doi.org/10.1007/3-540-36400-5_3
- W. Schindler, K. Lemke, and C. Paar, "A Stochastic Model for Differential Side Channel Cryptanalysis", CHES'05, LNCS 3659, pp. 30-46, 2005. DOI: https://doi.org/10.1007/11545262_3
- NewAE Technology Inc., "Single Board Solutions - Chipwhisperer-Lite 32-bit," Available From: https://www.newae.com/chipwhisperer, (accessed Dec. 1, 2019).
- H. Wang, M. Brisfors, S. Forsmark, and E. Dubrova, "How Diversity Affects Deep-Learning Side-Channel Attacks", Cryptology ePrint Archive, Report 2019/664, Available From: https://eprint.iacr.org/2019/664 (accessed Dec. 1, 2019).
- A. Golder, D. Das, J. Danial, S. Ghosh, S. Sen, and A. Raychowdhury, "Practical Approaches Towards Deep-Learning Based Cross-Device Power Side Channel Attack", IEEE Trans. on VLSI systems, Vol. 27, No. 12, pp. 2720-2733, 2019. DOI: https://doi.org/10.1109/TVLSI.2019.2926324
- L. Wei, B. Luo, Y. Li, Y. Liu, and Q. Xu, "I Know What You See: Power Side-Channel Attack on Convolutional Neural Network, Accelerators", Proceedings of the 34th Annual Computer Security Applications Conference (ACSAC'18), San Juan PR USA, pp. 393-406, Dec. 2018. DOI: https://doi.org/10.1145/3274694.3274696