1 |
S. Chari, J.R. Rao, and P. Rohatgi, "Template Attacks," Cryptographic Hardware and Embedded Systems-CHES 2002, LNCS 2523, pp. 13-28, Aug. 2002.
|
2 |
W. Schindler and K. Lemke and C. Paar, "A stochastic model for differential side channel cryptanalysis," Cryptographic Hardware and Embedded Systems-CHES 2005, LNCS 3659, pp. 30-46, Aug. 2005.
|
3 |
P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," Advances in Cryptology, CRYPTO '99, LNCS 1666, pp. 388-397, Aug. 1999.
|
4 |
E. Brier, C. Clavier, and F. Olivier, "Correlation power analysis with a leakage model," Cryptographic Hardware and Embedded Systems-CHES 2004, LNCS 3156, pp. 16-29, Aug. 2004.
|
5 |
S. Yang and Y. Zhou and J. Liu and D. Chen, "Back Propagation Neural Network Based Leakage Characterization for Practical Security Analysis of Cryptographic Implementations," International Conference on Information Security and Cryptology-ICISC 2011, LNCS 7259, pp. 169-185, Nov. 2011.
|
6 |
H. Maghrebi and T. Portigliatti and E. Prouff, "Breaking cryptographic implementations using deep learning techniques," International Conference on Security, Privacy, and Applied Cryptography Engineering-SPACE 2016, LNCS 10076, pp. 3-26, Nov. 2016.
|
7 |
I. Goodfellow and Y. Bengio and A. Courville, Deep Learning: Adaptive Computation and Machine Learning series, MIT Press, Nov. 2016.
|
8 |
E. Cagli and C. Dumas and E. Prouff, "Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures," Cryptographic Hardware and Embedded Systems-CHES 2017, LNCS 10529, pp. 45-68, Aug. 2017.
|
9 |
B. Timon, "Non-Profiled Deep Learning-based Side-Channel attacks with Sensitivity Analysis," IACR Transactions on Cryptographic Hardware and Embedded Systems-TCHES '19, Vol. 2019, no. 2, pp. 107-131, Feb. 2019.
|
10 |
E. Prouff and M. Ricain and R. Bevan "Statistical Analysis of Second Order Differential Power Analysis," IEEE Transactions on computers, Vol.58, No.6, pp. 799-811, Jun. 2009.
DOI
|
11 |
K. Hornik, "Approximation capabilities of multilayer feedforward networks," Neural Networks, vol. 4, pp. 251-257, Jan. 1990.
DOI
|
12 |
P. Vincent and H. Larochelle and Y. Bengio and P.A. Manzagol "Extracting and composing robust features with denoising autoencoders," Proceedings of the 25th international conference on Machine learning-ICML'08, pp. 1096-1103, Jul. 2008.
|
13 |
M. Abadi et al, "TensorFlow: Large-scale machine learning on heterogeneous systems," 12th USENIX Symposium on Operating Systems Design and Implementation-OSDI'16, pp. 265-283, Aug. 2016.
|
14 |
Keras: The Python Deep Learning library, "Keras," https://keras.io, 2015.
|
15 |
S. Mangard and E. Oswald and T. Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards, Springer US, Mar. 2007.
|
16 |
K. He and X. Zhang and S. Ren and J. Sun, "Delving Deep into Rectifiers: Surpassing Human-Level Performance on ImageNet Classification," Proceedings of the 2015 IEEE International Conference on Computer Vision-ICCV'15, pp. 1026-1034, Dec, 2015.
|