1 |
P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," CRYPTO'99, LNCS 1666, pp. 388-397, 1999.
|
2 |
W. Kim, K. Song, Y. Lee, H.W. Kim, and H.N. Kim, "Performance Improvement of Power Analysis Attacks based on Wavelet De-noising," The Journal of Korean Institute of Communications and Information Sciences, 35(9), pp. 1330-1342, Sep. 2010.
|
3 |
E. Brier, C. Clavier, and F. Olivier, "Correlation power analysis with a leakage model," CHES'04, pp. 16-29, 2004.
|
4 |
B. Timon, "Non-profiled deep learning-based side-channel attacks with sensitivity analysis," IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2019, No. 2, pp. 107-131, Feb. 2019.
DOI
|
5 |
E. Prouff, R. Strullu, R. Benadjila, E. Cagli, and C. Dumas, "Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database," IACR ePrint Archive, Available at https://eprint.iacr.org/2018/053, 2018.
|
6 |
D. Bae, and J. Ha, "Performance Metric for Differential Deep Learning Analysis," Journal of Internet Services and Information Security (JISIS), Vol. 11, No. 2, pp. 22-33, May. 2021.
DOI
|
7 |
N. Debande, Y. Souissi, M. Aabid, S. Guilley, and J. Danger, "Wavelet transform based pre-processing for side channel analysis," 45th Annual IEEE/ACM International Symposium on Microarchitecture Workshops, pp. 32-38, Dec. 2012.
|
8 |
P. Kocher, "Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems," CRYPTO'96, LNCS 1109, pp. 104-113, 1996.
|
9 |
D. Kwon, S. Jin, H. Kim, and S. Hong, "Improving Non-Profiled Side-Channel Analysis Using Auto-Encoder Based Noise Reduction Preprocessing," Journal of the Korea Institute of Information Security & Cryptology, 29(3), pp. 491-501, May. 2019.
DOI
|
10 |
J. Ryoo, D. Han, S. Kim, H. Kim, T. Kim, and S. Lee, "A Proposal of Wavelet-based Differential Power Analysis Method," Journal of the Korea Institute of Information Security & Cryptology, 19(3), pp. 27-35, June. 2009.
DOI
|
11 |
R. Gwinn, M. Matties, and A. Rubin, "Wavelet Selection and Employment for Side-Channel Disassembly," arXiv ePrint Archive, Available at https://arxiv.org/abs/2107.11870, 2021.
|
12 |
D. Bae, and J. Ha, "Implementation of Instruction-Level Disassembler Based on Power Consumption Traces Using CNN," Journal of the Korea Institute of Information Security & Cryptology, 30(4), pp. 527-536, Aug. 2020.
DOI
|
13 |
J. Park, X. Xu, Y. Jin and D. Forte, "Power-based side-channel instruction-level disassembler," Proceedings of the 55th Annual Design Automation Conference(DAC), pp. 1-6, June. 2018.
|
14 |
T. Le, J. Clediere, C. Serviere, and J. Lacoume, "Noise Reduction in Side Channel Attack Using Fourth-Order Cumulant," IEEE Transactions on Information Forensics and Security, Vol. 2, No. 4, pp. 710-720, Nov. 2007.
DOI
|
15 |
ETRI, "SCARF Dataset," Available at https://trusthingz.org/index.php/scarf-data, 2019.
|