1 |
Trusthingz, "trusthingz", https://trusthingz.org/, Sep. 27, 2022
|
2 |
D. Kingma and J. Ba, "Adam: amethod for stochastic optimization," 3rd International Conference on Learning Representations (ICLR), May. 2015.
|
3 |
CW1173 ChipWhisperer-Lite, "ChipWhisperer-Lite", https://wiki.newae.com/CW1173_ChipWhispererLite, Sep. 27,2022
|
4 |
S. Chari, J.R. Rao, and P. Rohatgi, "Template attacks," Cryptographic Har dware and Embedded Systems, CHES 2002, LNCS 2523, pp. 13-28, Aug. 2002
|
5 |
F. Standaert, T. Malkin, and M.Yung,"A unified frame work for the analysis of side-channel key recovery attacks," Advanced in Cryptology, EUROCRYPT'09, LNCS 5479, pp.443-461, Apr. 2009.
|
6 |
S. Ghandali, S. Ghandali, and S. Tehranipoor, "Profiled power-analysis attacks by an efficient architectural extension of a CNN implementation.", Proceedings of the 2021 22nd International Symposium on Quality Electronic De sign (ISQED), pp. 395-400, Apr. 2021
|
7 |
R. Benadjila, E. Prouff, R. Strullu, E. Cagli, and C. Dumas, "Deep learning for side-channel analysis and introduction to ascad database," Journal of Cryptographic Engineering, vol. 10, no. 2, pp. 163-188, Jun. 2020.
DOI
|
8 |
H. Yu, H. Shan, M. Panoff, and Y. Jin, "Cross-device profiled side-channel attacks using meta-transfer learning." Proceedings of the in 2021 58th ACM/IEEE Design Automation Conference (DAC), pp. 703-708, Dec. 2021.
|
9 |
Y. Ganin and V. Lempitsky, "Unsupervised domain adaptation by backpropagation.", Proceedings of the 32nd International Conference on Machine Learning, vol 37, pp.1180-1189, Jul. 2015.
|
10 |
A. Gretton, A. A.J. Smola, J. Huang,M. Schmittfull, K.M. Borgwardt, andB. Scholkopf, "Covariate shift andlocal learning by distribution matching", Dataset Shift in Machine Learning, MIT Press, Cambridge, MA, USA, pp. 131-160, 2009
|
11 |
Y. Won, X. Hou, D. Jap, J. Breier, and S. Bhasin, "Back to the basics: Seamless integration of side-channel preprocessing in deep neural networks." IEEE Transactions on Information Forensics and Security, vol. 16, pp. 3215-3227. Apr. 2021
DOI
|
12 |
P.C. Kocher, "Timing attacks onimplementations of Diffie-Hellman, RSA, DSS, and other systems.", Advances in Cryptology, CRYPTO '96, LNCSvol 1109, pp. 104-113, Jan. 2001
|
13 |
S. Picek, I. P. Samiotis, J. Kim, A. Heuser, S. Bhasin, and A. Legay, "On the performance of convolutional neural networks for side-channel analysis," in International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE), LNSC 11348, pp. 157-176, Dec. 2018.
|
14 |
P. Cao, C. Zhang, X. Lu, and D. Gu, "Cross-device profiled side-channel attack with unsupervised domain adaptation.", IACR Transactions on Cryptogr aphic Hardware and Embedded Systems, vol. 2021, no. 4, pp. 27-56, Aug. 2021.
|