side channel analysis
Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis
15
Tolerant Algebraic Side-Channel Analysis of {AES}
17
On the Performance of Convolutional Neural Networks for Side-channel Analysis
19
Static Power Side-Channel Analysis of a Threshold Implementation Prototype Chip
6
Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database
46
On the Performance of Multilayer Perceptron in Profiling Side-channel Analysis
18
Improved Side-Channel Analysis of Finite-Field Multiplication
26
The secrets of profiling for side-channel analysis: feature selection matters
27
Side-Channel Analysis of MAC-Keccak Hardware Implementations
13
Symbolic Side-Channel Analysis for Probabilistic Programs
15
Bricklayer Attack: A Side-Channel Analysis on the ChaCha Quarter Round
24
When Theory Meets Practice: A Framework for Robust Profiled Side-channel Analysis
30
Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study
14
Side Channel Analysis for Detecting Protocol Tunneling
14
Photonic Side Channel Analysis of Arbiter PUFs
24
Static Power Side-Channel Analysis - An Investigation of Measurement Factors
14
One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-like Block Ciphers
8
Combined Attacks on the AES Key Schedule
15
SURVEY OF SIDE CHANNEL ATTACKS ON ECC
14
Remote Inter-Chip Power Analysis Side-Channel Attacks at Board-Level
7