2021
DOI: 10.1109/tcad.2020.3038701
|View full text |Cite
|
Sign up to set email alerts
|

2Deep: Enhancing Side-Channel Attacks on Lattice-Based Key-Exchange via 2-D Deep Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 28 publications
0
5
0
Order By: Relevance
“…As ML model, we used a convolutional neural network (CNN) architecture which is similar to the work in [19,21]. Table 2 shows the details of network structures and parameters.…”
Section: Evaluation Results With Compilermentioning
confidence: 99%
“…As ML model, we used a convolutional neural network (CNN) architecture which is similar to the work in [19,21]. Table 2 shows the details of network structures and parameters.…”
Section: Evaluation Results With Compilermentioning
confidence: 99%
“…order to get a better understanding of the efficacy of machine learning methodologies and the ways in which a change in a setting might alter the performance of the SCA. By utilizing the tools of Singular Vector Canonical Correlation Analysis (SVCCA), Van der Valk et al made the first step towards the explainability of deep neural networks in SCA [17]. This was accomplished by explaining about learning of neural networks while being trained on a variety of sidechannel information-sets.…”
Section: International Journal Of Professional Studiesmentioning
confidence: 99%
“…As a result, the attacker can only use one power measurement to implement the SCA. 9,10 Block ciphers are common cryptographic primitives which not only create data confidentiality as well as provide the base for a plethora of extra cryptographic protocols and algorithms. 11 With the rise in usage of smart IoT (Internet of Things) gadgets and other limited in resources devices, lighter block ciphers have become more and more popular in recent years.…”
Section: Introductionmentioning
confidence: 99%
“…Yet, as PQKE protocols produce a unique secret key for every execution within the protocol, applying DPA with them is impractical. As a result, the attacker can only use one power measurement to implement the SCA 9,10 …”
Section: Introductionmentioning
confidence: 99%