2014
DOI: 10.1007/978-3-319-08302-5_5
|View full text |Cite
|
Sign up to set email alerts
|

A Machine Learning Approach Against a Masked AES

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 30 publications
(17 citation statements)
references
References 19 publications
0
17
0
Order By: Relevance
“…Lerman et al [47] presented a machine learning attack against a masking countermeasure, using the dataset of the DPA Contest v4. The method of power analysis based on a multi-layer perceptron was first presented in [48].…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Lerman et al [47] presented a machine learning attack against a masking countermeasure, using the dataset of the DPA Contest v4. The method of power analysis based on a multi-layer perceptron was first presented in [48].…”
Section: Related Workmentioning
confidence: 99%
“…ML approaches have not been compared yet. The work [47] can be mentioned as an exception, where SVM and RF are compared with the TA and the SA. In this article, we try to make an extensive comparison of machine learning algorithms in PA. We focus only on the usage of the individual ML algorithms in profiling attacks where ML techniques are used for a model creation of the target device.…”
Section: Contributionmentioning
confidence: 99%
See 2 more Smart Citations
“…More precisely, the authors assumed that the side channel leakage information could split interesting points into a strict order. Lerman et al [27] presented the attack based on machine learning algorithm against the masked AES implementation. The results declared that SVM required 26 power traces to recover the key and had smaller computational complexity than TA.…”
Section: Introductionmentioning
confidence: 99%