Intels’22 2023
DOI: 10.3390/engproc2023033027
|View full text |Cite
|
Sign up to set email alerts
|

Application of Neural Networks to Power Analysis

Alla Levina,
Roman Bolozovskii

Abstract: This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https:// creativecommons.org/licenses/by/ 4.0/).

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 12 publications
0
0
0
Order By: Relevance
“…Without much surprise, vanilla ANNs were applied very early in all areas of cryptology, including side-channel attacks [43], random number generation [44], recovery of plaintext [45], generation of ciphertext without the key [46], cryptanalysis of symmetric ciphers [47][48][49], and hash and message authentication functions [50]. Attempts have also be made to implement ciphers as ANNs [51].…”
mentioning
confidence: 99%
“…Without much surprise, vanilla ANNs were applied very early in all areas of cryptology, including side-channel attacks [43], random number generation [44], recovery of plaintext [45], generation of ciphertext without the key [46], cryptanalysis of symmetric ciphers [47][48][49], and hash and message authentication functions [50]. Attempts have also be made to implement ciphers as ANNs [51].…”
mentioning
confidence: 99%