2020
DOI: 10.1007/978-3-030-60939-9_20
|View full text |Cite
|
Sign up to set email alerts
|

S-NET: A Confusion Based Countermeasure Against Power Attacks for SBOX

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 18 publications
0
0
0
Order By: Relevance
“…In 2015, Zhang et al presented a new scheme to generate S-boxes based on neural network [5]. In 2020, in order to resist side channel attacks, Aljuffri et al [11] trained the neural network model S-NET, and used its output results to replace S-boxes to break the linear relationship between the hypothetical leakage and the real leakage of a cryptographic chip, the results applied to AES proved that it could resist common side channel cryptanalyses.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In 2015, Zhang et al presented a new scheme to generate S-boxes based on neural network [5]. In 2020, in order to resist side channel attacks, Aljuffri et al [11] trained the neural network model S-NET, and used its output results to replace S-boxes to break the linear relationship between the hypothetical leakage and the real leakage of a cryptographic chip, the results applied to AES proved that it could resist common side channel cryptanalyses.…”
Section: Related Workmentioning
confidence: 99%
“…2 (11) where x∼P data (x) is the distribution of the real data, DU is the differential uniformity function of an S-box, and f S is the function that converts the input data to an S-box.…”
Section: Generate S-box With the Wgp-im Modelmentioning
confidence: 99%