2017
DOI: 10.13164/re.2017.0890
|View full text |Cite
|
Sign up to set email alerts
|

Wavelet Support Vector Machine Algorithm in Power Analysis Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 26 publications
(24 citation statements)
references
References 42 publications
0
16
0
Order By: Relevance
“…The authors studied ML algorithms mostly using 9 or up to 16 classes. We successfully recovered the secret key by using SVM in [16]. These related contributions suggest that some ML algorithms are effective in PA attacks.…”
Section: Introductionmentioning
confidence: 81%
See 3 more Smart Citations
“…The authors studied ML algorithms mostly using 9 or up to 16 classes. We successfully recovered the secret key by using SVM in [16]. These related contributions suggest that some ML algorithms are effective in PA attacks.…”
Section: Introductionmentioning
confidence: 81%
“…The DPA Contest v4 (DPACv4) [24] provides 100,000 power traces of the masked AES software implementation. Since the mask value is known in [16], we can directly convert this dataset to an unprotected scenario. We selected 4000 (DS0) and 8000 (DS1) random power traces to make a fair comparison of all experiments.…”
Section: Methodologiesmentioning
confidence: 99%
See 2 more Smart Citations
“…Chose ( +1)mod8 (19) go to Line (8) (20) end if (21) end if there was one obvious peak in original DPA of DES algorithm for each Sbox. On the contrary, several peaks in our scheme with 5000 traces we found in Figure 5 were "ghost" peaks, which leads to wrong key corresponding to the target Sbox.…”
Section: Inputmentioning
confidence: 99%