Review on hybrid deep learning models for enhancing encryption techniques against side channel attacks
During the years 2018-2024, considerable advancements have been achieved in the use of
deep learning for side channel attacks. The security of cryptographic algorithm …
deep learning for side channel attacks. The security of cryptographic algorithm …
Electrical-level attacks on CPUs, FPGAs, and GPUs: Survey and implications in the heterogeneous era
Given the need for efficient high-performance computing, computer architectures combining
central processing units (CPUs), graphics processing units (GPUs), and field-programmable …
central processing units (CPUs), graphics processing units (GPUs), and field-programmable …
Federated learning for privacy preservation of healthcare data from smartphone-based side-channel attacks
Federated learning (FL) has recently emerged as a striking framework for allowing machine
and deep learning models with thousands of participants to have distributed training to …
and deep learning models with thousands of participants to have distributed training to …
Far field EM side-channel attack on AES using deep learning
We present the first deep learning-based side-channel attack on AES-128 using far field
electromagnetic emissions as a side channel. Our neural networks are trained on traces …
electromagnetic emissions as a side channel. Our neural networks are trained on traces …
Deep learning side-channel attack against hardware implementations of AES
In the field of image recognition, machine learning technologies, especially deep learning,
have been rapidly advancing alongside the advances of hardware such as GPUs. In image …
have been rapidly advancing alongside the advances of hardware such as GPUs. In image …
Breaking masked and shuffled CCA secure Saber KEM by power analysis
In this paper, we show that a software implementation of CCA secure Saber KEM protected
by first-order masking and shuffling can be broken by deep learning-based power analysis …
by first-order masking and shuffling can be broken by deep learning-based power analysis …
Design and Implementation of Side Channel Attack Based on Deep Learning LSTM
Encryption algorithms and encryption devices both play a key role in ensuring the safety of
data that has been encrypted. Various types of attacks, such as energy analysis, can be …
data that has been encrypted. Various types of attacks, such as energy analysis, can be …
Multi-leak deep-learning side-channel analysis
F Hu, H Wang, J Wang - IEEE Access, 2022 - ieeexplore.ieee.org
Deep Learning Side-Channel Attacks (DLSCAs) have become a realistic threat to
implementations of cryptographic algorithms, such as Advanced Encryption Standard (AES) …
implementations of cryptographic algorithms, such as Advanced Encryption Standard (AES) …
Design of Lightweight Cryptography based Deep Learning Model for Side Channel Attacks
Depending on a device's encryption mechanism, a wide variety of tangible details could be
exposed. These leaks are used in side-channel analysis, which is used to get keys. Due to …
exposed. These leaks are used in side-channel analysis, which is used to get keys. Due to …
Advanced far field EM side-channel attack on AES
Several attacks on AES using far field electromagnetic (EM) emission as a side channel
have been recently presented. Unlike power analysis or near filed EM analysis, far field EM …
have been recently presented. Unlike power analysis or near filed EM analysis, far field EM …