When Similarities Among Devices are Taken for Granted: Another Look at Portability
From MaRDI portal
Publication:5048981
DOI10.1007/978-3-030-51938-4_17OpenAlexW3038548671MaRDI QIDQ5048981
Lejla Batina, Igor Armendariz, Unai Rioja
Publication date: 9 November 2022
Published in: Progress in Cryptology - AFRICACRYPT 2020 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-51938-4_17
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Computer security (68M25)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms
- Breaking cryptographic implementations using deep learning techniques
- Template Attacks on Different Devices
- A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices
- Improving Differential Power Analysis by Elastic Alignment
- Dynamic programming algorithm optimization for spoken word recognition
- Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures
- Power Analysis Attacks
- Cryptographic Hardware and Embedded Systems - CHES 2004
- THE STATISTICAL UTILIZATION OF MULTIPLE MEASUREMENTS
- On the performance of convolutional neural networks for side-channel analysis
This page was built for publication: When Similarities Among Devices are Taken for Granted: Another Look at Portability