Attributes | Values |
---|
rdf:type
| |
Description
| - In recent years, the cryptographic community has explored new approaches of power analysis based on machine learning models such as Support Vector Machine (SVM), Multi-Layer Perceptron (MLP) or Random Forest (RF). Realized experiments proved that the method based on MLP can provide almost 100\% success rate after optimization. Nevertheless, this description of results is based on the first order success rate that is not enough satisfactory because this value can be deceiving. Moreover, the power analysis method based on MLP has not been compared with other well-known approaches such as template attacks or stochastic attacks yet. In this paper, we introduce the first fair comparison of power analysis attacks based on MLP and templates. The comparison is accomplished by using the identical data set and number of interesting points in power traces. We follow the unified framework for implemented side-channel attacks therefore we use guessing entropy as a metric of comparison.
- In recent years, the cryptographic community has explored new approaches of power analysis based on machine learning models such as Support Vector Machine (SVM), Multi-Layer Perceptron (MLP) or Random Forest (RF). Realized experiments proved that the method based on MLP can provide almost 100\% success rate after optimization. Nevertheless, this description of results is based on the first order success rate that is not enough satisfactory because this value can be deceiving. Moreover, the power analysis method based on MLP has not been compared with other well-known approaches such as template attacks or stochastic attacks yet. In this paper, we introduce the first fair comparison of power analysis attacks based on MLP and templates. The comparison is accomplished by using the identical data set and number of interesting points in power traces. We follow the unified framework for implemented side-channel attacks therefore we use guessing entropy as a metric of comparison. (en)
|
Title
| - Comparison of Profiling Power Analysis Attacks Using Templates and Multi-Layer Perceptron Network
- Comparison of Profiling Power Analysis Attacks Using Templates and Multi-Layer Perceptron Network (en)
|
skos:prefLabel
| - Comparison of Profiling Power Analysis Attacks Using Templates and Multi-Layer Perceptron Network
- Comparison of Profiling Power Analysis Attacks Using Templates and Multi-Layer Perceptron Network (en)
|
skos:notation
| - RIV/00216305:26220/14:PU111090!RIV15-MSM-26220___
|
http://linked.open...avai/riv/aktivita
| |
http://linked.open...avai/riv/aktivity
| |
http://linked.open...vai/riv/dodaniDat
| |
http://linked.open...aciTvurceVysledku
| |
http://linked.open.../riv/druhVysledku
| |
http://linked.open...iv/duvernostUdaju
| |
http://linked.open...titaPredkladatele
| |
http://linked.open...dnocenehoVysledku
| |
http://linked.open...ai/riv/idVysledku
| - RIV/00216305:26220/14:PU111090
|
http://linked.open...riv/jazykVysledku
| |
http://linked.open.../riv/klicovaSlova
| - Power Analysis, Neural Network, Template Attack, Comparison. (en)
|
http://linked.open.../riv/klicoveSlovo
| |
http://linked.open...ontrolniKodProRIV
| |
http://linked.open...v/mistoKonaniAkce
| |
http://linked.open...i/riv/mistoVydani
| |
http://linked.open...i/riv/nazevZdroje
| - Proceedings of the 1st International Conference on Mathematical Methods & Computational Techniques in Science & Engineering
|
http://linked.open...in/vavai/riv/obor
| |
http://linked.open...ichTvurcuVysledku
| |
http://linked.open...cetTvurcuVysledku
| |
http://linked.open...UplatneniVysledku
| |
http://linked.open...iv/tvurceVysledku
| - Malina, Lukáš
- Martinásek, Zdeněk
|
http://linked.open...vavai/riv/typAkce
| |
http://linked.open.../riv/zahajeniAkce
| |
number of pages
| |
http://purl.org/ne...btex#hasPublisher
| |
https://schema.org/isbn
| |
http://localhost/t...ganizacniJednotka
| |