|
[1]
|
Kocher, P., Jaffe, J. and Jun, B. (1999) Differential Power Analysis. In: Wiener, M., Ed., Advances in Cryptolo-gy—CRYPTO ’99. Lecture Notes in Computer Science, Vol. 1666, Springer, Berlin, 388-397. [Google Scholar] [CrossRef]
|
|
[2]
|
Chari, S., Rao, J.R. and Rohatgi, P. (2002) Template Attacks. In: Kaliski, B.S., Koç, Ç.K. and Paar, C., Eds., Cryptographic Hardware and Embedded Systems—CHES 2002. Lecture Notes in Computer Science, Vol. 2523, Springer, Berlin, 13-28. [Google Scholar] [CrossRef]
|
|
[3]
|
Hospodar, G., Gierlichs, B., De Mulder, E., Verbauwhede, I. and Vandewalle, J, (2011) Machine Learning in Side-Channel Analysis: A First Study. Journal of Cryptographic Engineer-ing, 1, Article No. 293. [Google Scholar] [CrossRef]
|
|
[4]
|
Lerman, L., Poussier, R., Bontempi, G., Markowitch, O. and Standaert, F.-X. (2015) Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis). In: Mangard, S. and Poschmann, A., Eds., Constructive Side-Channel Analysis and Secure De-sign, Lecture Notes in Computer Science, Vol. 9064, Springer, Cham, 20-33. [Google Scholar] [CrossRef]
|
|
[5]
|
Maghrebi, H., Portigliatti, T. and Prouff, E. (2016) Breaking Cryptographic Implementations Using Deep Learning Techniques. In: Carlet, C., Hasan, M. and Saraswat, V., Eds., Security, Privacy, and Applied Cryptography Engineering. Lecture Notes in Computer Science, Vol. 10076, Springer, Cham, 3-26. [Google Scholar] [CrossRef]
|
|
[6]
|
Benadjila, R., Prouff, E., Strullu, R., Cagli, E. and Dumas, C. (2020) Deep Learning for Side-Channel Analysis and Introduction to ASCAD Database. Journal of Cryptographic En-gineering, 10, 163-188. [Google Scholar] [CrossRef]
|
|
[7]
|
Benesty, J., Chen, J., Huang, Y. and Cohen, I. (2009) Pearson Correlation Coefficient. In: Noise Reduction in Speech Processing, Springer, Berlin, 1-4. [Google Scholar] [CrossRef]
|
|
[8]
|
Batina, L., Hogenboom, J. and Van Woudenberg, J.G. (2012) Getting More from PCA: First Results of Using Principal Component Analysis for Extensive Power Analysis. In: Dunkelman, O., Ed., Topics in Cryptology—CT-RSA 2012. Lecture Notes in Computer Science, Vol. 7178, Springer, Berlin, 383-397. [Google Scholar] [CrossRef]
|
|
[9]
|
Bhasin, S., Danger, J.-L., Guilley, S. and Najm, Z. (2014) NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage. 2014 International Symposium on Electromagnetic Compatibility, Tokyo, 12-16 May 2014, 310-313.
|
|
[10]
|
Mannor, S., Peleg, D. and Rubinstein, R. (2005) The Cross Entropy Method for Classification. Proceedings of the 22nd International Conference on Machine Learning, Bonn, 7-11 August 2005, 561-568. [Google Scholar] [CrossRef]
|
|
[11]
|
Martinasek, Z., Dzurenda, P. and Malina, L. (2016) Profiling Power Analysis Attack Based on MLP in DPA Contest V4.2. 2016 39th International Conference on Telecommunications and Signal Processing (TSP), Vienna, 27-29 June 2016, 223-226. [Google Scholar] [CrossRef]
|
|
[12]
|
Zaid, G., Bossuet, L., Habrard, A. and Venelli, A. (2021) Effi-ciency through Diversity in Ensemble Models Applied to Side-Channel Attacks: A Case Study on Public-Key Algo-rithms. ACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, 60-96. [Google Scholar] [CrossRef]
|
|
[13]
|
Wolpert, D.H. (1992) Stacked Generalization. Neural Networks, 5, 241-259. [Google Scholar] [CrossRef]
|
|
[14]
|
Baćak, V. and Kennedy, E.H. (2019) Principled Machine Learning Using the Super Learner: An Application to Predicting Prison Violence. Sociological Methods & Research, 48, 698-721. [Google Scholar] [CrossRef]
|
|
[15]
|
Xu, M., Wu, L. and Zhang, X. (2017) Side Channel Attack on SM4 Algorithm with Ensemble Method. 2017 13th International Conference on Computational Intelligence and Security, Hong Kong, 15-18 December 2017, 529-532. [Google Scholar] [CrossRef]
|
|
[16]
|
黄洁, 王燚. 适用于侧信道分析的卷积神经网络结构的实验研究[J]. 成都信息工程学院学报, 2019, 34(5): 449-456.
|