![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Increasing Side-Channel Resistance by Netlist Randomization and FPGA-Based Reconfiguration
Modern FPGAs are equipped with the possibility of Partial Reconfiguration (PR) which along with other benefits can be used to enhance the security of cryptographic implementations. This feature requires develo...
-
Chapter and Conference Paper
Moving Target and Implementation Diversity Based Countermeasures Against Side-Channel Attacks
Side-channel attacks (SCAs) are among the major threats to embedded systems’ security, where implementation characteristics of cryptographic algorithms are exploited to extract secret parameters. The most comm...
-
Article
Applications of machine learning techniques in side-channel attacks: a survey
With increasing expansion of the Internet of Things, embedded devices equipped with cryptographic modules become an important factor to protect sensitive data. Even though the employed algorithms in such devic...
-
Chapter and Conference Paper
Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery
Deep Neural Networks (DNNs) have recently received significant attention in the side-channel community due to their state-of-the-art performance in security testing of embedded systems. However, research on t...
-
Chapter and Conference Paper
Profiled Power Analysis Attacks Using Convolutional Neural Networks with Domain Knowledge
Evaluation of cryptographic implementations against profiled side-channel attacks plays a fundamental role in security testing nowadays. Recently, deep neural networks and especially Convolutional Neural Netwo...