2018 7th Mediterranean Conference on Embedded Computing (MECO) 2018
DOI: 10.1109/meco.2018.8406034
|View full text |Cite
|
Sign up to set email alerts
|

Attacking AES implementations using correlation power analysis on ZYBO Zynq-7000 SoC board

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…The input as well as the output of the encoding layer c are designated by the letters A c and B c , respectively, along with the letters A C and B C for the corresponding decoding layer C. When back-propagating losses while training, the residual link between matching layers reduces the data loss. Equation (5) shows the link between the pertinent quantities:…”
Section: Deep Residual Capsule Autoencodermentioning
confidence: 99%
See 2 more Smart Citations
“…The input as well as the output of the encoding layer c are designated by the letters A c and B c , respectively, along with the letters A C and B C for the corresponding decoding layer C. When back-propagating losses while training, the residual link between matching layers reduces the data loss. Equation (5) shows the link between the pertinent quantities:…”
Section: Deep Residual Capsule Autoencodermentioning
confidence: 99%
“…Multiple traces on the same device are gathered with different sub-keys (a component within a cryptographic key) throughout the profiling stage and the model is created. [4][5][6] Lattice-based cryptographic works are efficiently used in both software and hardware environments. Using power-based SCAs, hackers try to figure out the hidden key through the relationship among the cryptographic device's battery usage and the computations that utilize the secret key.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Cryptography is used to secure any form of communication system [10]- [12] by scrambling the information so that only the intended recipient can access it. Cryptography uses two general schemes: hashing and encryption.…”
Section: Introductionmentioning
confidence: 99%