2021
DOI: 10.1007/978-3-030-81652-0_22
|View full text |Cite
|
Sign up to set email alerts
|

Subsampling and Knowledge Distillation on Adversarial Examples: New Techniques for Deep Learning Based Side Channel Evaluations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(12 citation statements)
references
References 9 publications
0
11
0
Order By: Relevance
“…The neural network architecture used in our deep learning approach was first introduced in [11] to break a protected AES implementation. In [11], the side-channel attack extracted the Hamming weights of all AES subkeys.…”
Section: Main Contributionsmentioning
confidence: 99%
See 4 more Smart Citations
“…The neural network architecture used in our deep learning approach was first introduced in [11] to break a protected AES implementation. In [11], the side-channel attack extracted the Hamming weights of all AES subkeys.…”
Section: Main Contributionsmentioning
confidence: 99%
“…The neural network architecture used in our deep learning approach was first introduced in [11] to break a protected AES implementation. In [11], the side-channel attack extracted the Hamming weights of all AES subkeys. Afterwards, a equation solving stage was used to perform a limited amount of error correction on the extracted Hamming weights while simultaneously deriving the full key values from the Hamming weight guesses.…”
Section: Main Contributionsmentioning
confidence: 99%
See 3 more Smart Citations