Author:
Zeng Lu,Yan LongDe,Wan Fei,Yang Ning,Li Xiang,Chen Aidong,Zhang JianCheng,Zhang YanLong,Wang Shuo,Zhou Jing
Reference20 articles.
1. Leakage certification revisited: Bounding model errors in side-channel security evaluations;Eric Brier;Advances in Cryptology-CRYPTO 2019: 39th Annual International Cryptology Conference,2004
2. Simple baselines for image restoration;Liangyu Chen;European conference on computer vision,2022
3. Convolutional neural networks with data augmentation against jitter-based countermeasures: Profiling attacks without pre-processing;Eleonora Cagli;Cryptographic Hardware and Embedded Systems-CHES 2017: 19th International Conference,2017
4. Efficient side-channel attack through balanced labels compression and variational autoencoder;Suresh Chari;Cryptographic hardware and embedded systems-CHES 2002: 4th International Workshop Redwood Shores,2002
5. Waveform data augmentation using conditional vae for deep learning side-channel attacks against aes circuit;Yuta Fukuda;Journal of Signal Processing,2022