Skip to main content
Top

16-12-2023 | Research Article

Keep it unbiased: a comparison between estimation of distribution algorithms and deep learning for human interaction-free side-channel analysis

Authors: Unai Rioja, Lejla Batina, Igor Armendariz, Jose Luis Flores

Published in: Journal of Cryptographic Engineering

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Evaluating side-channel analysis (SCA) security is a complex process, involving applying several techniques whose success depends on human engineering. Therefore, it is crucial to avoid a false sense of confidence provided by non-optimal (failing) attacks. Different alternatives have emerged lately trying to mitigate human dependency, among which deep learning (DL) attacks are the most studied today. DL promise to simplify the procedure by e.g. evading the need for point of interest (POI) selection, among other shortcuts. However, including DL in the equation comes at a price, since working with neural networks is not straightforward in this context. Recently, an alternative has appeared with the potential to mitigate this dependence without adding extra complexity: estimation of distribution algorithm-based SCA. From the perspective of avoiding the need for POI selection, in this paper we provide a comparison of the two relevant methods. Our findings are supported by experimental results on various datasets.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Azouaoui, M., Bellizia, D., Buhan, I., Debande, N., Duval, S., Giraud, C., Jaulmes, E., Koeune, F., Oswald, E., Standaert, F.-X., Whitnall, C.: A systematic appraisal of side channel evaluation strategies. IACR Cryptol. ePrint Arch (2020) Azouaoui, M., Bellizia, D., Buhan, I., Debande, N., Duval, S., Giraud, C., Jaulmes, E., Koeune, F., Oswald, E., Standaert, F.-X., Whitnall, C.: A systematic appraisal of side channel evaluation strategies. IACR Cryptol. ePrint Arch (2020)
2.
go back to reference Balasch, J., Gierlichs, B., Grosso, V., Reparaz, O., Standaert, F.-X.: On the cost of lazy engineering for masked software implementations, Vol 8968, pp. 64–81. Joye, Marc, Springer (2014) Balasch, J., Gierlichs, B., Grosso, V., Reparaz, O., Standaert, F.-X.: On the cost of lazy engineering for masked software implementations, Vol 8968, pp. 64–81. Joye, Marc, Springer (2014)
3.
go back to reference Benadjila, Ryad, Prouff, Emmanuel, Strullu, Rémi., Cagli, Eleonora, Dumas, Cécile.: Deep learning for side-channel analysis and introduction to ASCAD database. J. Cryptogr. Eng. 10, 06 (2020)CrossRef Benadjila, Ryad, Prouff, Emmanuel, Strullu, Rémi., Cagli, Eleonora, Dumas, Cécile.: Deep learning for side-channel analysis and introduction to ASCAD database. J. Cryptogr. Eng. 10, 06 (2020)CrossRef
4.
go back to reference Bhasin, S., Chattopadhyay, A., Heuser, A., Jap, D., Picek, S., Shrivastwa, R.R.: Mind the portability: a warriors guide through realistic profiled side-channel analysis. In: NDSS Symposium (2020) Bhasin, S., Chattopadhyay, A., Heuser, A., Jap, D., Picek, S., Shrivastwa, R.R.: Mind the portability: a warriors guide through realistic profiled side-channel analysis. In: NDSS Symposium (2020)
5.
go back to reference Bronchain, Olivier, Standaert, François-Xavier.: Breaking masked implementations with many shares on 32-bit software platforms: or when the security order does not matter. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3), 202–234 (2021)CrossRef Bronchain, Olivier, Standaert, François-Xavier.: Breaking masked implementations with many shares on 32-bit software platforms: or when the security order does not matter. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3), 202–234 (2021)CrossRef
6.
go back to reference Cagli, E., Dumas, C., Prouff, E.: Convolutional neural networks with data augmentation against jitter-based countermeasures. In: Fischer, W., Homma, N. (eds.) CHES 2017, pp. 45–68, Springer (2017) Cagli, E., Dumas, C., Prouff, E.: Convolutional neural networks with data augmentation against jitter-based countermeasures. In: Fischer, W., Homma, N. (eds.) CHES 2017, pp. 45–68, Springer (2017)
7.
go back to reference Cao, Pei, Zhang, Chi, Xiangjun, Lu., Dawu, Gu.: Cross-device profiled side-channel attack with unsupervised domain adaptation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021, 27–56 (2021)CrossRef Cao, Pei, Zhang, Chi, Xiangjun, Lu., Dawu, Gu.: Cross-device profiled side-channel attack with unsupervised domain adaptation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021, 27–56 (2021)CrossRef
8.
go back to reference Carbone, Mathieu, Conin, Vincent, Cornélie, Marie-Angela., Dassance, François, Dufresne, Guillaume, Dumas, Cécile., Prouff, Emmanuel, Venelli, Alexandre: Deep learning to evaluate secure RSA implementations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(2), 132–161 (2019)CrossRef Carbone, Mathieu, Conin, Vincent, Cornélie, Marie-Angela., Dassance, François, Dufresne, Guillaume, Dumas, Cécile., Prouff, Emmanuel, Venelli, Alexandre: Deep learning to evaluate secure RSA implementations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(2), 132–161 (2019)CrossRef
9.
go back to reference Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Cryptographic hardware and embedded systems—CHES 2002, pp. 13–28. Springer (2002) Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Cryptographic hardware and embedded systems—CHES 2002, pp. 13–28. Springer (2002)
10.
go back to reference Chen, Z., Haider, S., Schaumont, P.: Side-channel leakage in masked circuits caused by higher-order circuit effects. In: Park, J. H., Chen, H.-H., Atiquzzaman, M., Lee, C., Kim, T., Yeo, S.-S. (eds.), Advances in information security and assurance, pp. 327–336, Berlin, Heidelberg (2009) Chen, Z., Haider, S., Schaumont, P.: Side-channel leakage in masked circuits caused by higher-order circuit effects. In: Park, J. H., Chen, H.-H., Atiquzzaman, M., Lee, C., Kim, T., Yeo, S.-S. (eds.), Advances in information security and assurance, pp. 327–336, Berlin, Heidelberg (2009)
11.
go back to reference Choudary, M.O., Kuhn, M.G.: Efficient, portable template attacks. IEEE Trans. Inf. Forensics Secur. 13(2), 490–501 (2018)CrossRef Choudary, M.O., Kuhn, M.G.: Efficient, portable template attacks. IEEE Trans. Inf. Forensics Secur. 13(2), 490–501 (2018)CrossRef
12.
go back to reference Choudary, O., Kuhn, M.G.: Template attacks on different devices. In: Constructive side-channel analysis and secure design, COSADE, pp. 179–198. Springer (2014) Choudary, O., Kuhn, M.G.: Template attacks on different devices. In: Constructive side-channel analysis and secure design, COSADE, pp. 179–198. Springer (2014)
13.
go back to reference Danial, J., Das, D., Golder, A., Ghosh, S., Raychowdhury, A., Sen, S.: EM-X-DL: efficient cross-device deep learning side-channel attack with noisy EM signatures. CoRR. arXiv:2011.06139 (2020) Danial, J., Das, D., Golder, A., Ghosh, S., Raychowdhury, A., Sen, S.: EM-X-DL: efficient cross-device deep learning side-channel attack with noisy EM signatures. CoRR. arXiv:​2011.​06139 (2020)
14.
go back to reference Das, D., Golder, A., Danial, J., Ghosh, S.K., Raychowdhury, A., Sen, S.: X-deepsca: Cross-device deep learning side channel attack*. In: 2019 56th ACM/IEEE Design Automation Conference (DAC), pp 1–6 (2019) Das, D., Golder, A., Danial, J., Ghosh, S.K., Raychowdhury, A., Sen, S.: X-deepsca: Cross-device deep learning side channel attack*. In: 2019 56th ACM/IEEE Design Automation Conference (DAC), pp 1–6 (2019)
15.
go back to reference Elaabid, Sylvain, Abdelazizand Guilley, M.: Portability of templates. J. Cryptogr. Eng. 2(1), 63–74 (2012)CrossRef Elaabid, Sylvain, Abdelazizand Guilley, M.: Portability of templates. J. Cryptogr. Eng. 2(1), 63–74 (2012)CrossRef
18.
go back to reference Gilmore, R., Hanley, N., O’Neill, M.: Neural network based attack on a masked implementation of AES. In: Proceedings of the 2015 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2015, pp. 106–111 (2015) Gilmore, R., Hanley, N., O’Neill, M.: Neural network based attack on a masked implementation of AES. In: Proceedings of the 2015 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2015, pp. 106–111 (2015)
19.
go back to reference Gohr, A., Jacob, S., Schindler, W.: CHES 2018 side channel contest CTF–solution of the AES challenges. IACR Cryptol. ePrint Arch (2019) Gohr, A., Jacob, S., Schindler, W.: CHES 2018 side channel contest CTF–solution of the AES challenges. IACR Cryptol. ePrint Arch (2019)
20.
go back to reference Golder, Anupam, Das, Debayan, Danial, Josef, Ghosh, Santosh, Sen, Shreyas, Raychowdhury, Arijit: Practical approaches toward deep-learning-based cross-device power side-channel attack. IEEE Trans. Very Large Scale Integr. VLSI Syst. 27(12), 2720–2733 (2019)CrossRef Golder, Anupam, Das, Debayan, Danial, Josef, Ghosh, Santosh, Sen, Shreyas, Raychowdhury, Arijit: Practical approaches toward deep-learning-based cross-device power side-channel attack. IEEE Trans. Very Large Scale Integr. VLSI Syst. 27(12), 2720–2733 (2019)CrossRef
21.
go back to reference Kim, Jaehun, Picek, Stjepan, Heuser, Annelie, Bhasin, Shivam, Hanjalic, Alan: Make some noise unleashing the power of convolutional neural networks for profiled side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(3), 148–179 (2019)CrossRef Kim, Jaehun, Picek, Stjepan, Heuser, Annelie, Bhasin, Shivam, Hanjalic, Alan: Make some noise unleashing the power of convolutional neural networks for profiled side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(3), 148–179 (2019)CrossRef
22.
go back to reference Kim, Taewon, Kim, Kwonyoup, Kim, Tae Hyun, Ryu, Sangryeol: AES wireless keyboard: Template attack for eavesdropping. In: Black Hat Asia, Singapore (2018) Kim, Taewon, Kim, Kwonyoup, Kim, Tae Hyun, Ryu, Sangryeol: AES wireless keyboard: Template attack for eavesdropping. In: Black Hat Asia, Singapore (2018)
23.
go back to reference Lerman, Liran, Poussier, Romain, Markowitch, Olivier, Standaert, François-Xavier.: Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version. J. Cryptogr. Eng. 8, 11 (2018) Lerman, Liran, Poussier, Romain, Markowitch, Olivier, Standaert, François-Xavier.: Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version. J. Cryptogr. Eng. 8, 11 (2018)
24.
go back to reference Maghrebi, Houssem: Deep learning based side-channel attack: a new profiling methodology based on multi-label classification. IACR Cryptol. ePrint Arch (2020) Maghrebi, Houssem: Deep learning based side-channel attack: a new profiling methodology based on multi-label classification. IACR Cryptol. ePrint Arch (2020)
25.
go back to reference Maghrebi, H., Portigliatti, T., Prouff, E.: Breaking cryptographic implementations using deep learning techniques. In: SPACE 2016 (2016) Maghrebi, H., Portigliatti, T., Prouff, E.: Breaking cryptographic implementations using deep learning techniques. In: SPACE 2016 (2016)
26.
go back to reference Mangard, S., Popp, T., Gammel, B.M.: Side-channel leakage of masked CMOS gates. In: Menezes, A. (ed.), Topics in Cryptology—CT-RSA 2005, pp. 351–365, Springer, Berlin (2005) Mangard, S., Popp, T., Gammel, B.M.: Side-channel leakage of masked CMOS gates. In: Menezes, A. (ed.), Topics in Cryptology—CT-RSA 2005, pp. 351–365, Springer, Berlin (2005)
27.
go back to reference Martinasek, Z., Malina, L.: Comparison of profiling power analysis attacks using templates and multi-layer perceptron network (2014) Martinasek, Z., Malina, L.: Comparison of profiling power analysis attacks using templates and multi-layer perceptron network (2014)
28.
go back to reference Oswald, E., Mangard, S.: Template attacks on masking-resistance is futile. In: CT-RSA 2007: Topics in Cryptology, vol. 4377, pp. 243–256 (2007) Oswald, E., Mangard, S.: Template attacks on masking-resistance is futile. In: CT-RSA 2007: Topics in Cryptology, vol. 4377, pp. 243–256 (2007)
29.
go back to reference Paguada, Servio, Batina, Lejla, Armendariz, Igor: Toward practical autoencoder-based side-channel analysis evaluations. Comput. Netw. 196, 108230 (2021)CrossRef Paguada, Servio, Batina, Lejla, Armendariz, Igor: Toward practical autoencoder-based side-channel analysis evaluations. Comput. Netw. 196, 108230 (2021)CrossRef
30.
go back to reference Paguada, S., Rioja, U., Armendariz, I.: Controlling the deep learning-based side-channel analysis: a way to leverage from heuristics. In: ACNS Workshops (2020) Paguada, S., Rioja, U., Armendariz, I.: Controlling the deep learning-based side-channel analysis: a way to leverage from heuristics. In: ACNS Workshops (2020)
31.
go back to reference Perin, Guilherme, Chmielewski, Lukasz, Picek, Stjepan: Strength in numbers: improving generalization with ensembles in machine learning-based profiled side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(4), 337–364 (2020)CrossRef Perin, Guilherme, Chmielewski, Lukasz, Picek, Stjepan: Strength in numbers: improving generalization with ensembles in machine learning-based profiled side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(4), 337–364 (2020)CrossRef
32.
go back to reference Perin, G., Ege, B.: Lowering the bar: deep learning for side-channel analysis (whitepaper ). In: Proc. BlackHat, pp. 1–15 (2018) Perin, G., Ege, B.: Lowering the bar: deep learning for side-channel analysis (whitepaper ). In: Proc. BlackHat, pp. 1–15 (2018)
33.
go back to reference Perin, Guilherme, Lichao, Wu., Picek, Stjepan: Exploring feature selection scenarios for deep learning-based side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4), 828–861 (2022)CrossRef Perin, Guilherme, Lichao, Wu., Picek, Stjepan: Exploring feature selection scenarios for deep learning-based side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4), 828–861 (2022)CrossRef
34.
go back to reference Picek, S., Heuser, A., Jovic, A., Batina, L.: A systematic evaluation of profiling through focused feature selection. IEEE Trans. Very Large Scale Integr. (VLSI) Syst., pp. 1–14 (2019) Picek, S., Heuser, A., Jovic, A., Batina, L.: A systematic evaluation of profiling through focused feature selection. IEEE Trans. Very Large Scale Integr. (VLSI) Syst., pp. 1–14 (2019)
35.
go back to reference Picek, S., Samiotis, I. P., Kim, J., Heuser, A., Bhasin, S., Legay, A.: On the performance of convolutional neural networks for side-channel analysis. In: Chattopadhyay, A., Rebeiro, C., Yarom, Y. (eds.) Security, Privacy, and Applied Cryptography Engineering, pp. 157–176, Springer, Cham (2018) Picek, S., Samiotis, I. P., Kim, J., Heuser, A., Bhasin, S., Legay, A.: On the performance of convolutional neural networks for side-channel analysis. In: Chattopadhyay, A., Rebeiro, C., Yarom, Y. (eds.) Security, Privacy, and Applied Cryptography Engineering, pp. 157–176, Springer, Cham (2018)
36.
go back to reference Rechberger, C., Oswald, E.: Practical template attacks. In: Lim, C. H., Yung, M. (eds.) Information Security Applications, pp. 440–456, Springer, Berlin (2005) Rechberger, C., Oswald, E.: Practical template attacks. In: Lim, C. H., Yung, M. (eds.) Information Security Applications, pp. 440–456, Springer, Berlin (2005)
37.
go back to reference Renauld, M., Standaert, F.-X., Veyrat-Charvillon, N., Kamel, D., Flandre, D.: A formal study of power variability issues and side-channel attacks for nanoscale devices. In: Advances in Cryptology—EUROCRYPT 2011, pp. 109–128. Springer, Heidelberg (2011) Renauld, M., Standaert, F.-X., Veyrat-Charvillon, N., Kamel, D., Flandre, D.: A formal study of power variability issues and side-channel attacks for nanoscale devices. In: Advances in Cryptology—EUROCRYPT 2011, pp. 109–128. Springer, Heidelberg (2011)
38.
go back to reference Rijsdijk, Jorai, Lichao, Wu., Perin, Guilherme, Picek, Stjepan: Reinforcement learning for hyperparameter tuning in deep learning-based side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3), 677–707 (2021)CrossRef Rijsdijk, Jorai, Lichao, Wu., Perin, Guilherme, Picek, Stjepan: Reinforcement learning for hyperparameter tuning in deep learning-based side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3), 677–707 (2021)CrossRef
39.
go back to reference Rioja, U., Batina, L., Armendariz, I., Flores, J.L.: Towards human dependency elimination: AI approach to SCA robustness assessment. IEEE Trans. Inf. Forensics Secur. (2022) Rioja, U., Batina, L., Armendariz, I., Flores, J.L.: Towards human dependency elimination: AI approach to SCA robustness assessment. IEEE Trans. Inf. Forensics Secur. (2022)
40.
go back to reference Rioja, Unai, Batina, Lejla, Flores, Jose Luis, Armendariz, Igor: Auto-tune pois: estimation of distribution algorithms for efficient side-channel analysis. Comput. Netw. 198, 108405 (2021)CrossRef Rioja, Unai, Batina, Lejla, Flores, Jose Luis, Armendariz, Igor: Auto-tune pois: estimation of distribution algorithms for efficient side-channel analysis. Comput. Netw. 198, 108405 (2021)CrossRef
41.
go back to reference Shelton, M., Samwel, N., Batina, L., Regazzoni, F., Wagner, M., Yarom, Y.: Rosita: towards automatic elimination of power-analysis leakage in ciphers. In: NDSS Symposium (2021) Shelton, M., Samwel, N., Batina, L., Regazzoni, F., Wagner, M., Yarom, Y.: Rosita: towards automatic elimination of power-analysis leakage in ciphers. In: NDSS Symposium (2021)
42.
go back to reference Standaert, F.-X., Archambeau, C.: Using subspace-based template attacks to compare and combine power and electromagnetic information leakages. In: Oswald, E., Rohatgi, P. (eds.) Cryptographic Hardw Embed Syst—CHES 2008, pp. 411–425. Springer, Heidelberg (2008) Standaert, F.-X., Archambeau, C.: Using subspace-based template attacks to compare and combine power and electromagnetic information leakages. In: Oswald, E., Rohatgi, P. (eds.) Cryptographic Hardw Embed Syst—CHES 2008, pp. 411–425. Springer, Heidelberg (2008)
43.
go back to reference Thapar, D., Alam, M., Mukhopadhyay, D.: Deep learning assisted cross-family profiled side-channel attacks using transfer learning. In: 2021 22nd International Symposium on Quality Electronic Design (ISQED), pp. 178–185 (2021) Thapar, D., Alam, M., Mukhopadhyay, D.: Deep learning assisted cross-family profiled side-channel attacks using transfer learning. In: 2021 22nd International Symposium on Quality Electronic Design (ISQED), pp. 178–185 (2021)
44.
go back to reference Wouters, Lennert, Arribas, Victor, Gierlichs, Benedikt, Preneel, Bart: Revisiting a methodology for efficient CNN architectures in profiling attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3), 147–168 (2020)CrossRef Wouters, Lennert, Arribas, Victor, Gierlichs, Benedikt, Preneel, Bart: Revisiting a methodology for efficient CNN architectures in profiling attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3), 147–168 (2020)CrossRef
45.
go back to reference Wu, L., Perin, G., Picek, S.: I choose you: automated hyperparameter tuning for deep learning-based side-channel analysis. IACR Cryptol. ePrint Arch., p. 1293 (2020) Wu, L., Perin, G., Picek, S.: I choose you: automated hyperparameter tuning for deep learning-based side-channel analysis. IACR Cryptol. ePrint Arch., p. 1293 (2020)
46.
go back to reference Yang, S., Zhou, Y., Liu, J., Chen, D.: Back propagation neural network based leakage characterization for practical security analysis of cryptographic implementations, pp. 169–185 (2011) Yang, S., Zhou, Y., Liu, J., Chen, D.: Back propagation neural network based leakage characterization for practical security analysis of cryptographic implementations, pp. 169–185 (2011)
47.
go back to reference Yu, H., Shan, H., Panoff, M., Jin, Y.: Cross-device profiled side-channel attacks using meta-transfer learning. In: 2021 58th ACM/IEEE Design Automation Conference (DAC), pp. 703–708 (2021) Yu, H., Shan, H., Panoff, M., Jin, Y.: Cross-device profiled side-channel attacks using meta-transfer learning. In: 2021 58th ACM/IEEE Design Automation Conference (DAC), pp. 703–708 (2021)
48.
go back to reference Zaid, G., Bossuet, L., Habrard, A., Venelli, A.: Methodology for efficient CNN architectures in profiling attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst., Vol. 2020 (2019) Zaid, G., Bossuet, L., Habrard, A., Venelli, A.: Methodology for efficient CNN architectures in profiling attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst., Vol. 2020 (2019)
49.
go back to reference Zhou, Yuanyuan, Standaert, François-Xavier.: Deep learning mitigates but does not annihilate the need of aligned traces and a generalized ResNet model for side-channel attacks. J. Cryptogr. Eng. 10, 04 (2020)CrossRef Zhou, Yuanyuan, Standaert, François-Xavier.: Deep learning mitigates but does not annihilate the need of aligned traces and a generalized ResNet model for side-channel attacks. J. Cryptogr. Eng. 10, 04 (2020)CrossRef
50.
go back to reference Zotkin, Y., Olivier, F., Bourbao, E.: Deep learning vs template attacks in front of fundamental targets: experimental study. IACR Cryptol. ePrint Arch., pp. 1213 (2018) Zotkin, Y., Olivier, F., Bourbao, E.: Deep learning vs template attacks in front of fundamental targets: experimental study. IACR Cryptol. ePrint Arch., pp. 1213 (2018)
Metadata
Title
Keep it unbiased: a comparison between estimation of distribution algorithms and deep learning for human interaction-free side-channel analysis
Authors
Unai Rioja
Lejla Batina
Igor Armendariz
Jose Luis Flores
Publication date
16-12-2023
Publisher
Springer Berlin Heidelberg
Published in
Journal of Cryptographic Engineering
Print ISSN: 2190-8508
Electronic ISSN: 2190-8516
DOI
https://doi.org/10.1007/s13389-023-00342-0

Premium Partner