13 Deep Learning Techniques for Side-Channel Analysis
1MS Student, CMU, USA
2Scientist SETS, India
3Executive Director, SETS, India
- CONTENTS
- 13.1 Introduction
- 13.2 Preliminaries
- 13.2.1 Framework for Implementation Vulnerability Analysis
- 13.3 Profiled Side-Channel Attacks
- 13.3.1 Deep Learning Architecture for Analysis
- 13.3.2 Convolutional Neural Networks
- 13.4 Protected Countermeasure Techniques
- 13.4.1 Unrolled Implementation
- 13.4.2 Threshold Implementation
- 13.5 Case Study of GIFT Cipher
- 13.5.1 GIFT Algorithm Description
- 13.5.2 Implementation Profiles
- 13.5.3 Round (Naive) Implementation
- 13.5.4 (Un)Rolled Implementation
- 13.5.5 Partially (Un)Rolled Implementation ...
Get VLSI and Hardware Implementations using Modern Machine Learning Methods now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.