150 papers found
Refreshing results…
SoK: Deep Learning-based Physical Side-channel Analysis
SoK: SCA-secure ECC in software – mission impossible?
It Started with Templates: The Future of Profiling in Side-Channel Analysis
Keep it Unsupervised: Horizontal Attacks Meet Deep Learning
PROOFS 2018 Editorial
Systematic Side-Channel Analysis of Curve25519 with Machine Learning
Breaking a fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves
A Compact and Scalable Hardware/Software Co-design of SIKE
Online Template Attack on ECDSA:
When Similarities Among Devices are Taken for Granted: Another Look at Portability
Friet: An Authenticated Encryption Scheme with Built-in Fault Detection
A Systematic Evaluation of Profiling Through Focused Feature Selection
Poster
Balancing elliptic curve coprocessors from bottom to top
One Trace Is All It Takes: Machine Learning-Based Side-Channel Attack on EdDSA
In Hardware We Trust
Optimizing Electromagnetic Fault Injection with Genetic Algorithms
Location, Location, Location: Revisiting Modeling and Exploitation for Location-Based Side Channel Leakages
Practical Evaluation of Protected Residue Number System Scalar Multiplication
Genetic Algorithm-Based Electromagnetic Fault Injection
Missing publications? Read more about our data sources.