搜索结果: 1-15 共查到“军事学 Deep Learning,”相关记录22条 . 查询时间(0.328 秒)
Deep Learning Model Generalization in Side-Channel Analysis
Side-Channel Analysis Deep Learning Model Generalization
font style='font-size:12px;'>
2019/8/30
The adoption of deep neural networks for profiled side-channel attacks provides different capabilities for leakage detection of secure products. Research papers provide a variety of arguments with res...
X-DeepSCA: Cross-Device Deep Learning Side Channel Attack
Side-channel Attacks Profiling attacks Cross-device Attack
font style='font-size:12px;'>
2019/7/17
This article, for the first time, demonstrates Cross-device Deep Learning Side-Channel Attack (X-DeepSCA), achieving an accuracy of >99.9%>99.9%, even in presence of significantly higher inter-device ...
How Diversity Affects Deep-Learning Side-Channel Attacks
Side-channel attack power analysis deep learning
font style='font-size:12px;'>
2019/6/6
Deep learning side-channel attacks are an emerging threat to the security of implementations of cryptographic algorithms. The attacker first trains a model on a large set of side-channel traces captur...
Simulating Homomorphic Evaluation of Deep Learning Predictions
neural networks homomorphic encryption TFHE
font style='font-size:12px;'>
2019/5/31
Convolutional neural networks (CNNs) is a category of deep neural networks that are primarily used for classifying image data. Yet, their continuous gain in popularity poses important privacy concerns...
Deep Learning based Side Channel Attacks in Practice
Deep Learning based Side-Channel Attacks Data Dimensionality Data Scaling
font style='font-size:12px;'>
2019/5/29
A recent line of research has investigated a new profiling technique based on deep learning as an alternative to the well-known template attack. The advantage of this new profiling approach is twofold...
Deep Learning based Model Building Attacks on Arbiter PUF Compositions
physically unclonable function machine learning deep learning
font style='font-size:12px;'>
2019/5/28
Robustness to modeling attacks is an important requirement for PUF circuits. Several reported Arbiter PUF com- positions have resisted modeling attacks. and often require huge computational resources ...
DL-LA: Deep Learning Leakage Assessment: A modern roadmap for SCA evaluations
side channel leakage assessment deep learning
font style='font-size:12px;'>
2019/5/21
In recent years, deep learning has become an attractive ingredient to side-channel analysis (SCA) due to its potential to improve the success probability or enhance the performance of certain frequent...
A Comprehensive Study of Deep Learning for Side-Channel Analysis
Side Channel Analysis Profiling Attacks Machine Learning
font style='font-size:12px;'>
2019/5/5
In Side Channel Analysis, masking is known to be a reliable and robust counter-measure. Recently, several papers have focused on the application of the Deep Learning (DL) theory to improve the efficie...
nGraph-HE: A Graph Compiler for Deep Learning on Homomorphically Encrypted Data
Homomorphic encryption intermediate representation deep learning
font style='font-size:12px;'>
2019/4/3
Homomorphic encryption (HE)---the ability to perform computation on encrypted data---is an attractive remedy to increasing concerns about data privacy in deep learning (DL). However, building DL model...
Deep Learning to Evaluate Secure RSA Implementations
Side-Channel Attacks RSA Deep Learning
font style='font-size:12px;'>
2019/1/26
This paper presents the results of several successful profiled side-channel attacks against a secure implementation of the RSA algorithm. The implementation was running on a ARM Core SC 100 completed ...
Improving Attacks on Speck32/64 using Deep Learning
Speck and Deep Learning Cryptanalysis
font style='font-size:12px;'>
2019/1/18
This paper presents a very practical key recovery attack on Speck32/64 reduced to 11 rounds based on a novel type of differential distinguisher using machine learning. These distinguishers exceed dist...
Deep Learning vs Template Attacks in front of fundamental targets: experimental study
Side channel deep dearning template attack
font style='font-size:12px;'>
2018/12/24
This study compares the experimental results of Template Attacks (TA) and Deep Learning (DL) techniques called Multi Layer Perceptron (MLP) and Convolutional Neural Network (CNN), concurrently in fron...
Spread: a new layer for profiled deep-learning side-channel attacks
Deep-learning Side-channel attacks Spread layer
font style='font-size:12px;'>
2018/11/13
Recent publications, such as [10] and [13], exploit the advantages of deep-learning techniques in performing Side-Channel Attacks. One example of the Side-Channel community interest for such technique...
Chimera: a unified framework for B/FV, TFHE and HEAAN fully homomorphic encryption and predictions for deep learning
fully homomorphic encryption Ring-LWE neural network
font style='font-size:12px;'>
2018/8/21
This work describes a common framework for scale-invariant families of fully homomorphic schemes based on Ring-LWE, unifying the plaintext space and the noise representation. This new formalization al...
DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-based Incentive
deep learning blockchain privacy-preserving training
font style='font-size:12px;'>
2018/7/17
Deep learning technology has been evaluated to achieve the high-accuracy of state-of-the-art algorithms in a variety of AI tasks. Its popularity draws security researchers’ attention to the topic of p...