【摘 要】
:
Power analysis methods are commonly used for evaluating the security of cryptographic devices. They are characteristically low-cost and display a high success r
【机 构】
:
School of Integrated Circuits,Tsinghua University,Beijing 100084,China;National Research Center for
论文部分内容阅读
Power analysis methods are commonly used for evaluating the security of cryptographic devices. They are characteristically low-cost and display a high success rate and the ability to obtain important device information, e.g., keys. Given the current wide application of deep-learning technology, there is a growing tendency to incorporate power-analysis technology in development. This study investigates non-profiled deep-learning-based power analysis. The labels used in this attack are uncertain, and the attack conditions required are greatly reduced. We choose the Recurrent neural network (RNN), multilayer perceptron, and convolutional neural network algorithms, which use the same network structure, to recover the keys for the SM4 software and DES hardware implementations. We propose combining the RNN algorithm with power analysis, and validate the benefits experimentally. The experimental results show that they all successfully recover the correct key for the SM4 software implementation, although the RNN algorithm by itself achieves a better effect. This conclusion also applies to attacks on the DES hardware implementation but is limited to labels based on the bit model.
其他文献
In this paper, we propose a fully automatic mesh segmentation method, which divides meshes into sub-meshes recursively through spectral analysis. A common problem in the spectral analysis of geometric
In this paper, based on a result of Lidl and Mullen (Mathematical Journal of Okayama University, 1991), the maximum length and the second maximum length that ca
An algorithm for output spectrum analysis of nonlinear system with correlative sources is proposed. First, the output terms of nonlinear system are analyzed bas
Automated human facial image deidentification is a much-needed technology for privacypreserving social media and intelligent surveillance applications. We propose a novel utility preserved facial imag
Service-based architecture (SBA) is a profound advancement in the novel 5G Core network (5GC). Existing studies show that SBA can benefit from cloud computing t
Network on a chip (NoC) uses packet-switched network to implement interconnections in System on chip (SoC). In SoC design, performance and energy efficiency are
Inspired by the self-similar fractal proper-ties of chaotic attractors and the heuristics of similarity filtering of images, a novel chaotic signal denoising al
In order to reduce the volume, weight and cost of conventional hybrid energy storage system (HESS) while properly exploring the complementary features of differ
Automatic identification of intracranial electroencephalogram (iEEG) signals has become more and more important in the field of medical diagnostics. In this pap
Electric drive system with Insulated gate bipolar transistor (IGBT) power device is widely used in Electric vehicle (EV), which consists of inverter, cables and