Recently, several studies have been published on the application of deep learning to enhance Side-Channel Attacks (SCA). These seminal works have practically validated the soundness of the approach, especially against implementations protected by masking or by jittering. Concurrently, important open issues have emerged. Among them, the relevance of machine (and thereby deep) learning based SCA has been questioned in several papers based on the lack of relation between the accuracy, a typical performance metric used in machine learning, and common SCA metrics like the Guessing entropy or the key-discrimination success rate. Also, the impact of the classical side-channel counter-measures on the efficiency of deep learning has been questioned,...
International audienceThe use of deep learning techniques to perform side-channel analysis attracted...
International audienceThe use of deep learning techniques to perform side-channel analysis attracted...
Side-channel attacks (SCA) aim to extract a secret cryptographic key from a device, based on uninten...
Recently, several studies have been published on the application of deep learning to enhance Side-Ch...
Recently, several studies have been published on the application of deep learning to enhance Side-Ch...
International audienceRecently, several studies have been published on the application of deep learn...
International audienceRecently, several studies have been published on the application of deep learn...
International audienceRecently, several studies have been published on the application of deep learn...
International audienceThe use of deep learning techniques to perform side-channel analysis attracted...
International audienceThe use of deep learning techniques to perform side-channel analysis attracted...
International audienceThe use of deep learning techniques to perform side-channel analysis attracted...
International audienceThe use of deep learning techniques to perform side-channel analysis attracted...
International audienceThe use of deep learning techniques to perform side-channel analysis attracted...
International audienceThe use of deep learning techniques to perform side-channel analysis attracted...
International audienceThe use of deep learning techniques to perform side-channel analysis attracted...
International audienceThe use of deep learning techniques to perform side-channel analysis attracted...
International audienceThe use of deep learning techniques to perform side-channel analysis attracted...
Side-channel attacks (SCA) aim to extract a secret cryptographic key from a device, based on uninten...
Recently, several studies have been published on the application of deep learning to enhance Side-Ch...
Recently, several studies have been published on the application of deep learning to enhance Side-Ch...
International audienceRecently, several studies have been published on the application of deep learn...
International audienceRecently, several studies have been published on the application of deep learn...
International audienceRecently, several studies have been published on the application of deep learn...
International audienceThe use of deep learning techniques to perform side-channel analysis attracted...
International audienceThe use of deep learning techniques to perform side-channel analysis attracted...
International audienceThe use of deep learning techniques to perform side-channel analysis attracted...
International audienceThe use of deep learning techniques to perform side-channel analysis attracted...
International audienceThe use of deep learning techniques to perform side-channel analysis attracted...
International audienceThe use of deep learning techniques to perform side-channel analysis attracted...
International audienceThe use of deep learning techniques to perform side-channel analysis attracted...
International audienceThe use of deep learning techniques to perform side-channel analysis attracted...
International audienceThe use of deep learning techniques to perform side-channel analysis attracted...
Side-channel attacks (SCA) aim to extract a secret cryptographic key from a device, based on uninten...