Exploiting Support Vector Machine Algorithm to Break the Secret Key
Template attacks (TA) and support vector machine (SVM) are two effective methods in side channel attacks (SCAs). Almost all studies on SVM in SCAs assume the required power traces are sufficient, which also implies the number of profiling traces belonging to each class is equivalent. Indeed, in the...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Spolecnost pro radioelektronicke inzenyrstvi
2018-04-01
|
Series: | Radioengineering |
Subjects: | |
Online Access: | https://www.radioeng.cz/fulltexts/2018/18_01_0289_0298.pdf |