k-Nearest Neighbors Algorithm in Profiling Power Analysis Attacks
Power analysis presents the typical example of successful attacks against trusted cryptographic devices such as RFID (Radio-Frequency IDentifications) and contact smart cards. In recent years, the cryptographic community has explored new approaches in power analysis based on machine learning models...
Main Authors: | Z. Martinasek, V. Zeman, L. Malina, J. Martinasek |
---|---|
Format: | Article |
Language: | English |
Published: |
Spolecnost pro radioelektronicke inzenyrstvi
2016-06-01
|
Series: | Radioengineering |
Subjects: | |
Online Access: | http://www.radioeng.cz/fulltexts/2016/16_02_0365_0382.pdf |
Similar Items
-
Innovative Method of the Power Analysis
by: Z. Martinasek, et al.
Published: (2013-06-01) -
Side-Channel Attack on a Protected RFID Card
by: Rixin Xu, et al.
Published: (2018-01-01) -
ASK: Adversarial Soft k-Nearest Neighbor Attack and Defense
by: Ren Wang, et al.
Published: (2022-01-01) -
Low Trace-Count Template Attacks on 32-bit Implementations of ASCON AEAD
by: Shih-Chun You, et al.
Published: (2023-08-01) -
Key Schedule against Template Attack-Based Simple Power Analysis on a Single Target
by: Yoo-Seung Won, et al.
Published: (2020-05-01)