A Comparison of Weight Initializers in Deep Learning-Based Side-Channel Analysis

The usage of deep learning in profiled side-channel analysis requires a careful selection of neural network hyperparameters. In recent publications, different network architectures have been presented as efficient profiled methods against protected AES im

  • PDF / 40,864,335 Bytes
  • 592 Pages / 439.37 x 666.142 pts Page_size
  • 36 Downloads / 143 Views

DOWNLOAD

REPORT


Jianying Zhou · Mauro Conti · Chuadhry Mujeeb Ahmed · Man Ho Au · Lejla Batina · Zhou Li · Jingqiang Lin · Eleonora Losiouk · Bo Luo · Suryadipta Majumdar · Weizhi Meng · Martín Ochoa · Stjepan Picek · Georgios Portokalidis · Cong Wang · Kehuan Zhang (Eds.)

Applied Cryptography and Network Security Workshops ACNS 2020 Satellite Workshops AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA Rome, Italy, October 19–22, 2020, Proceedings

Lecture Notes in Computer Science Founding Editors Gerhard Goos Karlsruhe Institute of Technology, Karlsruhe, Germany Juris Hartmanis Cornell University, Ithaca, NY, USA

Editorial Board Members Elisa Bertino Purdue University, West Lafayette, IN, USA Wen Gao Peking University, Beijing, China Bernhard Steffen TU Dortmund University, Dortmund, Germany Gerhard Woeginger RWTH Aachen, Aachen, Germany Moti Yung Columbia University, New York, NY, USA

12418

More information about this series at http://www.springer.com/series/7410

Jianying Zhou Mauro Conti Chuadhry Mujeeb Ahmed Man Ho Au Lejla Batina Zhou Li Jingqiang Lin Eleonora Losiouk Bo Luo Suryadipta Majumdar Weizhi Meng Martín Ochoa Stjepan Picek Georgios Portokalidis Cong Wang Kehuan Zhang (Eds.) •





























Applied Cryptography and Network Security Workshops ACNS 2020 Satellite Workshops AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA Rome, Italy, October 19–22, 2020 Proceedings

123

Editors Jianying Zhou Singapore University of Technology and Design Singapore, Singapore Chuadhry Mujeeb Ahmed Singapore University of Technology and Design Singapore, Singapore Lejla Batina ICIS Radboud University Nijmegen Nijmegen, The Netherlands Jingqiang Lin University of Science and Technology of China Hefei, China Bo Luo University of Kansas Lawrence, KS, USA Weizhi Meng Technical University of Denmark Lyngby, Denmark Stjepan Picek Delft University of Technology Delft, The Netherlands Cong Wang City University of Hong Kong Hong Kong, China

Mauro Conti University of Padua Padua, Italy Man Ho Au The University of Hong Kong Hong Kong, Hong Kong Zhou Li University of California Irvine, CA, USA Eleonora Losiouk University of Padua Padua, Italy Suryadipta Majumdar CIISE Concordia University Montréal, QC, Canada Martín Ochoa AppGate Inc. Bogotá, Colombia Georgios Portokalidis Stevens Institute of Technology Hoboken, NJ, USA Kehuan Zhang Chinese University of Hong Kong Shatin, Hong Kong

ISSN 0302-9743 ISSN 1611-3349 (electronic) Lecture Notes in Computer Science ISBN 978-3-030-61637-3 ISBN 978-3-030-61638-0 (eBook) https://doi.org/10.1007/978-3-030-61638-0 LNCS Sublibrary: SL4 – Security and Cryptology © Springer Nature Switzerland AG 2020 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation,