Performance Analysis of Multilayer Perceptron in Profiling Side-Channel Analysis
In profiling side-channel analysis, machine learning-based analysis nowadays offers the most powerful performance. This holds especially for techniques stemming from the neural network family: multilayer perceptron and convolutional neural networks. Convo
- PDF / 40,864,335 Bytes
- 592 Pages / 439.37 x 666.142 pts Page_size
- 94 Downloads / 194 Views
Jianying Zhou · Mauro Conti · Chuadhry Mujeeb Ahmed · Man Ho Au · Lejla Batina · Zhou Li · Jingqiang Lin · Eleonora Losiouk · Bo Luo · Suryadipta Majumdar · Weizhi Meng · Martín Ochoa · Stjepan Picek · Georgios Portokalidis · Cong Wang · Kehuan Zhang (Eds.)
Applied Cryptography and Network Security Workshops ACNS 2020 Satellite Workshops AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA Rome, Italy, October 19–22, 2020, Proceedings
Lecture Notes in Computer Science Founding Editors Gerhard Goos Karlsruhe Institute of Technology, Karlsruhe, Germany Juris Hartmanis Cornell University, Ithaca, NY, USA
Editorial Board Members Elisa Bertino Purdue University, West Lafayette, IN, USA Wen Gao Peking University, Beijing, China Bernhard Steffen TU Dortmund University, Dortmund, Germany Gerhard Woeginger RWTH Aachen, Aachen, Germany Moti Yung Columbia University, New York, NY, USA
12418
More information about this series at http://www.springer.com/series/7410
Jianying Zhou Mauro Conti Chuadhry Mujeeb Ahmed Man Ho Au Lejla Batina Zhou Li Jingqiang Lin Eleonora Losiouk Bo Luo Suryadipta Majumdar Weizhi Meng Martín Ochoa Stjepan Picek Georgios Portokalidis Cong Wang Kehuan Zhang (Eds.) •
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Applied Cryptography and Network Security Workshops ACNS 2020 Satellite Workshops AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA Rome, Italy, October 19–22, 2020 Proceedings
123
Editors Jianying Zhou Singapore University of Technology and Design Singapore, Singapore Chuadhry Mujeeb Ahmed Singapore University of Technology and Design Singapore, Singapore Lejla Batina ICIS Radboud University Nijmegen Nijmegen, The Netherlands Jingqiang Lin University of Science and Technology of China Hefei, China Bo Luo University of Kansas Lawrence, KS, USA Weizhi Meng Technical University of Denmark Lyngby, Denmark Stjepan Picek Delft University of Technology Delft, The Netherlands Cong Wang City University of Hong Kong Hong Kong, China
Mauro Conti University of Padua Padua, Italy Man Ho Au The University of Hong Kong Hong Kong, Hong Kong Zhou Li University of California Irvine, CA, USA Eleonora Losiouk University of Padua Padua, Italy Suryadipta Majumdar CIISE Concordia University Montréal, QC, Canada Martín Ochoa AppGate Inc. Bogotá, Colombia Georgios Portokalidis Stevens Institute of Technology Hoboken, NJ, USA Kehuan Zhang Chinese University of Hong Kong Shatin, Hong Kong
ISSN 0302-9743 ISSN 1611-3349 (electronic) Lecture Notes in Computer Science ISBN 978-3-030-61637-3 ISBN 978-3-030-61638-0 (eBook) https://doi.org/10.1007/978-3-030-61638-0 LNCS Sublibrary: SL4 – Security and Cryptology © Springer Nature Switzerland AG 2020 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation,