Login / Signup
Deep Learning-Based Side-Channel Attacks against Software-Implemented RSA using Binary Exponentiation with Dummy Multiplication.
Seiya Shimada
Kunihiro Kuroda
Yuta Fukuda
Kota Yoshida
Takeshi Fujino
Published in:
ATAIT (2022)
Keyphrases
</>
deep learning
unsupervised learning
unsupervised feature learning
modular exponentiation
machine learning
mental models
public key
restricted boltzmann machine
data sets
decision trees
supervised learning
graph cuts
named entities
key exchange
deep architectures
public key cryptosystems