Login / Signup
On the effectiveness of using state-of-the-art machine learning techniques to launch cryptographic distinguishing attacks.
Jung-Wei Chou
Shou-De Lin
Chen-Mou Cheng
Published in:
AISec (2012)
Keyphrases
</>
security protocols
machine learning
differential power analysis
machine learning algorithms
life cycle
smart card
cryptographic algorithms
data sets
statistical methods
countermeasures
security threats
attack detection
stream cipher