Back Propagation Neural Network Based Leakage Characterization for Practical Security Analysis of Cryptographic Implementations.
Shuguo YangYongbin ZhouJiye LiuDanyang ChenPublished in: ICISC (2011)
Keyphrases
- back propagation
- security analysis
- smart card
- neural network
- security properties
- encryption scheme
- artificial neural networks
- feed forward
- elliptic curve cryptography
- public key
- security requirements
- bp neural network
- training algorithm
- feed forward neural networks
- security model
- multilayer perceptron
- hidden layer
- bp algorithm
- digital signature
- image encryption
- learning algorithm
- fuzzy logic
- public key cryptography
- authentication protocol
- encryption algorithm
- weight update
- high security
- activation function
- information security
- user authentication
- authentication scheme
- security protocols
- real time
- genetic algorithm
- cryptographic protocols
- information systems
- multi layer neural network