Zobrazeno 1 - 10
of 381
pro vyhledávání: '"P, Batina"'
Neural networks have become popular due to their versatility and state-of-the-art results in many applications, such as image classification, natural language processing, speech recognition, forecasting, etc. These applications are also used in resou
Externí odkaz:
http://arxiv.org/abs/2401.13575
Over the last decade, applications of neural networks (NNs) have spread to various aspects of our lives. A large number of companies base their businesses on building products that use neural networks for tasks such as face recognition, machine trans
Externí odkaz:
http://arxiv.org/abs/2312.07783
Autor:
Tepungipame Tagoto, Serge Tonen-Wolyec, Lukongo Panda, Agasa Batina, Sadiki Falay, Likwela Losimba
Publikováno v:
BMC Infectious Diseases, Vol 24, Iss 1, Pp 1-12 (2024)
Abstract Introduction HIV self-testing represents a convenient and confidential option for HIV testing—the present study aimed to assess the acceptability of blood versus saliva self-tests among key populations in Kisangani. Methods This study was
Externí odkaz:
https://doaj.org/article/1bc52225b2704624b195af6c0bf19970
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 4 (2024)
We employ an algebraic approach to estimate the success rate of a sidechannel adversary attacking secrets of a masked circuit within the Random Probing Model (RPM), where intermediate variables of the implementation leak with a probability p. Our met
Externí odkaz:
https://doaj.org/article/daafc1e872ba4a0abd107a0a10197eef
This paper introduces a deep learning modular network for side-channel analysis. Our deep learning approach features the capability to exchange part of it (modules) with others networks. We aim to introduce reusable trained modules into side-channel
Externí odkaz:
http://arxiv.org/abs/2203.08448
In this paper we report on the results of selected horizontal SCA attacks against two open-source designs that implement hardware accelerators for elliptic curve cryptography. Both designs use the complete addition formula to make the point addition
Externí odkaz:
http://arxiv.org/abs/2201.01158
The absence of an algorithm that effectively monitors deep learning models used in side-channel attacks increases the difficulty of evaluation. If the attack is unsuccessful, the question is if we are dealing with a resistant implementation or a faul
Externí odkaz:
http://arxiv.org/abs/2111.14416
Evaluating side-channel analysis (SCA) security is a complex process, involving applying several techniques whose success depends on human engineering. Therefore, it is crucial to avoid a false sense of confidence provided by non-optimal (failing) at
Externí odkaz:
http://arxiv.org/abs/2111.13425
Autor:
Luis Fernando Garcia-Melo, Norma Andrea Chagoya Pio, Jorge Alfredo Campoy Ramírez, Eduardo Madrigal-Bujaidar, Isela Álvarez-González, José A. Morales-González, Eduardo O. Madrigal-Santillán, Nikola Batina
Publikováno v:
Sensing and Bio-Sensing Research, Vol 44, Iss , Pp 100651- (2024)
Screening for microsatellite instability is one of the biggest challenges in the cancer diagnosis due to its association with different types of cancer development. In this sense, the development of fast and highly sensitive analytical devices for ea
Externí odkaz:
https://doaj.org/article/be27c1c537c64048b34a968b8b28a539
Autor:
Shelton, Madura A., Chmielewski, Łukasz, Samwel, Niels, Wagner, Markus, Batina, Lejla, Yarom, Yuval
Side-channel attacks are a major threat to the security of cryptographic implementations, particularly for small devices that are under the physical control of the adversary. While several strategies for protecting against side-channel attacks exist,
Externí odkaz:
http://arxiv.org/abs/2109.11741