Abstract: In recent years, the threat of profiling attacks using deep learning has emerged. Successful attacks have been demonstrated against various types of cryptographic modules. However, the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results