Exploiting Support Vector Machine Algorithm to Break the Secret Key

Template attacks (TA) and support vector machine (SVM) are two effective methods in side channel attacks (SCAs). Almost all studies on SVM in SCAs assume the required power traces are sufficient, which also implies the number of profiling traces belonging to each class is equivalent. Indeed, in the...

Full description

Bibliographic Details
Main Authors: S. Hou, Y. Zhou, H. Liu, N. Zhu
Format: Article
Language:English
Published: Spolecnost pro radioelektronicke inzenyrstvi 2018-04-01
Series:Radioengineering
Subjects:
Online Access:https://www.radioeng.cz/fulltexts/2018/18_01_0289_0298.pdf