期刊文献+

神经网络结构在功耗分析中的性能对比 被引量:2

Comparative study on neural network structures in power analysis
原文传递
导出
摘要 为了探究不同的深度神经网络运用在功耗分析攻击中的性能差异,在DPA_Contest_V4数据集的基础上进行实验。破解循环掩码后,首先将深度神经网络与传统的SVM等机器学习算法模型进行对比,然后分析神经网络模型结构的变化对实验结果的影响,最后结合循环神经网络,将不同的网络模型进行综合比较。实验结果表明,在相同实验条件下,神经网络模型要优于传统的机器学习模型,循环神经网络模型要优于深度神经网络模型,其中,不同层数的神经网络采取的激活函数不同,会导致实验结果发生较大变化。 In order to explore the difference of different neural networks used in power analysis,we use DPA_Contest_V4 dataset to complete our experiment.After the mask is cracked,the deep neural network and the traditional machine learning like SVM are firstly used.Then,the impact of the changes in the structure of the neural network model on the experimental results is analyzed.Finally,a comprehensive comparison of different network models is made by combining the cyclic neural network.The experimental results show that the neural network model is superior to the traditional machine learning model and the recurrent neural network model is superior to the deep neural network model when experimental conditions are the same.Among them,the activation functions of neural networks with different layers are different,which will lead to great changes in the experimental results.
作者 刘飚 路哲 黄雨薇 焦萌 李泉其 薛瑞 LIU Biao;LU Zhe;HUANG Yu-wei;JIAO Meng;LI Quan-qi;XUE Rui(Management Department,Beijing Electronic Science and Technology Institution,Beijing 100071,China)
出处 《山东大学学报(理学版)》 CAS CSCD 北大核心 2019年第1期60-66,78,共8页 Journal of Shandong University(Natural Science)
基金 国家重点研发计划资助项目(2018YFB0803600)
关键词 深度学习 神经网络 功耗分析 deep learning neural network power analysis
  • 相关文献

参考文献1

二级参考文献7

  • 1Kocher P. Timing attacks on implementations of Diffie-- Hellman, RSA, DSS, and other systems [A], In Neal Koblitz, editor, Ad vances in Cryptology, Proceedings Crypto' 96, LCNS [C], New York: Springer--Verlag, 1996: 104--113.
  • 2Chari S, Rao J R, Rohatgi P. Template Attacks [A]. Burton S. Kaliski Jr. , C etin Kaya Koc, and Christof Paar, editors, Proceedings of CHES 2002 [C], LNCS, Springer, 2003: 13--28.
  • 3Archambeau C, Peeters E, Standaert F --X, et al. Quisquater. Template attacks in principal subspaces [A]. In Louis Goubin and Mitsuru Matsui, editors, Cryptographic Hardware and Embedded Systems -- CHES 2006 [C], volume 4249 of LNCS, Springer, 2006: 1--14.
  • 4Moulay Abdelaziz EL AABID, Sylvain Guilley, Philippe Hoogvorst. Template Attacks with a Power Model 2007 [EB/OL]. http: // eprint, iacr. org/2007/443.
  • 5International Eleetrotechnical Commission. IEC 61967: Integrated Circuits--Measurement of Electromagnetic Emanations, 150 kHz to 1 GHz. 2003[EB/OL], http: //www. iee. ch/.
  • 6Serway R A. Physics for scientists and engineers [M]. Saunders Golden sunburst series. Saunders college publishing, 1996.
  • 7Vapnik V. The nature of statistical learning theory [M]. New York: Springer--Verlag, 1999.

共引文献5

同被引文献35

引证文献2

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部