Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    A Novel Stacked Network Method for Enhancing the Performance of Side-Channel Attacks

    Zhicheng Yin1,2, Lang Li1,2,*, Yu Ou1,2

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1001-1022, 2025, DOI:10.32604/cmc.2025.060925 - 26 March 2025

    Abstract The adoption of deep learning-based side-channel analysis (DL-SCA) is crucial for leak detection in secure products. Many previous studies have applied this method to break targets protected with countermeasures. Despite the increasing number of studies, the problem of model overfitting. Recent research mainly focuses on exploring hyperparameters and network architectures, while offering limited insights into the effects of external factors on side-channel attacks, such as the number and type of models. This paper proposes a Side-channel Analysis method based on a Stacking ensemble, called Stacking-SCA. In our method, multiple models are deeply integrated. Through the… More >

  • Open Access

    ARTICLE

    SFGA-CPA: A Novel Screening Correlation Power Analysis Framework Based on Genetic Algorithm

    Jiahui Liu1,2, Lang Li1,2,*, Di Li1,2, Yu Ou1,2

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4641-4657, 2024, DOI:10.32604/cmc.2024.051613 - 20 June 2024

    Abstract Correlation power analysis (CPA) combined with genetic algorithms (GA) now achieves greater attack efficiency and can recover all subkeys simultaneously. However, two issues in GA-based CPA still need to be addressed: key degeneration and slow evolution within populations. These challenges significantly hinder key recovery efforts. This paper proposes a screening correlation power analysis framework combined with a genetic algorithm, named SFGA-CPA, to address these issues. SFGA-CPA introduces three operations designed to exploit CPA characteristics: propagative operation, constrained crossover, and constrained mutation. Firstly, the propagative operation accelerates population evolution by maximizing the number of correct bytes… More >

  • Open Access

    ARTICLE

    Side-Channel Leakage Analysis of Inner Product Masking

    Yuyuan Li1,2, Lang Li1,2,*, Yu Ou1,2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1245-1262, 2024, DOI:10.32604/cmc.2024.049882 - 25 April 2024

    Abstract The Inner Product Masking (IPM) scheme has been shown to provide higher theoretical security guarantees than the Boolean Masking (BM). This scheme aims to increase the algebraic complexity of the coding to achieve a higher level of security. Some previous work unfolds when certain (adversarial and implementation) conditions are met, and we seek to complement these investigations by understanding what happens when these conditions deviate from their expected behaviour. In this paper, we investigate the security characteristics of IPM under different conditions. In adversarial condition, the security properties of first-order IPMs obtained through parametric characterization More >

Displaying 1-10 on page 1 of 3. Per Page