A hybrid day-ahead electricity price forecasting framework based on time series

X Xiong, G Qing - Energy, 2023 - Elsevier
Electricity price forecasting (EPF) plays an indispensable role in the decision-making
processes of electricity market participants. However, the complexity of electricity markets …

Best information is most successful

E De Chérisey, S Guilley, O Rioul… - Cryptology ePrint …, 2019 - eprint.iacr.org
Using information-theoretic tools, this paper establishes a mathematical link between the
probability of success of a side-channel attack and the minimum number of queries to reach …

Power side-channel leakage assessment framework at register-transfer level

N Pundir, J Park, F Farahmandi… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Power side-channel (PSC) attacks received significant attention over the past two decades
due to their effectiveness in breaking mathematically strong cryptographic implementations …

Maskednet: The first hardware inference engine aiming power side-channel protection

A Dubey, R Cammarota, A Aysu - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
Differential Power Analysis (DPA) has been an active area of research for the past two
decades to study the attacks for extracting secret information from cryptographic …

Power analysis attack: an approach based on machine learning

L Lerman, G Bontempi… - International Journal of …, 2014 - inderscienceonline.com
In cryptography, a side-channel attack is any attack based on the analysis of measurements
related to the physical implementation of a cryptosystem. Nowadays, the possibility of …

Feature augmentation with reinforcement learning

J Liu, C Chai, Y Luo, Y Lou, J Feng… - 2022 IEEE 38th …, 2022 - ieeexplore.ieee.org
Sufficient good features are indispensable to train well-performed machine learning models.
However, it is com-mon that good features are not always enough, where feature …

Rosita: Towards automatic elimination of power-analysis leakage in ciphers

MA Shelton, N Samwel, L Batina, F Regazzoni… - arXiv preprint arXiv …, 2019 - arxiv.org
Since their introduction over two decades ago, side-channel attacks have presented a
serious security threat. While many ciphers' implementations employ masking techniques to …

Soft analytical side-channel attacks

N Veyrat-Charvillon, B Gérard, FX Standaert - Advances in Cryptology …, 2014 - Springer
In this paper, we introduce a new approach to side-channel key recovery, that combines the
low time/memory complexity and noise tolerance of standard (divide and conquer) …

The world is not enough: Another look on second-order DPA

FX Standaert, N Veyrat-Charvillon, E Oswald… - Advances in Cryptology …, 2010 - Springer
In a recent work, Mangard et al. showed that under certain assumptions, the (so-called)
standard univariate side-channel attacks using a distance-of-means test, correlation …

Leakage detection with the x2-test

A Moradi, B Richter, T Schneider… - IACR Transactions on …, 2018 - tches.iacr.org
We describe how Pearson's χ 2-test can be used as a natural complement to Welch's t-test
for black box leakage detection. In particular, we show that by using these two tests in …