You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I had just come across a doubt regarding the metadata that has been given in ASCAD v2 extracted Dataset (7GB)
the **metadata for attacking traces consists of different key different pair of plainText and masks (38 Byte) then how we are going to utilize it for SCA using deep learning ** I have referred to this implimentation which were taking reference of paper "Side Channel Analysis against the ANSSI’s protected AES implementation on ARM](https://eprint.iacr.org/2021/592)" and Dataset :- "ASCAD-V2-EXTRACTED"
2). pls clear us that is there any way that all the different keys which have been given produces us the same master key through masking or vice versa that given key has been already masked and provided to us in the dataset then how we can derive a common key through them
I had just come across a doubt regarding the metadata that has been given in ASCAD v2 extracted Dataset (7GB)
the **metadata for attacking traces consists of different key different pair of plainText and masks (38 Byte) then how we are going to utilize it for SCA using deep learning ** I have referred to this implimentation which were taking reference of paper "Side Channel Analysis against the ANSSI’s protected AES implementation on ARM](https://eprint.iacr.org/2021/592)" and Dataset :- "ASCAD-V2-EXTRACTED"
2). pls clear us that is there any way that all the different keys which have been given produces us the same master key through masking or vice versa that given key has been already masked and provided to us in the dataset then how we can derive a common key through them
referenced dataset img :- https://github.com/ANSSI-FR/ASCAD/assets/114134627/001c16aa-576e-4b90-90ab-6f2097210549
kindly pls look into this.
Thanking You.
Yours Sincerely,
Vaibhav
The text was updated successfully, but these errors were encountered: