{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T12:17:41Z","timestamp":1756383461885,"version":"3.41.2"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030816513"},{"type":"electronic","value":"9783030816520"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-81652-0_22","type":"book-chapter","created":{"date-parts":[[2021,7,20]],"date-time":"2021-07-20T06:26:19Z","timestamp":1626762379000},"page":"567-592","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Subsampling and Knowledge Distillation on Adversarial Examples: New Techniques for Deep Learning Based Side Channel Evaluations"],"prefix":"10.1007","author":[{"given":"Aron","family":"Gohr","sequence":"first","affiliation":[]},{"given":"Sven","family":"Jacob","sequence":"additional","affiliation":[]},{"given":"Werner","family":"Schindler","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,21]]},"reference":[{"key":"22_CR1","unstructured":"Bishop, C.M.: Pattern Recognition and Machine Learning. Springer (2006). ISBN 978-0387-31073-2"},{"key":"22_CR2","unstructured":"Gohr, A., Jacob, S., Schindler, W.: CHES 2018 Side Channel Contest CTF - Solution of the AES Challenges. IACR eprint archive report 2019\/094. https:\/\/eprint.iacr.org\/2019\/094"},{"key":"22_CR3","unstructured":"Damm, T., Freud, S., Klein, D.: Dissecting the CHES 2018 AES Challenge. IACR eprint archive report 2019\/783. https:\/\/eprint.iacr.org\/2019\/783"},{"key":"22_CR4","unstructured":"Hu, Y., et al.: Machine Learning and Side-Channel Analysis in a CTF Competition. IACR eprint archive report 2019\/860. https:\/\/eprint.iacr.org\/2019\/860"},{"key":"22_CR5","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., et al.: Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)","journal-title":"J. Mach. Learn. Res."},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Soos, M., Nohl, K., Castelluccia, C.: Extending SAT solvers to cryptographic problems. In: 12th International Conference on Theory and Applications of Satisfiability Testing - SAT 2009 (2009)","DOI":"10.1007\/978-3-642-02777-2_24"},{"key":"22_CR7","unstructured":"Pycryptosat homepage. https:\/\/pypi.org\/project\/pycryptosat\/. Accessed 08 Oct 2018"},{"key":"22_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/978-3-030-05072-6_10","volume-title":"Security, Privacy, and Applied Cryptography Engineering","author":"S Picek","year":"2018","unstructured":"Picek, S., Samiotis, I.P., Kim, J., Heuser, A., Bhasin, S., Legay, A.: On the performance of convolutional neural networks for side-channel analysis. In: Chattopadhyay, A., Rebeiro, C., Yarom, Y. (eds.) SPACE 2018. LNCS, vol. 11348, pp. 157\u2013176. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-05072-6_10"},{"key":"22_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-319-66787-4_3","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2017","author":"E Cagli","year":"2017","unstructured":"Cagli, E., Dumas, C., Prouff, E.: Convolutional neural networks with data augmentation against Jitter-based countermeasures. In: Fischer, W., Homma, N. (eds.) CHES 2017. LNCS, vol. 10529, pp. 45\u201368. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66787-4_3"},{"key":"22_CR10","doi-asserted-by":"publisher","unstructured":"Kim, J., Picek, S., Heuser, A., Bhasin, S., Hanjalic, A.: Make some noise. Unleashing the power of convolutional neural networks for profiled side-channel analysis. IACR Trans. Cryptograph. Hardw. Embedded Syst. 2019(3), 148\u2013179. https:\/\/doi.org\/10.13154\/tches.v2019.i3.148-179","DOI":"10.13154\/tches.v2019.i3.148-179"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"He, K., Xang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (2016). https:\/\/www.cv-foundation.org\/openaccess\/content_cvpr_2016\/papers\/He_Deep_Residual_Learning_CVPR_2016_paper.pdf","DOI":"10.1109\/CVPR.2016.90"},{"key":"22_CR12","unstructured":"Emadjila, R., Prouff, E., Strullu, R., Cagli, E., Dumas, C.: Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to the ASCAD Database. IACR eprint report 2018\/053. https:\/\/eprint.iacr.org\/2018\/053"},{"key":"22_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/978-3-030-26951-7_6","volume-title":"Advances in Cryptology \u2013 CRYPTO 2019","author":"A Gohr","year":"2019","unstructured":"Gohr, A.: Improving attacks on round-reduced Speck32\/64 using deep learning. In: Boldyreva, A., Micciancio, D. (eds.) CRYPTO 2019. LNCS, vol. 11693, pp. 150\u2013179. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-26951-7_6"},{"key":"22_CR14","unstructured":"Kingma, D.P., Ba, J.L.: ADAM: A Method for Stochastic Optimization. ICLR 2015. arXiv:1412.6980 (2015)"},{"key":"22_CR15","unstructured":"Chollet, F.: keras, GitHub (2015). https:\/\/github.com\/fchollet\/keras"},{"key":"22_CR16","unstructured":"Ilyas, A., Santurkar, S., Tsipras, D., Engstrom, L., Tran, B., Madry, A.: Adversarial Examples Are Not Bugs, They Are Features. NeurIPS 2019. https:\/\/arxiv.org\/pdf\/1905.02175.pdf"},{"key":"22_CR17","unstructured":"Barak, B.: Puzzles of Modern Machine Learning, Windows On Theory Research Blog. https:\/\/windowsontheory.org\/2019\/11\/15\/puzzles-of-modern-machine-learning\/. Accessed 19 Nov 2019"},{"key":"22_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1007\/978-3-030-38471-5_26","volume-title":"Selected Areas in Cryptography \u2013 SAC 2019","author":"B Hettwer","year":"2020","unstructured":"Hettwer, B., Gehrer, S., G\u00fcneysu, T.: Deep neural network attribution methods for leakage analysis and symmetric key recovery. In: Paterson, K.G., Stebila, D. (eds.) SAC 2019. LNCS, vol. 11959, pp. 645\u2013666. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-38471-5_26"},{"key":"22_CR19","unstructured":"Goodfellow, I., Bengio, Y., Courville, A.: Deep Learning. MIT Press (2016). https:\/\/www.deeplearningbook.org"},{"key":"22_CR20","unstructured":"Goodfellow, I., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)"},{"key":"22_CR21","unstructured":"Ioffe, S., Szegedy, C.: Batch normalization: accelerating deep network training by reducing internal covariate shift. In: International Conference on Machine Learning (2015)"},{"key":"22_CR22","doi-asserted-by":"crossref","unstructured":"Sharif, M., Bhagavatula, S., Bauer, L., Reiter, M.K.: Accessorize to a crime: real and stealthy attacks on state-of-the-art face recognition. In: ACM Conference on Computer and Communications Security 2016, New York, pp. 1528\u20131540 (2016)","DOI":"10.1145\/2976749.2978392"},{"key":"22_CR23","unstructured":"Belliza, D., Bronchain, O., Cassiers, G., Momin, C., Standaert, F.-X., Udvarhelyi, B.(organizers): CHES CTF 2020 Hall of Fame. Submissions. Accessed 05 July 2021"},{"key":"22_CR24","unstructured":"Szegedy, C.: Intriguing Properties of Neural Networks. arXiv:1312.6199"},{"key":"22_CR25","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Standaert, F.-X.: Deep learning mitigates but does not annihilate the need of aligned traces and a generalized ResNet model for side-channel attacks. J. Cryptograph. Eng. 10(1), 1\u201311 (2019)","DOI":"10.1007\/s13389-019-00209-3"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-81652-0_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,19]],"date-time":"2025-07-19T22:02:58Z","timestamp":1752962578000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-81652-0_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030816513","9783030816520"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-81652-0_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"21 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Selected Areas in Cryptography","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sacrypt2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sac2020.ca\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"iChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"52","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"52% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6-8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}