{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T16:46:50Z","timestamp":1743007610083,"version":"3.40.3"},"publisher-location":"Cham","reference-count":69,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030987947"},{"type":"electronic","value":"9783030987954"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-98795-4_2","type":"book-chapter","created":{"date-parts":[[2022,4,7]],"date-time":"2022-04-07T18:03:58Z","timestamp":1649354638000},"page":"25-47","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Traditional Machine Learning Methods for Side-Channel Analysis"],"prefix":"10.1007","author":[{"given":"Alan","family":"Jovic","sequence":"first","affiliation":[]},{"given":"Dirmanto","family":"Jap","sequence":"additional","affiliation":[]},{"given":"Louiza","family":"Papachristodoulou","sequence":"additional","affiliation":[]},{"given":"Annelie","family":"Heuser","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,8]]},"reference":[{"key":"2_CR1","unstructured":"Alpaydin, E.: Chapter 13, Kernel machines. In: Introduction to Machine Learning, 2nd edn. The MIT Press (2010)"},{"key":"2_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11894063_1","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"C Archambeau","year":"2006","unstructured":"Archambeau, C., Peeters, E., Standaert, F.-X., Quisquater, J.-J.: Template attacks in principal subspaces. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 1\u201314. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11894063_1"},{"key":"2_CR3","doi-asserted-by":"publisher","unstructured":"Asonov, D., Agrawal, R.: Keyboard acoustic emanations. In: 2004 IEEE Symposium on Security and Privacy (S&P 2004), 9\u201312 May 2004, Berkeley, CA, USA, pp. 3\u201311. IEEE Computer Society (2004). https:\/\/doi.org\/10.1109\/SECPRI.2004.1301311","DOI":"10.1109\/SECPRI.2004.1301311"},{"key":"2_CR4","unstructured":"Backes, M., D\u00fcrmuth, M., Gerling, S., Pinkal, M., Sporleder, C.: Acoustic side-channel attacks on printers. In: Proceedings of 19th USENIX Security Symposium, Washington, DC, USA, 11\u201313 August 2010, pp. 307\u2013322. USENIX Association (2010). http:\/\/www.usenix.org\/events\/sec10\/tech\/full_papers\/Backes.pdf"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/978-3-642-37288-9_18","volume-title":"Smart Card Research and Advanced Applications","author":"T Bartkewitz","year":"2013","unstructured":"Bartkewitz, T., Lemke-Rust, K.: Efficient template attacks based on probabilistic multi-class support vector machines. In: Mangard, S. (ed.) CARDIS 2012. LNCS, vol. 7771, pp. 263\u2013276. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-37288-9_18"},{"key":"2_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-319-13039-2_2","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2014","author":"L Batina","year":"2014","unstructured":"Batina, L., Chmielewski, \u0141, Papachristodoulou, L., Schwabe, P., Tunstall, M.: Online template attacks. In: Meier, W., Mukhopadhyay, D. (eds.) INDOCRYPT 2014. LNCS, vol. 8885, pp. 21\u201336. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-13039-2_2"},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/978-3-642-04138-9_9","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"L Batina","year":"2009","unstructured":"Batina, L., Gierlichs, B., Lemke-Rust, K.: Differential cluster analysis. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 112\u2013127. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04138-9_9"},{"key":"2_CR8","unstructured":"Bhasin, S., Danger, J., Guilley, S., Najm, Z.: NICV: normalized inter-class variance for detection of side-channel leakage. In: 2014 International Symposium on Electromagnetic Compatibility, Tokyo, pp. 310\u2013313 (2014)"},{"key":"2_CR9","series-title":"Undergraduate Topics in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-1-4471-4884-5_3","volume-title":"Principles of Data Mining","author":"M Bramer","year":"2013","unstructured":"Bramer, M.: Introduction to classification: na\u00efve bayes and nearest neighbour. In: Bramer, M. (ed.) Principles of Data Mining. Undergraduate Topics in Computer Science, pp. 21\u201337. Springer, London (2013). https:\/\/doi.org\/10.1007\/978-1-4471-4884-5_3"},{"key":"2_CR10","doi-asserted-by":"publisher","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001). https:\/\/doi.org\/10.1023\/A:1010933404324","DOI":"10.1023\/A:1010933404324"},{"key":"2_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-319-12060-7_13","volume-title":"Security, Privacy, and Applied Cryptography Engineering","author":"N Bruneau","year":"2014","unstructured":"Bruneau, N., Danger, J.-L., Guilley, S., Heuser, A., Teglia, Y.: Boosting higher-order correlation attacks by dimensionality reduction. In: Chakraborty, R.S., Matyas, V., Schaumont, P. (eds.) SPACE 2014. LNCS, vol. 8804, pp. 183\u2013200. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-12060-7_13"},{"key":"2_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1007\/978-3-540-30205-6_50","volume-title":"Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation","author":"M Bucci","year":"2004","unstructured":"Bucci, M., Guglielmo, M., Luzzi, R., Trifiletti, A.: A power consumption randomization countermeasure for DPA-resistant cryptographic processors. In: Macii, E., Paliouras, V., Koufopavlou, O. (eds.) PATMOS 2004. LNCS, vol. 3254, pp. 481\u2013490. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-30205-6_50"},{"key":"2_CR13","unstructured":"Cagli, E.: Feature extraction for side-channel attacks. Ph.D. thesis, Sorbonne Universit\u00e9, December 2018"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-3-319-31271-2_2","volume-title":"Smart Card Research and Advanced Applications","author":"E Cagli","year":"2016","unstructured":"Cagli, E., Dumas, C., Prouff, E.: Enhancing dimensionality reduction methods for side-channel attacks. In: Homma, N., Medwed, M. (eds.) CARDIS 2015. LNCS, vol. 9514, pp. 15\u201333. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-31271-2_2"},{"key":"2_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-36400-5_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S Chari","year":"2003","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski, B.S., Ko\u00e7, K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13\u201328. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36400-5_3"},{"issue":"1","key":"2_CR16","first-page":"321","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: SMOTE: synthetic minority over-sampling technique. J. Artif. Int. Res. 16(1), 321\u2013357 (2002)","journal-title":"J. Artif. Int. Res."},{"key":"2_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-319-08302-5_17","volume-title":"Smart Card Research and Advanced Applications","author":"O Choudary","year":"2014","unstructured":"Choudary, O., Kuhn, M.G.: Efficient template attacks. In: Francillon, A., Rohatgi, P. (eds.) CARDIS 2013. LNCS, vol. 8419, pp. 253\u2013270. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-08302-5_17"},{"key":"2_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-44709-1_21","volume-title":"Cryptographic Hardware and Embedded Systems \u2014 CHES 2001","author":"K Gandolfi","year":"2001","unstructured":"Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: concrete results. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 251\u2013261. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44709-1_21"},{"key":"2_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/11894063_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"B Gierlichs","year":"2006","unstructured":"Gierlichs, B., Lemke-Rust, K., Paar, C.: Templates vs. stochastic methods. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 15\u201329. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11894063_2"},{"key":"2_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/978-3-642-29912-4_18","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"A Heuser","year":"2012","unstructured":"Heuser, A., Zohner, M.: Intelligent machine homicide - breaking cryptographic devices using support vector machines. In: Schindler, W., Huss, S.A. (eds.) COSADE 2012. LNCS, vol. 7275, pp. 249\u2013264. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-29912-4_18"},{"key":"2_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-319-08302-5_6","volume-title":"Smart Card Research and Advanced Applications","author":"J Heyszl","year":"2014","unstructured":"Heyszl, J., Ibing, A., Mangard, S., De Santis, F., Sigl, G.: Clustering algorithms for non-profiled single-execution attacks on exponentiations. In: Francillon, A., Rohatgi, P. (eds.) CARDIS 2013. LNCS, vol. 8419, pp. 79\u201393. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-08302-5_6"},{"key":"2_CR22","unstructured":"Hospodar, G., de Mulder, E., Gierlichs, B., Verbauwhede, I., Vandewalle, J.: Least squares support vector machines for side-channel analysis. In: Second International Workshop on Constructive SideChannel Analysis and Secure Design, pp. 99\u2013104. Center for Advanced Security Research Darmstadt (2011)"},{"key":"2_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/978-3-319-54669-8_9","volume-title":"Smart Card Research and Advanced Applications","author":"K J\u00e4rvinen","year":"2017","unstructured":"J\u00e4rvinen, K., Balasch, J.: Single-trace side-channel attacks on scalar multiplications with precomputations. In: Lemke-Rust, K., Tunstall, M. (eds.) CARDIS 2016. LNCS, vol. 10146, pp. 137\u2013155. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-54669-8_9"},{"key":"2_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-540-45238-6_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"C Karlof","year":"2003","unstructured":"Karlof, C., Wagner, D.: Hidden Markov model cryptanalysis. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 17\u201334. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45238-6_3"},{"key":"2_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_25"},{"key":"2_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201996","author":"PC Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104\u2013113. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-68697-5_9"},{"key":"2_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/978-3-540-74735-2_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"K Lemke-Rust","year":"2007","unstructured":"Lemke-Rust, K., Paar, C.: Gaussian mixture models for higher-order side channel analysis. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 14\u201327. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74735-2_2"},{"key":"2_CR28","unstructured":"Lerman, L., Bontempi, G., Markowitch, O.: Side channel attack: an approach based on machine learning. In: Second International Workshop on Constructive SideChannel Analysis and Secure Design, pp. 29\u201341. Center for Advanced Security Research Darmstadt (2011)"},{"key":"2_CR29","doi-asserted-by":"publisher","unstructured":"Lerman, L., Bontempi, G., Markowitch, O.: Power analysis attack: an approach based on machine learning. Int. J. Appl. Cryptol. 3(2), 97\u2013115 (2014). https:\/\/doi.org\/10.1504\/IJACT.2014.062722","DOI":"10.1504\/IJACT.2014.062722"},{"key":"2_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-642-41224-0_7","volume-title":"Security, Privacy, and Applied Cryptography Engineering","author":"L Lerman","year":"2013","unstructured":"Lerman, L., Bontempi, G., Ben Taieb, S., Markowitch, O.: A time series approach for profiling attack. In: Gierlichs, B., Guilley, S., Mukhopadhyay, D. (eds.) SPACE 2013. LNCS, vol. 8204, pp. 75\u201394. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-41224-0_7"},{"key":"2_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-319-08302-5_5","volume-title":"Smart Card Research and Advanced Applications","author":"L Lerman","year":"2014","unstructured":"Lerman, L., Medeiros, S.F., Bontempi, G., Markowitch, O.: A machine learning approach against a masked AES. In: Francillon, A., Rohatgi, P. (eds.) CARDIS 2013. LNCS, vol. 8419, pp. 61\u201375. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-08302-5_5"},{"key":"2_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/978-3-642-40026-1_12","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"L Lerman","year":"2013","unstructured":"Lerman, L., Medeiros, S.F., Veshchikov, N., Meuter, C., Bontempi, G., Markowitch, O.: Semi-supervised template attack. In: Prouff, E. (ed.) COSADE 2013. LNCS, vol. 7864, pp. 184\u2013199. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40026-1_12"},{"key":"2_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/978-3-319-21476-4_2","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"L Lerman","year":"2015","unstructured":"Lerman, L., Poussier, R., Bontempi, G., Markowitch, O., Standaert, F.-X.: Template attacks vs. machine learning revisited (and the curse of dimensionality in side-channel analysis). In: Mangard, S., Poschmann, A.Y. (eds.) COSADE 2014. LNCS, vol. 9064, pp. 20\u201333. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-21476-4_2"},{"issue":"4","key":"2_CR34","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/s13389-017-0162-9","volume":"8","author":"L Lerman","year":"2018","unstructured":"Lerman, L., Poussier, R., Markowitch, O., Standaert, F.: Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version. J. Cryptogr. Eng. 8(4), 301\u2013313 (2018). https:\/\/doi.org\/10.1007\/s13389-017-0162-9","journal-title":"J. Cryptogr. Eng."},{"key":"2_CR35","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/978-981-10-6385-5_46","volume-title":"Data Science","author":"B Liu","year":"2017","unstructured":"Liu, B., Ding, Z., Pan, Y., Li, J., Feng, H.: Side-channel attacks based on collaborative learning. In: Zou, B., Li, M., Wang, H., Song, X., Xie, W., Lu, Z. (eds.) ICPCSEE 2017. CCIS, vol. 727, pp. 549\u2013557. Springer, Singapore (2017). https:\/\/doi.org\/10.1007\/978-981-10-6385-5_46"},{"key":"2_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-49445-6_1","volume-title":"Security, Privacy, and Applied Cryptography Engineering","author":"H Maghrebi","year":"2016","unstructured":"Maghrebi, H., Portigliatti, T., Prouff, E.: Breaking cryptographic implementations using deep learning techniques. In: Carlet, C., Hasan, M.A., Saraswat, V. (eds.) SPACE 2016. LNCS, vol. 10076, pp. 3\u201326. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-49445-6_1"},{"key":"2_CR37","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1049\/iet-ifs.2010.0096","volume":"5","author":"S Mangard","year":"2011","unstructured":"Mangard, S., Elisabeth, O., Standaert, F.X.: One for all - all for one: unifying standard differential power analysis attacks. IET Inf. Secur. 5, 100\u2013110 (2011)","journal-title":"IET Inf. Secur."},{"key":"2_CR38","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-38162-6","volume-title":"Power Analysis Attacks: Revealing the Secrets of Smart Cards","author":"S Mangard","year":"2007","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-0-387-38162-6"},{"key":"2_CR39","doi-asserted-by":"publisher","unstructured":"Martinasek, Z., Clupek, V., Krisztina, T.: General scheme of differential power analysis. In: 2013 36th International Conference on Telecommunications and Signal Processing (TSP), pp. 358\u2013362 (2013). https:\/\/doi.org\/10.1109\/TSP.2013.6613952","DOI":"10.1109\/TSP.2013.6613952"},{"key":"2_CR40","doi-asserted-by":"publisher","unstructured":"Martinasek, Z., Dzurenda, P., Malina, L.: Profiling power analysis attack based on MLP in DPA contest V4.2. In: 39th International Conference on Telecommunications and Signal Processing, TSP 2016, Vienna, Austria, 27\u201329 June 2016, pp. 223\u2013226. IEEE (2016). https:\/\/doi.org\/10.1109\/TSP.2016.7760865","DOI":"10.1109\/TSP.2016.7760865"},{"key":"2_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1007\/978-3-319-08302-5_7","volume-title":"Smart Card Research and Advanced Applications","author":"Z Martinasek","year":"2014","unstructured":"Martinasek, Z., Hajny, J., Malina, L.: Optimization of power analysis using neural network. In: Francillon, A., Rohatgi, P. (eds.) CARDIS 2013. LNCS, vol. 8419, pp. 94\u2013107. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-08302-5_7"},{"key":"2_CR42","unstructured":"Mitchell, T.M.: Machine Learning. McGraw Hill Series in Computer Science. McGraw-Hill (1997)"},{"key":"2_CR43","doi-asserted-by":"publisher","unstructured":"Montavon, G., Samek, W., M\u00fcller, K.R.: Methods for interpreting and understanding deep neural networks. Digit. Signal Process. 73, 1 \u2013 15 (2018). https:\/\/doi.org\/10.1016\/j.dsp.2017.10.011, http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1051200417302385","DOI":"10.1016\/j.dsp.2017.10.011"},{"key":"2_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-3-319-75208-2_13","volume-title":"Smart Card Research and Advanced Applications","author":"E Nascimento","year":"2018","unstructured":"Nascimento, E., Chmielewski, \u0141: Applying horizontal clustering side-channel attacks on embedded ECC implementations. In: Eisenbarth, T., Teglia, Y. (eds.) CARDIS 2017. LNCS, vol. 10728, pp. 213\u2013231. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-75208-2_13"},{"key":"2_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-319-10175-0_11","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"G Perin","year":"2014","unstructured":"Perin, G., Imbert, L., Torres, L., Maurine, P.: Attacking randomized exponentiations using unsupervised learning. In: Prouff, E. (ed.) COSADE 2014. LNCS, vol. 8622, pp. 144\u2013160. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10175-0_11"},{"issue":"12","key":"2_CR46","doi-asserted-by":"publisher","first-page":"2802","DOI":"10.1109\/TVLSI.2019.2937365","volume":"27","author":"S Picek","year":"2019","unstructured":"Picek, S., Heuser, A., Jovic, A., Batina, L.: A systematic evaluation of profiling through focused feature selection. IEEE Trans. Very Large Scale Integrat. (VLSI) Syst. 27(12), 2802\u20132815 (2019). https:\/\/doi.org\/10.1109\/TVLSI.2019.2937365","journal-title":"IEEE Trans. Very Large Scale Integrat. (VLSI) Syst."},{"issue":"4","key":"2_CR47","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/s13389-017-0172-7","volume":"7","author":"S Picek","year":"2017","unstructured":"Picek, S., Heuser, A., Guilley, S.: Template attack versus bayes classifier. J. Cryptogr. Eng. 7(4), 343\u2013351 (2017). https:\/\/doi.org\/10.1007\/s13389-017-0172-7","journal-title":"J. Cryptogr. Eng."},{"key":"2_CR48","unstructured":"Picek, S., Heuser, A., Jovic, A., Batina, L., Legay, A.: The secrets of profiling for side-channel analysis: feature selection matters. IACR Cryptol. ePrint Arch. 2017, 1110 (2017). http:\/\/eprint.iacr.org\/2017\/1110"},{"key":"2_CR49","doi-asserted-by":"publisher","unstructured":"Picek, S., Heuser, A., Jovic, A., Bhasin, S., Regazzoni, F.: The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(1), 209\u2013237 (2018). https:\/\/doi.org\/10.13154\/tches.v2019.i1.209-237, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/7339","DOI":"10.13154\/tches.v2019.i1.209-237"},{"key":"2_CR50","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-030-15462-2_3","volume-title":"Smart Card Research and Advanced Applications","author":"S Picek","year":"2019","unstructured":"Picek, S., Heuser, A., Jovic, A., Knezevic, K., Richmond, T.: Improving side-channel analysis through semi-supervised learning. In: Bilgin, B., Fischer, J.-B. (eds.) CARDIS 2018. LNCS, vol. 11389, pp. 35\u201350. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-15462-2_3"},{"key":"2_CR51","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-319-57339-7_4","volume-title":"Progress in Cryptology - AFRICACRYPT 2017","author":"S Picek","year":"2017","unstructured":"Picek, S., Heuser, A., Jovic, A., Legay, A.: Climbing down the hierarchy: hierarchical classification for machine learning side-channel attacks. In: Joye, M., Nitaj, A. (eds.) AFRICACRYPT 2017. LNCS, vol. 10239, pp. 61\u201378. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-57339-7_4"},{"key":"2_CR52","doi-asserted-by":"publisher","unstructured":"Picek, S., et al.: Side-channel analysis and machine learning: a practical perspective. In: 2017 International Joint Conference on Neural Networks, IJCNN 2017, Anchorage, AK, USA, pp. 4095\u20134102 (2017). https:\/\/doi.org\/10.1109\/IJCNN.2017.7966373","DOI":"10.1109\/IJCNN.2017.7966373"},{"key":"2_CR53","doi-asserted-by":"publisher","unstructured":"Quisquater, J.-J., Samyde, D.: ElectroMagnetic analysis (EMA): measures and counter-measures for smart cards. In: Attali, I., Jensen, T. (eds.) E-smart 2001. LNCS, vol. 2140, pp. 200\u2013210. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45418-7_17, http:\/\/dl.acm.org\/citation.cfm?id=646803.705980","DOI":"10.1007\/3-540-45418-7_17"},{"key":"2_CR54","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/978-3-642-33027-8_10","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2012","author":"O Reparaz","year":"2012","unstructured":"Reparaz, O., Gierlichs, B., Verbauwhede, I.: Selecting time samples for multivariate DPA attacks. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol. 7428, pp. 155\u2013174. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33027-8_10"},{"issue":"2","key":"2_CR55","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., Adleman, L.M.: Method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"key":"2_CR56","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/978-3-642-24209-0_27","volume-title":"Information Security and Cryptology - ICISC 2010","author":"Y Souissi","year":"2011","unstructured":"Souissi, Y., Nassar, M., Guilley, S., Danger, J.-L., Flament, F.: First principal components analysis: a new side channel distinguisher. In: Rhee, K.-H., Nyang, D.H. (eds.) ICISC 2010. LNCS, vol. 6829, pp. 407\u2013419. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-24209-0_27"},{"key":"2_CR57","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-21476-4_1","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"R Specht","year":"2015","unstructured":"Specht, R., Heyszl, J., Kleinsteuber, M., Sigl, G.: Improving non-profiled attacks on exponentiations based on clustering and extracting leakage from multi-channel high-resolution EM measurements. In: Mangard, S., Poschmann, A.Y. (eds.) COSADE 2014. LNCS, vol. 9064, pp. 3\u201319. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-21476-4_1"},{"key":"2_CR58","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-0-387-71829-3_2","volume-title":"Secure Integrated Circuits and Systems","author":"FX Standaert","year":"2010","unstructured":"Standaert, F.X.: Introduction to side-channel attacks. In: Verbauwhede, I.M. (ed.) Secure Integrated Circuits and Systems, pp. 27\u201342. Springer, Boston (2010). https:\/\/doi.org\/10.1007\/978-0-387-71829-3_2"},{"key":"2_CR59","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/978-3-642-01001-9_26","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"F-X Standaert","year":"2009","unstructured":"Standaert, F.-X., Malkin, T.G., Yung, M.: A unified framework for the analysis of side-channel key recovery attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 443\u2013461. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-01001-9_26"},{"key":"2_CR60","doi-asserted-by":"publisher","unstructured":"S\u00f6nmez, B., Sar\u0131kaya, A.A., Bahtiyar, S.: Machine learning based side channel selection for time-driven cache attacks on AES. In: 2019 4th International Conference on Computer Science and Engineering (UBMK), pp. 1\u20135 (2019). https:\/\/doi.org\/10.1109\/UBMK.2019.8907211","DOI":"10.1109\/UBMK.2019.8907211"},{"key":"2_CR61","doi-asserted-by":"publisher","unstructured":"Tian, Q., Huss, S.A.: A general approach to power trace alignment for the assessment of side-channel resistance of hardened cryptosystems. In: 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 465\u2013470 (2012). https:\/\/doi.org\/10.1109\/IIH-MSP.2012.119","DOI":"10.1109\/IIH-MSP.2012.119"},{"key":"2_CR62","doi-asserted-by":"publisher","unstructured":"Timon, B.: Non-profiled deep learning-based side-channel attacks with sensitivity analysis. IACR Trans. Cryptogr. Hardw. Embedd. Syst. 2019(2), 107\u2013131 (2019). https:\/\/doi.org\/10.13154\/tches.v2019.i2.107-131, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/7387","DOI":"10.13154\/tches.v2019.i2.107-131"},{"key":"2_CR63","unstructured":"Witten, I.H., Frank, E., Hall, M.A.: Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann Series in Data Management Systems, 3 edn. Morgan Kaufmann, Amsterdam (2011). http:\/\/www.sciencedirect.com\/science\/book\/9780123748560"},{"key":"2_CR64","doi-asserted-by":"publisher","unstructured":"Yang, W., Cao, Y., Zhou, Y., Zhang, H., Zhang, Q.: Distance based leakage alignment for side channel attacks. IEEE Signal Process. Lett. 23(4), 419\u2013423 (2016). https:\/\/doi.org\/10.1109\/LSP.2016.2521441","DOI":"10.1109\/LSP.2016.2521441"},{"key":"2_CR65","doi-asserted-by":"publisher","unstructured":"Zheng, N., Xue, J.: Manifold Learning, pp. 87\u2013119. Springer, London (2009). https:\/\/doi.org\/10.1007\/978-1-84882-312-9_4","DOI":"10.1007\/978-1-84882-312-9_4"},{"key":"2_CR66","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-319-21966-0_15","volume-title":"Information and Communications Security","author":"Y Zheng","year":"2015","unstructured":"Zheng, Y., Zhou, Y., Yu, Z., Hu, C., Zhang, H.: How to compare selections of points of interest for side-channel distinguishers in practice? In: Hui, L.C.K., Qing, S.H., Shi, E., Yiu, S.M. (eds.) ICICS 2014. LNCS, vol. 8958, pp. 200\u2013214. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-21966-0_15"},{"key":"2_CR67","unstructured":"Zhou, Y., Feng, D.: Side-channel attacks: ten years after its publication and the impacts on cryptographic module security testing. IACR Cryptol. ePrint Arch. 2005, 388 (2005). https:\/\/dblp.org\/rec\/journals\/iacr\/ZhouF05"},{"key":"2_CR68","doi-asserted-by":"publisher","unstructured":"Zhuang, L., Zhou, F., Tygar, J.D.: Keyboard acoustic emanations revisited. ACM Trans. Inf. Syst. Secur. 13(1), 3:1\u20133:26 (2009). https:\/\/doi.org\/10.1145\/1609956.1609959","DOI":"10.1145\/1609956.1609959"},{"key":"2_CR69","doi-asserted-by":"publisher","unstructured":"\u00d6zgen, E., Papachristodoulou, L., Batina, L.: Template attacks using classification algorithms. In: 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 242\u2013247 (2016). https:\/\/doi.org\/10.1109\/HST.2016.7495589","DOI":"10.1109\/HST.2016.7495589"}],"container-title":["Lecture Notes in Computer Science","Security and Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-98795-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,7]],"date-time":"2022-04-07T18:04:45Z","timestamp":1649354685000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-98795-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030987947","9783030987954"],"references-count":69,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-98795-4_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"8 April 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}