{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T06:56:38Z","timestamp":1743144998065,"version":"3.40.3"},"publisher-location":"Cham","reference-count":60,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030987947"},{"type":"electronic","value":"9783030987954"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-98795-4_3","type":"book-chapter","created":{"date-parts":[[2022,4,7]],"date-time":"2022-04-07T18:03:58Z","timestamp":1649354638000},"page":"48-71","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Deep Learning on Side-Channel Analysis"],"prefix":"10.1007","author":[{"given":"Marina","family":"Kr\u010dek","sequence":"first","affiliation":[]},{"given":"Huimin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Servio","family":"Paguada","sequence":"additional","affiliation":[]},{"given":"Unai","family":"Rioja","sequence":"additional","affiliation":[]},{"given":"Lichao","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Guilherme","family":"Perin","sequence":"additional","affiliation":[]},{"given":"\u0141ukasz","family":"Chmielewski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,8]]},"reference":[{"issue":"1","key":"3_CR1","first-page":"1","volume":"2","author":"J An","year":"2015","unstructured":"An, J., Cho, S.: Variational autoencoder based anomaly detection using reconstruction probability. Spec. Lect. IE 2(1), 1\u201318 (2015)","journal-title":"Spec. Lect. IE"},{"key":"3_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11894063_1","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"C Archambeau","year":"2006","unstructured":"Archambeau, C., Peeters, E., Standaert, F.-X., Quisquater, J.-J.: Template attacks in principal subspaces. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 1\u201314. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11894063_1"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Bach, S., Binder, A., Montavon, G., Klauschen, F., M\u00fcller, K.R., Samek, W.: On pixel-wise explanations for non-linear classifier decisions by layer-wise relevance propagation. PloS One 10(7), e0130140 (2015)","DOI":"10.1371\/journal.pone.0130140"},{"key":"3_CR4","unstructured":"Bergstra, J., Bardenet, R., K\u00e9gl, B., Bengio, Y.: Algorithms for hyper-parameter optimization, December 2011"},{"key":"3_CR5","first-page":"281","volume":"13","author":"J Bergstra","year":"2012","unstructured":"Bergstra, J., Bengio, Y.: Random search for hyper-parameter optimization. J. Mach. Learn. Res. 13, 281\u2013305 (2012)","journal-title":"J. Mach. Learn. Res."},{"key":"3_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"E Brier","year":"2004","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16\u201329. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-28632-5_2"},{"key":"3_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-319-66787-4_3","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2017","author":"E Cagli","year":"2017","unstructured":"Cagli, E., Dumas, C., Prouff, E.: Convolutional neural networks with data augmentation against jitter-based countermeasures - Profiling Attacks Without Preprocessing. In: Fischer, W., Homma, N. (eds.) CHES 2017. LNCS, vol. 10529, pp. 45\u201368. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66787-4_3"},{"key":"3_CR8","doi-asserted-by":"publisher","unstructured":"Carbone, M., et al.: Deep learning to evaluate secure RSA implementations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(2), 132\u2013161 (2019). https:\/\/doi.org\/10.13154\/tches.v2019.i2.132-161, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/7388","DOI":"10.13154\/tches.v2019.i2.132-161"},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1007\/3-540-48405-1_26","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"S Chari","year":"1999","unstructured":"Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards sound approaches to counteract power-analysis attacks. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 398\u2013412. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_26"},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-36400-5_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S Chari","year":"2003","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski, B.S., Ko\u00e7, K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13\u201328. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36400-5_3"},{"key":"3_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-319-08302-5_17","volume-title":"Smart Card Research and Advanced Applications","author":"O Choudary","year":"2014","unstructured":"Choudary, O., Kuhn, M.G.: Efficient template attacks. In: Francillon, A., Rohatgi, P. (eds.) CARDIS 2013. LNCS, vol. 8419, pp. 253\u2013270. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-08302-5_17"},{"key":"3_CR12","series-title":"Information Security and Cryptography","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael: AES - The Advanced Encryption Standard","author":"J Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael: AES - The Advanced Encryption Standard. Information Security and Cryptography, 1st edn. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/978-3-662-04722-4","edition":"1"},{"key":"3_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/978-3-319-27998-5_11","volume-title":"Trusted Systems","author":"G Fan","year":"2015","unstructured":"Fan, G., Zhou, Y., Zhang, H., Feng, D.: How to choose interesting points for template attacks more effectively? In: Yung, M., Zhu, L., Yang, Y. (eds.) INTRUST 2014. LNCS, vol. 9473, pp. 168\u2013183. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-27998-5_11"},{"key":"3_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/3-540-48059-5_15","volume-title":"Cryptographic Hardware and Embedded Systems","author":"L Goubin","year":"1999","unstructured":"Goubin, L., Patarin, J.: DES and differential power analysis the \u201cduplication\u2019\u2019 method. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 158\u2013172. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48059-5_15"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Graves, A., Mohamed, A., Hinton, G.: Speech recognition with deep recurrent neural networks. In: 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 6645\u20136649 (2013)","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"3_CR16","doi-asserted-by":"publisher","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition, pp. 770\u2013778, June 2016. https:\/\/doi.org\/10.1109\/CVPR.2016.90","DOI":"10.1109\/CVPR.2016.90"},{"key":"3_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1007\/978-3-030-10970-7_22","volume-title":"Selected Areas in Cryptography - SAC 2018","author":"B Hettwer","year":"2018","unstructured":"Hettwer, B., Gehrer, S., G\u00fcneysu, T.: Profiled power analysis attacks using convolutional neural networks with domain knowledge. In: Cid, C., Jacobson, M., Jr. (eds.) SAC 2018. LNCS, vol. 11349, pp. 479\u2013498. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-10970-7_22"},{"key":"3_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1007\/978-3-030-38471-5_26","volume-title":"Selected Areas in Cryptography \u2013 SAC 2019","author":"B Hettwer","year":"2020","unstructured":"Hettwer, B., Gehrer, S., G\u00fcneysu, T.: Deep neural network attribution methods for leakage analysis and symmetric key recovery. In: Paterson, K.G., Stebila, D. (eds.) SAC 2019. LNCS, vol. 11959, pp. 645\u2013666. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-38471-5_26"},{"key":"3_CR19","unstructured":"Kim, J., Picek, S., Heuser, A., Bhasin, S., Hanjalic, A.: Make some noise: unleashing the power of convolutional neural networks for profiled side-channel analysis. Cryptology ePrint Archive, Report 2018\/1023 (2018). https:\/\/eprint.iacr.org\/2018\/1023"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Kim, J., Picek, S., Heuser, A., Bhasin, S., Hanjalic, A.: Make some noise. unleashing the power of convolutional neural networks for profiled side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 148\u2013179 (2019)","DOI":"10.46586\/tches.v2019.i3.148-179"},{"issue":"177","key":"3_CR21","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203\u2013209 (1987)","journal-title":"Math. Comput."},{"key":"3_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_25"},{"key":"3_CR23","doi-asserted-by":"publisher","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.: ImageNet classification with deep convolutional neural networks. Neural Inf. Process. Syst. 25 (2012). https:\/\/doi.org\/10.1145\/3065386","DOI":"10.1145\/3065386"},{"key":"3_CR24","unstructured":"Kwon, D., Kim, H., Hong, S.: Improving non-profiled side-channel attacks using autoencoder based preprocessing (2020)"},{"key":"3_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/978-3-319-21476-4_2","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"L Lerman","year":"2015","unstructured":"Lerman, L., Poussier, R., Bontempi, G., Markowitch, O., Standaert, F.-X.: Template attacks vs. machine learning revisited (and the curse of dimensionality in side-channel analysis). In: Mangard, S., Poschmann, A.Y. (eds.) COSADE 2014. LNCS, vol. 9064, pp. 20\u201333. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-21476-4_2"},{"key":"3_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-49445-6_1","volume-title":"Security, Privacy, and Applied Cryptography Engineering","author":"H Maghrebi","year":"2016","unstructured":"Maghrebi, H., Portigliatti, T., Prouff, E.: Breaking cryptographic implementations using deep learning techniques. In: Carlet, C., Hasan, M.A., Saraswat, V. (eds.) SPACE 2016. LNCS, vol. 10076, pp. 3\u201326. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-49445-6_1"},{"key":"3_CR27","series-title":"Advances in Information Security","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-38162-6","volume-title":"Power Analysis Attacks: Revealing the Secrets of Smart Cards","author":"S Mangard","year":"2007","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards. Advances in Information Security, Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-0-387-38162-6"},{"key":"3_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1007\/978-3-319-08302-5_7","volume-title":"Smart Card Research and Advanced Applications","author":"Z Martinasek","year":"2014","unstructured":"Martinasek, Z., Hajny, J., Malina, L.: Optimization of power analysis using neural network. In: Francillon, A., Rohatgi, P. (eds.) CARDIS 2013. LNCS, vol. 8419, pp. 94\u2013107. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-08302-5_7"},{"key":"3_CR29","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/978-3-319-15765-8_18","volume-title":"Computational Problems in Science and Engineering","author":"Z Martinasek","year":"2015","unstructured":"Martinasek, Z., Malina, L., Trasy, K.: Profiling power analysis attack based on multi-layer perceptron network. In: Mastorakis, N., Bulucea, A., Tsekouras, G. (eds.) Computational Problems in Science and Engineering. LNEE, vol. 343, pp. 317\u2013339. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-15765-8_18"},{"key":"3_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-030-16350-1_9","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"L Masure","year":"2019","unstructured":"Masure, L., Dumas, C., Prouff, E.: Gradient visualization for general characterization in profiling attacks. In: Polian, I., St\u00f6ttinger, M. (eds.) COSADE 2019. LNCS, vol. 11421, pp. 145\u2013167. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-16350-1_9"},{"key":"3_CR31","doi-asserted-by":"publisher","unstructured":"Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417\u2013426. Springer, Heidelberg (1986). https:\/\/doi.org\/10.1007\/3-540-39799-X_31, http:\/\/dl.acm.org\/citation.cfm?id=18262.25413","DOI":"10.1007\/3-540-39799-X_31"},{"issue":"2","key":"3_CR32","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1111\/exsy.12019","volume":"31","author":"V Mirchevska","year":"2014","unstructured":"Mirchevska, V., Lu\u0161trek, M., Gams, M.: Combining domain knowledge and machine learning for robust fall detection. Expert. Syst. 31(2), 163\u2013175 (2014)","journal-title":"Expert. Syst."},{"key":"3_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1007\/978-3-642-27257-8_17","volume-title":"Smart Card Research and Advanced Applications","author":"RA Muijrers","year":"2011","unstructured":"Muijrers, R.A., van Woudenberg, J.G.J., Batina, L.: RAM: rapid alignment method. In: Prouff, E. (ed.) CARDIS 2011. LNCS, vol. 7079, pp. 266\u2013282. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-27257-8_17"},{"key":"3_CR34","doi-asserted-by":"publisher","unstructured":"Perin, G., Chmielewski, L., Batina, L., Picek, S.: Keep it unsupervised: horizontal attacks meet deep learning. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(1), 343\u2013372 (2021). https:\/\/doi.org\/10.46586\/tches.v2021.i1.343-372","DOI":"10.46586\/tches.v2021.i1.343-372"},{"key":"3_CR35","doi-asserted-by":"publisher","unstructured":"Perin, G., Chmielewski, \u0141., Picek, S.: Strength in numbers: improving generalization with ensembles in machine learning-based profiled side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(4), 337\u2013364 (2020). https:\/\/doi.org\/10.13154\/tches.v2020.i4.337-364, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/8686","DOI":"10.13154\/tches.v2020.i4.337-364"},{"key":"3_CR36","unstructured":"Perin, G., Picek, S.: On the influence of optimizers in deep learning-based side-channel analysis. IACR Cryptol. ePrint Arch. 2020, 977 (2020). https:\/\/eprint.iacr.org\/2020\/977"},{"key":"3_CR37","unstructured":"Picek, S., Heuser, A., Guilley, S.: Profiling side-channel analysis in the restricted attacker framework. IACR Cryptol. ePrint Arch. 2019, 168 (2019). https:\/\/eprint.iacr.org\/2019\/168"},{"key":"3_CR38","doi-asserted-by":"publisher","unstructured":"Picek, S., Heuser, A., Jovic, A., Bhasin, S., Regazzoni, F.: The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(1), 209\u2013237 (2019). https:\/\/doi.org\/10.13154\/tches.v2019.i1.209-237","DOI":"10.13154\/tches.v2019.i1.209-237"},{"key":"3_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/978-3-030-05072-6_10","volume-title":"Security, Privacy, and Applied Cryptography Engineering","author":"S Picek","year":"2018","unstructured":"Picek, S., Samiotis, I.P., Kim, J., Heuser, A., Bhasin, S., Legay, A.: On the performance of convolutional neural networks for side-channel analysis. In: Chattopadhyay, A., Rebeiro, C., Yarom, Y. (eds.) SPACE 2018. LNCS, vol. 11348, pp. 157\u2013176. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-05072-6_10"},{"key":"3_CR40","unstructured":"Prouff, E., Strullu, R., Benadjila, R., Cagli, E., Dumas, C.: Study of deep learning techniques for side-channel analysis and introduction to ascad database. Cryptology ePrint Archive, Report 2018\/053 (2018). https:\/\/eprint.iacr.org\/2018\/053"},{"key":"3_CR41","doi-asserted-by":"publisher","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978). https:\/\/doi.org\/10.1145\/359340.359342, http:\/\/doi.acm.org\/10.1145\/359340.359342","DOI":"10.1145\/359340.359342"},{"key":"3_CR42","doi-asserted-by":"crossref","unstructured":"Rumelhart, D.E., Hinton, G.E., Williams, R.J.: Learning internal representations by error propagation. Technical report, California Univ San Diego La Jolla Inst for Cognitive Science (1985)","DOI":"10.21236\/ADA164453"},{"key":"3_CR43","doi-asserted-by":"publisher","unstructured":"Shu, H., Zhu, H.: Sensitivity analysis of deep neural networks. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 33, pp. 4943\u20134950 (2019). https:\/\/doi.org\/10.1609\/aaai.v33i01.33014943, http:\/\/dx.doi.org\/10.1609\/aaai.v33i01.33014943","DOI":"10.1609\/aaai.v33i01.33014943"},{"key":"3_CR44","unstructured":"Simonyan, K., Vedaldi, A., Zisserman, A.: Deep inside convolutional networks: visualising image classification models and saliency maps. Preprint, December 2013"},{"key":"3_CR45","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. arXiv:1409.1556, September 2014"},{"key":"3_CR46","unstructured":"Srivastava, N., Hinton, G., Krizhevsky, A., Sutskever, I., Salakhutdinov, R.: Dropout: a simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. 15(56), 1929\u20131958 (2014). http:\/\/jmlr.org\/papers\/v15\/srivastava14a.html"},{"key":"3_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/978-3-642-01001-9_26","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"F-X Standaert","year":"2009","unstructured":"Standaert, F.-X., Malkin, T.G., Yung, M.: A unified framework for the analysis of side-channel key recovery attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 443\u2013461. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-01001-9_26"},{"key":"3_CR48","doi-asserted-by":"publisher","unstructured":"Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., Wojna, Z.: Rethinking the inception architecture for computer vision, June 2016. https:\/\/doi.org\/10.1109\/CVPR.2016.308","DOI":"10.1109\/CVPR.2016.308"},{"key":"3_CR49","unstructured":"Theis, L., Shi, W., Cunningham, A., Husz\u00e1r, F.: Lossy image compression with compressive autoencoders. arXiv preprint arXiv:1703.00395 (2017)"},{"key":"3_CR50","doi-asserted-by":"publisher","unstructured":"Timon, B.: Non-profiled deep learning-based side-channel attacks with sensitivity analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(2), 107\u2013131 (2019). https:\/\/doi.org\/10.13154\/tches.v2019.i2.107-131","DOI":"10.13154\/tches.v2019.i2.107-131"},{"key":"3_CR51","unstructured":"van der Valk, D., Picek, S., Bhasin, S.: Kilroy was here: the first step towards explainability of neural networks in profiled side-channel analysis. IACR Cryptol. ePrint Arch. 2019, 1477 (2019). https:\/\/eprint.iacr.org\/2019\/1477"},{"key":"3_CR52","doi-asserted-by":"crossref","unstructured":"Wang, D., Mao, K., Ng, G.W.: Convolutional neural networks and multimodal fusion for text aided image classification. In: 2017 20th International Conference on Information Fusion (Fusion), pp. 1\u20137. IEEE (2017)","DOI":"10.23919\/ICIF.2017.8009768"},{"key":"3_CR53","first-page":"505","volume":"2019","author":"F Wegener","year":"2019","unstructured":"Wegener, F., Moos, T., Moradi, A.: DL-LA: deep learning leakage assessment: a modern roadmap for SCA evaluations. IACR Cryptol. ePrint Arch. 2019, 505 (2019)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"3_CR54","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-030-35869-3_8","volume-title":"Security, Privacy, and Applied Cryptography Engineering","author":"L Weissbart","year":"2019","unstructured":"Weissbart, L., Picek, S., Batina, L.: One trace is all it takes: machine learning-based side-channel attack on EdDSA. In: Bhasin, S., Mendelson, A., Nandi, M. (eds.) SPACE 2019. LNCS, vol. 11947, pp. 86\u2013105. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-35869-3_8"},{"key":"3_CR55","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/978-3-642-19074-2_8","volume-title":"Topics in Cryptology \u2013 CT-RSA 2011","author":"JGJ van Woudenberg","year":"2011","unstructured":"van Woudenberg, J.G.J., Witteman, M.F., Bakker, B.: Improving differential power analysis by elastic alignment. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 104\u2013119. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19074-2_8"},{"key":"3_CR56","doi-asserted-by":"publisher","unstructured":"Wu, L., Picek, S.: Remove some noise: on pre-processing of side-channel measurements with autoencoders. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(4), 389\u2013415 (2020). https:\/\/doi.org\/10.13154\/tches.v2020.i4.389-415","DOI":"10.13154\/tches.v2020.i4.389-415"},{"key":"3_CR57","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-030-15462-2_1","volume-title":"Smart Card Research and Advanced Applications","author":"G Yang","year":"2019","unstructured":"Yang, G., Li, H., Ming, J., Zhou, Y.: Convolutional neural network based side-channel attacks in time-frequency representations. In: Bilgin, B., Fischer, J.-B. (eds.) CARDIS 2018. LNCS, vol. 11389, pp. 1\u201317. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-15462-2_1"},{"issue":"1","key":"3_CR58","first-page":"1","volume":"2020","author":"G Zaid","year":"2019","unstructured":"Zaid, G., Bossuet, L., Habrard, A., Venelli, A.: Methodology for efficient CNN architectures in profiling attacks. IACR Trans. Cryptogr. Hardw. Embedd. Syst. 2020(1), 1\u201336 (2019)","journal-title":"IACR Trans. Cryptogr. Hardw. Embedd. Syst."},{"key":"3_CR59","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"818","DOI":"10.1007\/978-3-319-10590-1_53","volume-title":"Computer Vision \u2013 ECCV 2014","author":"MD Zeiler","year":"2014","unstructured":"Zeiler, M.D., Fergus, R.: Visualizing and understanding convolutional networks. In: Fleet, D., Pajdla, T., Schiele, B., Tuytelaars, T. (eds.) ECCV 2014. LNCS, vol. 8689, pp. 818\u2013833. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10590-1_53"},{"key":"3_CR60","doi-asserted-by":"publisher","unstructured":"Zhang, J., Zheng, M., Nan, J., Hu, H., Yu, N.: A novel evaluation metric for deep learning-based side channel analysis and its extended application to imbalanced data. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3), 73\u201396 (2020). https:\/\/doi.org\/10.13154\/tches.v2020.i3.73-96","DOI":"10.13154\/tches.v2020.i3.73-96"}],"container-title":["Lecture Notes in Computer Science","Security and Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-98795-4_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,7]],"date-time":"2022-04-07T18:04:31Z","timestamp":1649354671000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-98795-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030987947","9783030987954"],"references-count":60,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-98795-4_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"8 April 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}