{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T03:24:57Z","timestamp":1742959497329,"version":"3.40.3"},"publisher-location":"Cham","reference-count":57,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030997656"},{"type":"electronic","value":"9783030997663"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-99766-3_1","type":"book-chapter","created":{"date-parts":[[2022,3,25]],"date-time":"2022-03-25T18:20:19Z","timestamp":1648232419000},"page":"3-28","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Machine-Learning Assisted Side-Channel Attacks on RNS ECC Implementations Using Hybrid Feature Engineering"],"prefix":"10.1007","author":[{"given":"Naila","family":"Mukhtar","sequence":"first","affiliation":[]},{"given":"Louiza","family":"Papachristodoulou","sequence":"additional","affiliation":[]},{"given":"Apostolos P.","family":"Fournaris","sequence":"additional","affiliation":[]},{"given":"Lejla","family":"Batina","sequence":"additional","affiliation":[]},{"given":"Yinan","family":"Kong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,26]]},"reference":[{"unstructured":"Inspector SCA tool. https:\/\/www.riscure.com\/security-tools\/inspector-sca. Accessed 08 Feb 2022","key":"1_CR1"},{"unstructured":"National Computational Infrastructure Australia. https:\/\/nci.org.au\/our-services\/supercomputing. Accessed 08 Feb 2022","key":"1_CR2"},{"key":"1_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/978-3-030-34618-8_10","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2019","author":"C Andrikos","year":"2019","unstructured":"Andrikos, C., et al.: Location, location, location: revisiting modeling and exploitation for location-based side channel leakages. In: Galbraith, S.D., Moriai, S. (eds.) ASIACRYPT 2019, Part III. LNCS, vol. 11923, pp. 285\u2013314. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-34618-8_10"},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11894063_1","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"C Archambeau","year":"2006","unstructured":"Archambeau, C., Peeters, E., Standaert, F.-X., Quisquater, J.-J.: Template attacks in principal subspaces. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 1\u201314. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11894063_1"},{"unstructured":"Bajard, J.-C., Duquesne, S., Meloni, N.: Combining Montgomery Ladder for Elliptic Curves defined over Fp and RNS Representation. In Research Report 06041 (2006)","key":"1_CR5"},{"doi-asserted-by":"crossref","unstructured":"Bajard, J.-C., Eynard, J., Gandino, F.: Fault detection in RNS Montgomery modular multiplication. In: IEEE 21st Symposium on Computer Arithmetic, pp. 119\u2013126. IEEE (2013)","key":"1_CR6","DOI":"10.1109\/ARITH.2013.31"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-540-28632-5_5","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"J-C Bajard","year":"2004","unstructured":"Bajard, J.-C., Imbert, L., Liardet, P.-Y., Teglia, Y.: Leak resistant arithmetic. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 62\u201375. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-28632-5_5"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/978-3-642-27954-6_24","volume-title":"Topics in Cryptology \u2013 CT-RSA 2012","author":"L Batina","year":"2012","unstructured":"Batina, L., Hogenboom, J., van Woudenberg, J.G.J.: Getting more from PCA: first results of using principal component analysis for extensive power analysis. In: Dunkelman, O. (ed.) CT-RSA 2012. LNCS, vol. 7178, pp. 383\u2013397. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-27954-6_24"},{"key":"1_CR9","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1109\/34.598228","volume":"19","author":"P Belhumeur","year":"1997","unstructured":"Belhumeur, P., Hespanha, J., Kriegman, D.: Eigenfaces vs. Fisherfaces: recognition using class specific linear projection. IEEE Trans. Pattern Anal. Mach. Intell. 19, 711\u2013720 (1997)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"1_CR10","first-page":"163","volume":"11","author":"R Benadjila","year":"2019","unstructured":"Benadjila, R., Prouff, E., Strullu, R., Cagli, E., Dumas, C.: Deep learning for side-channel analysis and introduction to ASCAD database. J. Cryptogr. Eng. 11, 163\u2013188 (2019)","journal-title":"J. Cryptogr. Eng."},{"issue":"1\u20132","key":"1_CR11","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/S0004-3702(97)00063-5","volume":"97","author":"AL Blum","year":"1997","unstructured":"Blum, A.L., Langley, P.: Selection of relevant features and examples in machine learning. Artif. Intell. 97(1\u20132), 245\u2013271 (1997)","journal-title":"Artif. Intell."},{"issue":"1","key":"1_CR12","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001). https:\/\/doi.org\/10.1023\/A:1010933404324","journal-title":"Mach. Learn."},{"key":"1_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-319-66787-4_3","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2017","author":"E Cagli","year":"2017","unstructured":"Cagli, E., Dumas, C., Prouff, E.: Convolutional neural networks with data augmentation against jitter-based countermeasures. In: Fischer, W., Homma, N. (eds.) CHES 2017. LNCS, vol. 10529, pp. 45\u201368. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66787-4_3"},{"issue":"2","key":"1_CR14","doi-asserted-by":"publisher","first-page":"132","DOI":"10.46586\/tches.v2019.i2.132-161","volume":"2019","author":"M Carbone","year":"2019","unstructured":"Carbone, M., et al.: Deep learning to evaluate secure RSA implementations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(2), 132\u2013161 (2019)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"1_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-36400-5_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S Chari","year":"2003","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski, B.S., Ko\u00e7, K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13\u201328. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36400-5_3"},{"key":"1_CR16","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"N Chawla","year":"2002","unstructured":"Chawla, N., Bowyer, R., Hall, L., Kegelmeyer, W.: SMOTE: synthetic minority over-sampling technique. J. Artif. Intell. Res. (JAIR) 16, 321\u2013357 (2002)","journal-title":"J. Artif. Intell. Res. (JAIR)"},{"unstructured":"Chollet, F.: Keras (2015). https:\/\/keras.io","key":"1_CR17"},{"unstructured":"Ciet, M., Neve, M., Peeters, E., Quisquater, J.-J.: Parallel FPGA implementation of RSA with residue number systems - Can Side-channel threats be avoided? In Cryptology ePrint Archive, Report 2004\/187 (2004)","key":"1_CR18"},{"issue":"3","key":"1_CR19","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273\u2013297 (1995)","journal-title":"Mach. Learn."},{"issue":"5\u20136","key":"1_CR20","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1016\/j.compeleceng.2007.05.009","volume":"33","author":"E De Mulder","year":"2007","unstructured":"De Mulder, E., \u00d6rs, S.B., Preneel, B., Verbauwhede, I.: Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems. Comput. Electr. Eng. 33(5\u20136), 367\u2013382 (2007)","journal-title":"Comput. Electr. Eng."},{"key":"1_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1007\/978-3-642-55220-5_26","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2014","author":"F Durvaux","year":"2014","unstructured":"Durvaux, F., Standaert, F.-X., Veyrat-Charvillon, N.: How to certify the leakage of a chip? In: Nguyen, P.Q., Oswald, E. (eds.) EUROCRYPT 2014. LNCS, vol. 8441, pp. 459\u2013476. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-55220-5_26https:\/\/www.iacr.org\/archive\/eurocrypt2014\/84410138\/84410138.pdf"},{"unstructured":"Apostolos P. Fournaris. RNS_LRA_EC_scalar Multiplier (2018). https:\/\/github.com\/afournaris\/RNS_LRA_EC_Scalar_Multiplier","key":"1_CR22"},{"doi-asserted-by":"crossref","unstructured":"Fournaris, A.P., Klaoudatos, N., Sklavos, N., Koulamas, C.: Fault and power analysis attack resistant RNS based edwards curve point multiplication. In: Proceedings of the 2nd Workshop on Cryptography and Security in Computing Systems, CS2 at HiPEAC 2015, Amsterdam, Netherlands, 19\u201321 January 2015, pp. 43\u201346 (2015)","key":"1_CR23","DOI":"10.1145\/2694805.2694814"},{"doi-asserted-by":"crossref","unstructured":"Fournaris, A.P., Papachristodoulou, L., Batina, L., Sklavos, N.: Residue number system as a side channel and fault injection attack countermeasure in elliptic curve cryptography. In: 2016 International Conference on Design and Technology of Integrated Systems in Nanoscale Era (DTIS), pp. 1\u20134 (2016)","key":"1_CR24","DOI":"10.1109\/DTIS.2016.7483807"},{"doi-asserted-by":"crossref","unstructured":"Fournaris, A.P., Papachristodoulou, L., Sklavos, N.: Secure and efficient RNS software implementation for elliptic curve cryptography. In: 2017 IEEE European Symposium on Security and Privacy Work., pp. 86\u201393. IEEE (2017)","key":"1_CR25","DOI":"10.1109\/EuroSPW.2017.56"},{"key":"1_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/978-3-540-85053-3_26","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"F-X Standaert","year":"2008","unstructured":"Standaert, F.-X., Archambeau, C.: Using subspace-based template attacks to compare and combine power and electromagnetic information leakages. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 411\u2013425. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85053-3_26"},{"key":"1_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1007\/978-3-662-44371-2_25","volume-title":"Advances in Cryptology \u2013 CRYPTO 2014","author":"D Genkin","year":"2014","unstructured":"Genkin, D., Shamir, A., Tromer, E.: RSA key extraction via low-bandwidth acoustic cryptanalysis. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014. LNCS, vol. 8616, pp. 444\u2013461. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44371-2_25"},{"doi-asserted-by":"crossref","unstructured":"Gilmore, R., Hanley, N., O\u2019Neill, M.: Neural network based attack on a masked implementation of AES. In 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 106\u201311. Institute of Electrical and Electronics Engineers (IEEE) (2015)","key":"1_CR28","DOI":"10.1109\/HST.2015.7140247"},{"key":"1_CR29","doi-asserted-by":"publisher","first-page":"2720","DOI":"10.1109\/TVLSI.2019.2926324","volume":"27","author":"A Golder","year":"2019","unstructured":"Golder, A., Das, D., Danial, J., Ghosh, S., Sen, S., Raychowdhury, A.: Practical approaches toward deep-learning-based cross-device power side-channel attack. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 27, 2720\u20132733 (2019)","journal-title":"IEEE Trans. Very Large Scale Integr. (VLSI) Syst."},{"unstructured":"Goodwill, G., Jun, B., Jaffe, J., Rohatgi, P.: A testing methodology for side channel resistance validation. In: NIST Noninvasive Attack Testing Workshop (2011)","key":"1_CR30"},{"key":"1_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-319-10175-0_11","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"G Perin","year":"2014","unstructured":"Perin, G., Imbert, L., Torres, L., Maurine, P.: Attacking randomized exponentiations using unsupervised learning. In: Prouff, E. (ed.) COSADE 2014. LNCS, vol. 8622, pp. 144\u2013160. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10175-0_11"},{"unstructured":"Guillermin, N.: A Coprocessor for Secure and High Speed Modular Arithmetic. IACR Cryptology ePrint Archive (2011)","key":"1_CR32"},{"issue":"4","key":"1_CR33","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/s13389-011-0023-x","volume":"1","author":"G Hospodar","year":"2011","unstructured":"Hospodar, G., Gierlichs, B., De Mulder, E., Verbauwhede, I., Vandewalle, J.: Machine learning in side-channel analysis: a first study. J. Crypt. Eng. 1(4), 293 (2011)","journal-title":"J. Crypt. Eng."},{"doi-asserted-by":"crossref","unstructured":"James, G., Witten, D., Hastie, T., Tibshirani, R.: An Introduction to Statistical Learning: With Applications in R, August 2013","key":"1_CR34","DOI":"10.1007\/978-1-4614-7138-7"},{"doi-asserted-by":"crossref","unstructured":"John, G.H., Kohavi, R., Pfleger, K.: Irrelevant features and the subset selection problem. In: Proceedings of the Eleventh International Conference on International Conference on Machine Learning, ICML 1994, pp. 121\u2013129, San Francisco, CA, USA. Morgan Kaufmann Publishers Inc. (1994)","key":"1_CR35","DOI":"10.1016\/B978-1-55860-335-6.50023-4"},{"key":"1_CR36","doi-asserted-by":"publisher","first-page":"1094","DOI":"10.1007\/978-3-642-04898-2_455","volume-title":"Principal Component Analysis","author":"I Jolliffe","year":"2011","unstructured":"Jolliffe, I.: Principal Component Analysis, pp. 1094\u20131096. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-04898-2_455"},{"key":"1_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/3-540-36400-5_22","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"M Joye","year":"2003","unstructured":"Joye, M., Yen, S.-M.: The Montgomery powering ladder. In: Kaliski, B.S., Ko\u00e7, K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 291\u2013302. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36400-5_22"},{"issue":"3","key":"1_CR38","doi-asserted-by":"publisher","first-page":"148","DOI":"10.46586\/tches.v2019.i3.148-179","volume":"2019","author":"J Kim","year":"2019","unstructured":"Kim, J., Picek, S., Heuser, A., Bhasin, S., Hanjalic, A.: Make some noise. unleashing the power of convolutional neural networks for profiled side-channel analysis. IACR Trans. Crypt. Hardw. Embed. Syst. 2019(3), 148\u2013179 (2019)","journal-title":"IACR Trans. Crypt. Hardw. Embed. Syst."},{"key":"1_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_25"},{"issue":"1\u20132","key":"1_CR40","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/S0004-3702(97)00043-X","volume":"97","author":"R Kohavi","year":"1997","unstructured":"Kohavi, R., John, G.H.: Wrappers for feature subset selection. Artif. Intell. 97(1\u20132), 273\u2013324 (1997)","journal-title":"Artif. Intell."},{"unstructured":"Langley, P., Iba, W.: Average-case analysis of a nearest neighbor algorithm. In: Proceedings of the 13th International Joint Conference on Artificial Intelligence - Volume 2, IJCAI 1993, pp. 889\u2013894, San Francisco, CA, USA (1993). Morgan Kaufmann Publishers Inc","key":"1_CR41"},{"key":"1_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/3-540-46805-6_19","volume-title":"Shape, Contour and Grouping in Computer Vision","author":"Y LeCun","year":"1999","unstructured":"LeCun, Y., Haffner, P., Bottou, L., Bengio, Y.: Object recognition with gradient-based learning. In: Shape, Contour and Grouping in Computer Vision. LNCS, vol. 1681, pp. 319\u2013345. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-46805-6_19"},{"doi-asserted-by":"crossref","unstructured":"Maghrebi, H., Portigliatti, T., Prouff, E.: Breaking cryptographic implementations using deep learning techniques. IACR Cryptology ePrint Archive 2016, p. 921 (2016)","key":"1_CR43","DOI":"10.1007\/978-3-319-49445-6_1"},{"unstructured":"Markowitch, O., Lerman, L., Bontempi, G.: Side channel attack: an approach based on machine learning. In: Constructive Side-Channel Analysis and Secure Design, COSADE (2011)","key":"1_CR44"},{"key":"1_CR45","doi-asserted-by":"publisher","first-page":"59533","DOI":"10.1109\/ACCESS.2020.2983020","volume":"8","author":"P Martins","year":"2020","unstructured":"Martins, P., Sousa, L.: The role of non-positional arithmetic on efficient emerging cryptographic algorithms. IEEE Access 8, 59533\u201359549 (2020)","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"Masure, L., Dumas, C., Prouff, E.: A comprehensive study of deep learning for side-channel analysis. IACR Trans. Crypt. Hardw. Embed. Syst. 348\u2013375 (2020)","key":"1_CR46","DOI":"10.46586\/tches.v2020.i1.348-375"},{"key":"1_CR47","doi-asserted-by":"publisher","first-page":"64","DOI":"10.3390\/app9010064","volume":"9","author":"N Mukhtar","year":"2018","unstructured":"Mukhtar, N., Mehrabi, A., Kong, Y., Anjum, A.: Machine-learning-based side-channel evaluation of elliptic-curve cryptographic FPGA processor. Appl. Sci. 9, 64 (2018)","journal-title":"Appl. Sci."},{"issue":"1","key":"1_CR48","doi-asserted-by":"publisher","first-page":"259","DOI":"10.46586\/tches.v2019.i1.259-282","volume":"2019","author":"L Papachristodoulou","year":"2018","unstructured":"Papachristodoulou, L., Fournaris, A.P., Papagiannopoulos, K., Batina, L.: Practical evaluation of protected residue number system scalar multiplication. IACR Trans. Crypt. Hardw. Embed. Syst. 2019(1), 259\u2013282 (2018)","journal-title":"IACR Trans. Crypt. Hardw. Embed. Syst."},{"key":"1_CR49","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., et al.: Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)","journal-title":"J. Mach. Learn. Res."},{"key":"1_CR50","doi-asserted-by":"publisher","first-page":"2802","DOI":"10.1109\/TVLSI.2019.2937365","volume":"27","author":"S Picek","year":"2019","unstructured":"Picek, S., Heuser, A., Jovic, A., Batina, L.: A systematic evaluation of profiling through focused feature selection. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 27, 2802\u20132815 (2019)","journal-title":"IEEE Trans. Very Large Scale Integr. (VLSI) Syst."},{"issue":"1","key":"1_CR51","first-page":"209","volume":"2019","author":"S Picek","year":"2019","unstructured":"Picek, S., Heuser, A., Jovic, A., Bhasin, S., Regazzoni, F.: The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(1), 209\u2013237 (2019)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"issue":"C","key":"1_CR52","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.neunet.2014.09.003","volume":"61","author":"J Schmidhuber","year":"2015","unstructured":"Schmidhuber, J.: Deep learning in neural networks. Neural Netw 61(C), 85\u2013117 (2015)","journal-title":"Neural Netw"},{"issue":"6","key":"1_CR53","doi-asserted-by":"publisher","first-page":"1947","DOI":"10.1021\/ci034160g","volume":"43","author":"V Svetnik","year":"2003","unstructured":"Svetnik, V., Liaw, A., Tong, C., Christopher Culberson, J., Sheridan, R.P., Feuston, B.P.: Random forest: a classification and regression tool for compound classification and QSAR modeling. J. Chem. Inf. Comput. Sci. 43(6), 1947\u20131958 (2003)","journal-title":"J. Chem. Inf. Comput. Sci."},{"issue":"8","key":"1_CR54","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1109\/34.531802","volume":"18","author":"DL Swets","year":"1996","unstructured":"Swets, D.L., Weng, J.: Using discriminant eigenfeatures for image retrieval. IEEE Trans. Pattern Anal. Mach. Intell. 18(8), 831\u2013836 (1996)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"1_CR55","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-030-35869-3_8","volume-title":"Security, Privacy, and Applied Cryptography Engineering","author":"L Weissbart","year":"2019","unstructured":"Weissbart, L., Picek, S., Batina, L.: One trace is all it takes: machine learning-based side-channel attack on EdDSA. In: Bhasin, S., Mendelson, A., Nandi, M. (eds.) SPACE 2019. LNCS, vol. 11947, pp. 86\u2013105. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-35869-3_8"},{"issue":"1","key":"1_CR56","first-page":"1","volume":"2020","author":"G Zaid","year":"2019","unstructured":"Zaid, G., Bossuet, L., Habrard, A., Venelli, A.: Methodology for efficient CNN architectures in profiling attacks. IACR Trans. Crypt. Hardw. Embedd. Syst. 2020(1), 1\u201336 (2019)","journal-title":"IACR Trans. Crypt. Hardw. Embedd. Syst."},{"doi-asserted-by":"crossref","unstructured":"Zeng, Z., Gu, D., Liu, J., Guo, Z.: An improved side-channel attack based on support vector machine. In: 2014 Tenth International Conference on Computational Intelligence and Security, pp. 676\u2013680, November 2014","key":"1_CR57","DOI":"10.1109\/CIS.2014.80"}],"container-title":["Lecture Notes in Computer Science","Constructive Side-Channel Analysis and Secure Design"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-99766-3_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,21]],"date-time":"2024-09-21T01:04:13Z","timestamp":1726880653000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-99766-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030997656","9783030997663"],"references-count":57,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-99766-3_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"26 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"COSADE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Constructive Side-Channel Analysis and Secure Design","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Leuven","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Belgium","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 April 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 April 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cosade2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.cosade.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}