{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T08:01:12Z","timestamp":1767772872122,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030997656"},{"type":"electronic","value":"9783030997663"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-99766-3_3","type":"book-chapter","created":{"date-parts":[[2022,3,25]],"date-time":"2022-03-25T18:20:19Z","timestamp":1648232419000},"page":"49-71","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["On the\u00a0Evaluation of\u00a0Deep Learning-Based Side-Channel Analysis"],"prefix":"10.1007","author":[{"given":"Lichao","family":"Wu","sequence":"first","affiliation":[]},{"given":"Guilherme","family":"Perin","sequence":"additional","affiliation":[]},{"given":"Stjepan","family":"Picek","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,26]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Benadjila, R., Prouff, E., Strullu, R., Cagli, E., Dumas, C.: Deep learning for side-channel analysis and introduction to ASCAD database. J. Cryptograph. Eng. 10(2), 163\u2013188 (2020).10.1007\/s13389-019-00220-8,https:\/\/doi.org\/10.1007\/s13389-019-00220-8","DOI":"10.1007\/s13389-019-00220-8"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Bhasin, S., Chattopadhyay, A., Heuser, A., Jap, D., Picek, S., Shrivastwa, R.R.: Mind the portability: a warriors guide through realistic profiled side-channel analysis. In: 27th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, 23\u201326 February 2020. The Internet Society (2020). https:\/\/www.ndss-symposium.org\/ndss-paper\/mind-the-portability-a-warriors-guide-through-realistic-profiled-side-channel-analysis\/","DOI":"10.14722\/ndss.2020.24390"},{"key":"3_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-319-66787-4_3","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2017","author":"E Cagli","year":"2017","unstructured":"Cagli, E., Dumas, C., Prouff, E.: Convolutional neural networks with data augmentation against jitter-based countermeasures. In: Fischer, W., Homma, N. (eds.) CHES 2017. LNCS, vol. 10529, pp. 45\u201368. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66787-4_3"},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-36400-5_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S Chari","year":"2003","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski, B.S., Ko\u00e7, K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13\u201328. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36400-5_3"},{"key":"3_CR5","doi-asserted-by":"publisher","unstructured":"Heuser, A., Picek, S., Guilley, S., Mentens, N.: Side-channel analysis of lightweight ciphers: does lightweight equal easy? In: Hancke, G.P., Markantonakis, K. (eds.) Radio Frequency Identification and IoT Security - 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30\u2013December 2, 2016, Revised Selected Papers, LNCS, vol. 10155, pp. 91\u2013104. Springer, Berlin (2016). https:\/\/doi.org\/10.1007\/978-3-319-62024-4_7","DOI":"10.1007\/978-3-319-62024-4_7"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Kim, J., Picek, S., Heuser, A., Bhasin, S., Hanjalic, A.: Make some noise. unleashing the power of convolutional neural networks for profiled side-channel analysis. In: IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019, 148\u2013179 (2019)","DOI":"10.46586\/tches.v2019.i3.148-179"},{"key":"3_CR7","doi-asserted-by":"publisher","unstructured":"Lerman, L., Medeiros, S.F., Bontempi, G., Markowitch, O.: A machine learning approach against a masked AES. In: CARDIS, LNCS, Springer, Berlin (2015). https:\/\/doi.org\/10.1007\/s13389-014-0089-3","DOI":"10.1007\/s13389-014-0089-3"},{"key":"3_CR8","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/978-3-030-61638-0_8","volume-title":"Applied Cryptography and Network Security Workshops","author":"H Li","year":"2020","unstructured":"Li, H., Kr\u010dek, M., Perin, G.: A comparison of weight initializers in deep learning-based side-channel analysis. In: Zhou, I., et al. (eds.) Applied Cryptography and Network Security Workshops, pp. 126\u2013143. Springer International Publishing, Cham (2020)"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Lu, X., Zhang, C., Cao, P., Gu, D., Lu, H.: Pay attention to raw traces: a deep learning architecture for end-to-end profiling attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3), 235\u2013274 (2021). 10.46586\/tches.v2021.i3.235-274, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/8974","DOI":"10.46586\/tches.v2021.i3.235-274"},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-49445-6_1","volume-title":"Security, Privacy, and Applied Cryptography Engineering","author":"H Maghrebi","year":"2016","unstructured":"Maghrebi, H., Portigliatti, T., Prouff, E.: Breaking cryptographic implementations using deep learning techniques. In: Carlet, C., Hasan, M.A., Saraswat, V. (eds.) SPACE 2016. LNCS, vol. 10076, pp. 3\u201326. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-49445-6_1"},{"key":"3_CR11","doi-asserted-by":"publisher","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer, Boston (December 2006). https:\/\/doi.org\/10.1007\/978-0-387-38162-6I, SBN 0-387-30857-1, http:\/\/www.dpabook.org\/","DOI":"10.1007\/978-0-387-38162-6I"},{"key":"3_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1007\/978-3-662-53887-6_20","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2016","author":"DP Martin","year":"2016","unstructured":"Martin, D.P., Mather, L., Oswald, E., Stam, M.: Characterisation and estimation of the key rank distribution in the context of side channel evaluations. In: Cheon, J.H., Takagi, T. (eds.) ASIACRYPT 2016. LNCS, vol. 10031, pp. 548\u2013572. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53887-6_20"},{"key":"3_CR13","doi-asserted-by":"publisher","unstructured":"Perin, G., Chmielewski, L., Picek, S.: Strength in numbers: Improving generalization with ensembles in machine learning-based profiled side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(4), 337\u2013364 (2020). https:\/\/doi.org\/10.13154\/tches.v2020.i4.337-364, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/8686","DOI":"10.13154\/tches.v2020.i4.337-364"},{"key":"3_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1007\/978-3-030-81652-0_24","volume-title":"Selected Areas in Cryptography","author":"G Perin","year":"2021","unstructured":"Perin, G., Picek, S.: On the influence of optimizers in deep learning-based side-channel analysis. In: Dunkelman, O., Jacobson, Jr., M.J., O\u2019Flynn, C. (eds.) SAC 2020. LNCS, vol. 12804, pp. 615\u2013636. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-81652-0_24"},{"key":"3_CR15","unstructured":"Perin, G., Wu, L., Picek, S.: Exploring feature selection scenarios for deep learning-based side-channel analysis. Cryptology ePrint Archive, Report 2021\/1414 (2021). https:\/\/ia.cr\/2021\/1414"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Picek, S., Heuser, A., Jovic, A., Batina, L.: A systematic evaluation of profiling through focused feature selection. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 27(12), 2802\u20132815 (2019)","DOI":"10.1109\/TVLSI.2019.2937365"},{"key":"3_CR17","doi-asserted-by":"publisher","unstructured":"Picek, S., Heuser, A., Guilley, S.: Template attack versus bayes classifier. J. Cryptogr. Eng. 7(4), 343\u2013351 (2017). https:\/\/doi.org\/10.1007\/s13389-017-0172-7","DOI":"10.1007\/s13389-017-0172-7"},{"key":"3_CR18","doi-asserted-by":"publisher","unstructured":"Picek, S., Heuser, A., Jovic, A., Bhasin, S., Regazzoni, F.: The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(1), 209\u2013237 (2018). https:\/\/doi.org\/10.13154\/tches.v2019.i1.209-237, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/7339","DOI":"10.13154\/tches.v2019.i1.209-237"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Picek, S., et al.: Side-channel analysis and machine learning: a practical perspective. In: 2017 International Joint Conference on Neural Networks, IJCNN 2017, Anchorage, AK, USA, 14\u201319 May 2017, pp. 4095\u20134102 (2017)","DOI":"10.1109\/IJCNN.2017.7966373"},{"key":"3_CR20","unstructured":"Picek, S., Heuser, A., Wu, L., Alippi, C., Regazzoni, F.: When theory meets practice: a framework for robust profiled side-channel analysis. Cryptology ePrint Archive, Report 2018\/1123 (2018). https:\/\/eprint.iacr.org\/2018\/1123"},{"key":"3_CR21","unstructured":"Picek, S., Perin, G., Mariot, L., Wu, L., Batina, L.: Sok: Deep learning-based physical side-channel analysis. Cryptology ePrint Archive, Report 2021\/1092 (2021). https:\/\/ia.cr\/2021\/1092"},{"key":"3_CR22","doi-asserted-by":"publisher","unstructured":"Rijsdijk, J., Wu, L., Perin, G., Picek, S.: Reinforcement learning for hyperparameter tuning in deep learning-based side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3), 677\u2013707 (2021). https:\/\/doi.org\/10.46586\/tches.v2021.i3.677-707, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/8989","DOI":"10.46586\/tches.v2021.i3.677-707"},{"key":"3_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/11545262_3","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"W Schindler","year":"2005","unstructured":"Schindler, W., Lemke, K., Paar, C.: A stochastic model for differential side channel cryptanalysis. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 30\u201346. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11545262_3"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Smith, L.N.: Cyclical learning rates for training neural networks. In: 2017 IEEE Winter Conference on Applications of Computer Vision (WACV), pp. 464\u2013472. IEEE (2017)","DOI":"10.1109\/WACV.2017.58"},{"key":"3_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/978-3-642-01001-9_26","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"F-X Standaert","year":"2009","unstructured":"Standaert, F.-X., Malkin, T.G., Yung, M.: A unified framework for the analysis of side-channel key recovery attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 443\u2013461. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-01001-9_26"},{"key":"3_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-662-48324-4_1","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2015","author":"C Whitnall","year":"2015","unstructured":"Whitnall, C., Oswald, E.: Robust profiling for DPA-style attacks. In: G\u00fcneysu, T., Handschuh, H. (eds.) CHES 2015. LNCS, vol. 9293, pp. 3\u201321. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48324-4_1"},{"key":"3_CR27","doi-asserted-by":"publisher","unstructured":"Wouters, L., Arribas, V., Gierlichs, B., Preneel, B.: Revisiting a methodology for efficient CNN architectures in profiling attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3), 147\u2013168 (2020). https:\/\/doi.org\/10.13154\/tches.v2020.i3.147-168, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/8586","DOI":"10.13154\/tches.v2020.i3.147-168"},{"key":"3_CR28","first-page":"1293","volume":"2020","author":"L Wu","year":"2020","unstructured":"Wu, L., Perin, G., Picek, S.: I choose you: automated hyperparameter tuning for deep learning-based side-channel analysis. IACR Cryptol. ePrint Arch. 2020, 1293 (2020)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"3_CR29","unstructured":"Wu, L., et al.: On the attack evaluation and the generalization ability in profiling side-channel analysis. Cryptology ePrint Archive, Report 2020\/899 (2020). https:\/\/eprint.iacr.org\/2020\/899"},{"key":"3_CR30","doi-asserted-by":"publisher","unstructured":"Zaid, G., Bossuet, L., Habrard, A., Venelli, A.: Methodology for efficient CNN architectures in profiling attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(1), 1\u201336 (2019). https:\/\/doi.org\/10.13154\/tches.v2020.i1.1-36, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/8391","DOI":"10.13154\/tches.v2020.i1.1-36"}],"container-title":["Lecture Notes in Computer Science","Constructive Side-Channel Analysis and Secure Design"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-99766-3_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T23:04:56Z","timestamp":1649199896000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-99766-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030997656","9783030997663"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-99766-3_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"26 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"COSADE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Constructive Side-Channel Analysis and Secure Design","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Leuven","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Belgium","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 April 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 April 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cosade2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.cosade.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}