{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:23:12Z","timestamp":1773512592696,"version":"3.50.1"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030997656","type":"print"},{"value":"9783030997663","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-99766-3_4","type":"book-chapter","created":{"date-parts":[[2022,3,25]],"date-time":"2022-03-25T18:20:19Z","timestamp":1648232419000},"page":"75-99","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A Second Look at\u00a0the\u00a0ASCAD Databases"],"prefix":"10.1007","author":[{"given":"Maximilian","family":"Egger","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Schamberger","sequence":"additional","affiliation":[]},{"given":"Lars","family":"Tebelmann","sequence":"additional","affiliation":[]},{"given":"Florian","family":"Lippert","sequence":"additional","affiliation":[]},{"given":"Georg","family":"Sigl","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,26]]},"reference":[{"key":"4_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/978-3-319-16763-3_5","volume-title":"Smart Card Research and Advanced Applications","author":"J Balasch","year":"2015","unstructured":"Balasch, J., Gierlichs, B., Grosso, V., Reparaz, O., Standaert, F.-X.: On the cost of lazy engineering for masked software implementations. In: Joye, M., Moradi, A. (eds.) CARDIS 2014. LNCS, vol. 8968, pp. 64\u201381. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-16763-3_5"},{"key":"4_CR2","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s13389-019-00220-8","volume":"10","author":"R Benadjila","year":"2019","unstructured":"Benadjila, R., Prouff, E., Strullu, R., Cagli, E., Dumas, C.: Deep learning for side-channel analysis and introduction to ASCAD database. J. Cryptogr. Eng. 10, 163\u2013188 (2019)","journal-title":"J. Cryptogr. Eng."},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Bhasin, S., Chattopadhyay, A., Heuser, A., Jap, D., Picek, S., Shrivastwa, R.R.: Mind the portability: a warriors guide through realistic profiled side-channel analysis. Cryptology ePrint Archive, Report 2019\/661, https:\/\/eprint.iacr.org\/2019\/661","DOI":"10.14722\/ndss.2020.24390"},{"key":"4_CR4","unstructured":"Bronchain, O., Cassiers, G., Standaert, F.X.: Give me 5 minutes: attacking ASCAD with a single side-channel trace. Cryptology ePrint Archive, Report 2021\/817 (2021). https:\/\/ia.cr\/2021\/817"},{"key":"4_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIFS.2022.3144871","volume":"17","author":"O Bronchain","year":"2022","unstructured":"Bronchain, O., Durvaux, F., Masure, L., Standaert, F.X.: Efficient profiled side-channel analysis of masked implementations, extended. IEEE Trans. Inf. Foren. Secur. 17, 1\u20131 (2022)","journal-title":"IEEE Trans. Inf. Foren. Secur."},{"key":"4_CR6","doi-asserted-by":"publisher","unstructured":"Cao, P., Zhang, C., Lu, X., Gu, D.: Cross-device profiled side-channel attack with unsupervised domain adaptation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4), 27\u201356 (2021). https:\/\/doi.org\/10.46586\/tches.v2021.i4.27-56, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/9059","DOI":"10.46586\/tches.v2021.i4.27-56"},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-319-89641-0_5","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"Yann Le Corre","year":"2018","unstructured":"Le Corre, Yann, Gro\u00dfsch\u00e4dl, Johann, Dinu, Daniel: Micro-architectural power simulator for leakage assessment of cryptographic software on ARM Cortex-M3 processors. In: Fan, Junfeng, Gierlichs, Benedikt (eds.) COSADE 2018. LNCS, vol. 10815, pp. 82\u201398. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-89641-0_5"},{"key":"4_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1007\/978-3-662-49890-3_10","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2016","author":"F Durvaux","year":"2016","unstructured":"Durvaux, F., Standaert, F.-X.: From improved leakage detection to the detection of points of interests in leakage traces. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9665, pp. 240\u2013262. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49890-3_10"},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1007\/978-3-030-38471-5_26","volume-title":"Selected Areas in Cryptography \u2013 SAC 2019","author":"B Hettwer","year":"2020","unstructured":"Hettwer, B., Gehrer, S., G\u00fcneysu, T.: Deep neural network attribution methods for leakage analysis and symmetric key recovery. In: Paterson, K.G., Stebila, D. (eds.) SAC 2019. LNCS, vol. 11959, pp. 645\u2013666. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-38471-5_26"},{"issue":"4","key":"4_CR10","doi-asserted-by":"publisher","first-page":"49","DOI":"10.46586\/tches.v2020.i4.49-85","volume":"2020","author":"AT Hoang","year":"2020","unstructured":"Hoang, A.T., Hanley, N., O\u2019Neill, M.: Plaintext: a missing feature for enhancing the power of deep learning in side-channel analysis? Breaking multiple layers of side-channel countermeasures. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(4), 49\u201385 (2020)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"4_CR11","doi-asserted-by":"publisher","unstructured":"Lu, X., Zhang, C., Cao, P., Gu, D., Lu, H.: Pay attention to raw traces: a deep learning architecture for end-to-end profiling attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3), 235\u2013274 (2021). https:\/\/doi.org\/10.46586\/tches.v2021.i3.235-274, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/8974","DOI":"10.46586\/tches.v2021.i3.235-274"},{"key":"4_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-38162-6","volume-title":"Power Analysis Attacks","author":"Stefan Mangard","year":"2007","unstructured":"Mangard, Stefan, Oswald, Elisabeth, Popp, Thomas: Power Analysis Attacks. Springer, Boston, MA (2007). https:\/\/doi.org\/10.1007\/978-0-387-38162-6"},{"key":"4_CR13","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-030-16350-1_9","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"L Masure","year":"2019","unstructured":"Masure, L., Dumas, C., Prouff, E.: Gradient visualization for general characterization in profiling attacks. In: Polian, I., St\u00f6ttinger, M. (eds.) Constructive Side-Channel Analysis and Secure Design, pp. 145\u2013167. Springer International Publishing, Cham (2019)"},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-40349-1_1","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2013","author":"A Moradi","year":"2013","unstructured":"Moradi, A., Mischke, O.: On the simplicity of converting leakages from multivariate to univariate. In: Bertoni, G., Coron, J.-S. (eds.) CHES 2013. LNCS, vol. 8086, pp. 1\u201320. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40349-1_1"},{"key":"4_CR15","doi-asserted-by":"publisher","unstructured":"Perin, G., Chmielewski, L., Picek, S.: Strength in numbers: improving generalization with ensembles in machine learning-based profiled side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(4), 337\u2013364 (2020). https:\/\/doi.org\/10.13154\/tches.v2020.i4.337-364, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/8686","DOI":"10.13154\/tches.v2020.i4.337-364"},{"issue":"6","key":"4_CR16","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1109\/TC.2009.15","volume":"58","author":"E Prouff","year":"2009","unstructured":"Prouff, E., Rivain, M., Bevan, R.: Statistical analysis of second order differential power analysis. IEEE Trans. Comput. 58(6), 799\u2013811 (2009)","journal-title":"IEEE Trans. Comput."},{"key":"4_CR17","unstructured":"Prouff, E., Strullu, R., Benadjila, R., Cagli, E., Dumas, C.: Study of deep learning techniques for side-channel analysis and introduction to ASCAD database. Cryptology ePrint Archive, Report 2018\/053 (2018). https:\/\/eprint.iacr.org\/2018\/053"},{"key":"4_CR18","doi-asserted-by":"publisher","unstructured":"Rijsdijk, J., Wu, L., Perin, G., Picek, S.: Reinforcement learning for hyperparameter tuning in deep learning-based side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3), 677\u2013707 (2021). https:\/\/doi.org\/10.46586\/tches.v2021.i3.677-707, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/8989","DOI":"10.46586\/tches.v2021.i3.677-707"},{"key":"4_CR19","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.micpro.2016.01.004","volume":"47","author":"H Seuschek","year":"2016","unstructured":"Seuschek, H., Rass, S.: Side-channel leakage models for RISC instruction set architectures from empirical data. Microprocess. Microsyst. 47, 74\u201381 (2016)","journal-title":"Microprocess. Microsyst."},{"issue":"2","key":"4_CR20","doi-asserted-by":"publisher","first-page":"107","DOI":"10.46586\/tches.v2019.i2.107-131","volume":"2019","author":"B Timon","year":"2019","unstructured":"Timon, B.: Non-profiled deep learning-based side-channel attacks with sensitivity analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(2), 107\u2013131 (2019)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"issue":"4","key":"4_CR21","doi-asserted-by":"publisher","first-page":"389","DOI":"10.46586\/tches.v2020.i4.389-415","volume":"2020","author":"L Wu","year":"2020","unstructured":"Wu, L., Picek, S.: Remove some noise: on pre-processing of side-channel measurements with autoencoders. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(4), 389\u2013415 (2020)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"4_CR22","doi-asserted-by":"publisher","unstructured":"Yu, H., Shan, H., Panoff, M., Jin, Y.: Cross-device profiled side-channel attacks using meta-transfer learning. In: 2021 58th ACM\/IEEE Design Automation Conference (DAC). IEEE, December 2021. https:\/\/doi.org\/10.1109\/dac18074.2021.9586100","DOI":"10.1109\/dac18074.2021.9586100"},{"issue":"1","key":"4_CR23","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s13389-019-00209-3","volume":"10","author":"Y Zhou","year":"2019","unstructured":"Zhou, Y., Standaert, F.-X.: Deep learning mitigates but does not annihilate the need of aligned traces and a generalized ResNet model for side-channel attacks. J. Cryptogr. Eng. 10(1), 85\u201395 (2019). https:\/\/doi.org\/10.1007\/s13389-019-00209-3","journal-title":"J. Cryptogr. Eng."}],"container-title":["Lecture Notes in Computer Science","Constructive Side-Channel Analysis and Secure Design"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-99766-3_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T23:02:59Z","timestamp":1649199779000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-99766-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030997656","9783030997663"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-99766-3_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"26 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"COSADE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Constructive Side-Channel Analysis and Secure Design","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Leuven","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Belgium","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 April 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 April 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cosade2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.cosade.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}