{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:34:26Z","timestamp":1767321266551,"version":"3.48.0"},"publisher-location":"Cham","reference-count":53,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032105356","type":"print"},{"value":"9783032105363","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-10536-3_27","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:30:10Z","timestamp":1767321010000},"page":"724-752","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Diffuse Some Noise: Diffusion Models for\u00a0Measurement Noise Removal in\u00a0Side-Channel Analysis"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-1598-8400","authenticated-orcid":false,"given":"Sengim","family":"Karayal\u00e7in","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3799-7636","authenticated-orcid":false,"given":"Guilherme","family":"Perin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7509-4337","authenticated-orcid":false,"given":"Stjepan","family":"Picek","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"27_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/3-540-36400-5_4","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"D Agrawal","year":"2003","unstructured":"Agrawal, D., Archambeault, B., Rao, J.R., Rohatgi, P.: The EM side\u2014channel(s). In: Kaliski, B.S., Ko\u00e7, K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 29\u201345. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36400-5_4"},{"key":"27_CR2","doi-asserted-by":"publisher","unstructured":"van\u00a0den Berg, D., Slooff, T., Brohet, M., Papagiannopoulos, K., Regazzoni, F.: Data under siege: the quest for the optimal convolutional autoencoder in side-channel attacks. In: International Joint Conference on Neural Networks, IJCNN 2023, Gold Coast, Australia, 18-23 June 2023, pp.\u00a01\u20139. IEEE (2023). https:\/\/doi.org\/10.1109\/IJCNN54540.2023.10191779","DOI":"10.1109\/IJCNN54540.2023.10191779"},{"key":"27_CR3","doi-asserted-by":"publisher","unstructured":"Boussam, S., Albillos, N.C.: Keep it unsupervised: horizontal attacks meet simple classifiers. In: Bhasin, S., Roche, T. (eds.) Smart Card Research and Advanced Applications - 22nd International Conference, CARDIS 2023, Amsterdam, The Netherlands, 14-16 November 2023, Revised Selected Papers. LNCS, vol. 14530, pp. 213\u2013234. Springer (2023). https:\/\/doi.org\/10.1007\/978-3-031-54409-5_11","DOI":"10.1007\/978-3-031-54409-5_11"},{"key":"27_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"E Brier","year":"2004","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16\u201329. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-28632-5_2"},{"key":"27_CR5","doi-asserted-by":"publisher","unstructured":"Bursztein, E., Invernizzi, L., Kr\u00e1l, K., Moghimi, D., Picod, J.M., Zhang, M.: Generalized power attacks against crypto hardware using long-range deep learning. IACR Trans. Cryptographic Hardware Embedded Syst. 2024(3), 472\u2013499 (Jul 2024). https:\/\/doi.org\/10.46586\/tches.v2024.i3.472-499, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/11685","DOI":"10.46586\/tches.v2024.i3.472-499"},{"key":"27_CR6","doi-asserted-by":"publisher","unstructured":"Cao, P., Zhang, H., Gu, D., Lu, Y., Yuan, Y.: AL-PA: cross-device profiled side-channel attack using adversarial learning. In: Oshana, R. (ed.) DAC \u201922: 59th ACM\/IEEE Design Automation Conference, San Francisco, California, USA, 10 - 14 July 2022. pp. 691\u2013696. ACM (2022). https:\/\/doi.org\/10.1145\/3489517.3530517","DOI":"10.1145\/3489517.3530517"},{"key":"27_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-36400-5_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S Chari","year":"2003","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski, B.S., Ko\u00e7, K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13\u201328. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36400-5_3"},{"key":"27_CR8","doi-asserted-by":"publisher","unstructured":"Cristiani, V., Lecomte, M., Hiscock, T., Maurine, P.: Fit the joint moments: how to attack any masking scheme. IEEE Access 10, 127412\u2013127427 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3222760","DOI":"10.1109\/ACCESS.2022.3222760"},{"key":"27_CR9","doi-asserted-by":"publisher","unstructured":"Do, N.T., Le, P.C., Hoang, V.P., Doan, V.S., Nguyen, H.G., Pham, C.K.: Mo-dlsca: deep learning based non-profiled side channel analysis using multi-output neural networks. In: 2022 International Conference on Advanced Technologies for Communications (ATC), pp. 245\u2013250 (2022). https:\/\/doi.org\/10.1109\/ATC55345.2022.9943024","DOI":"10.1109\/ATC55345.2022.9943024"},{"key":"27_CR10","doi-asserted-by":"publisher","unstructured":"Dobraunig, C., Eichlseder, M., Mendel, F., Schl\u00e4ffer, M.: Ascon v1.2: lightweight authenticated encryption and hashing. J. Cryptol. 34(3), 33 (2021). https:\/\/doi.org\/10.1007\/S00145-021-09398-9","DOI":"10.1007\/S00145-021-09398-9"},{"key":"27_CR11","doi-asserted-by":"publisher","unstructured":"Genevey-Metat, C., Heuser, A., G\u00e9rard, B.: Trace-to-trace translation for SCA. In: Grosso, V., P\u00f6ppelmann, T. (eds.) Smart Card Research and Advanced Applications - 20th International Conference, CARDIS 2021, L\u00fcbeck, Germany, 11-12 November 2021, Revised Selected Papers. LNCS, vol. 13173, pp. 24\u201343. Springer (2021). https:\/\/doi.org\/10.1007\/978-3-030-97348-3_2","DOI":"10.1007\/978-3-030-97348-3_2"},{"key":"27_CR12","doi-asserted-by":"publisher","unstructured":"Hajra, S., Chowdhury, S., Mukhopadhyay, D.: Estranet: an efficient shift-invariant transformer network for side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(1), 336\u2013374 (2024). https:\/\/doi.org\/10.46586\/TCHES.V2024.I1.336-374","DOI":"10.46586\/TCHES.V2024.I1.336-374"},{"key":"27_CR13","doi-asserted-by":"publisher","unstructured":"Hajra, S., Saha, S., Alam, M., Mukhopadhyay, D.: Transnet: shift invariant transformer network for side channel analysis. In: Batina, L., Daemen, J. (eds.) AFRICACRYPT 2022. LNCS, vol. 13503, pp. 371\u2013396. Springer Nature Switzerland (2022). https:\/\/doi.org\/10.1007\/978-3-031-17433-9_16","DOI":"10.1007\/978-3-031-17433-9_16"},{"key":"27_CR14","unstructured":"Ho, J., Jain, A., Abbeel, P.: Denoising diffusion probabilistic models. In: Larochelle, H., Ranzato, M., Hadsell, R., Balcan, M., Lin, H. (eds.) Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, NeurIPS 2020, 6-12 December 2020, virtual (2020), https:\/\/proceedings.neurips.cc\/paper\/2020\/hash\/4c5bcfec8584af0d967f1ab10179ca4b-Abstract.html"},{"key":"27_CR15","doi-asserted-by":"publisher","unstructured":"Hu, F., Shen, J., Vijayakumar, P.: Side-channel attacks based on multi-loss regularized denoising autoencoder. IEEE Trans. Inf. Forensics Secur. 19, 2051\u20132065 (2024). https:\/\/doi.org\/10.1109\/TIFS.2023.3343947","DOI":"10.1109\/TIFS.2023.3343947"},{"key":"27_CR16","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-981-96-0944-4_4","volume-title":"Advances in Cryptology - ASIACRYPT 2024","author":"S Karayal\u00e7\u0131n","year":"2025","unstructured":"Karayal\u00e7\u0131n, S., Kr\u010dek, M., Wu, L., Picek, S., Perin, G.: It\u2019s a kind of magic: a novel conditional gan framework for efficient profiling side-channel analysis. In: Chung, K.M., Sasaki, Y. (eds.) Advances in Cryptology - ASIACRYPT 2024, pp. 99\u2013131. Springer Nature Singapore, Singapore (2025). https:\/\/doi.org\/10.1007\/978-981-96-0944-4_4"},{"key":"27_CR17","doi-asserted-by":"crossref","unstructured":"Kim, J., Picek, S., Heuser, A., Bhasin, S., Hanjalic, A.: Make some noise. unleashing the power of convolutional neural networks for profiled side-channel analysis. IACR Trans. Cryptographic Hardware Embedded Syst., 148\u2013179 (2019)","DOI":"10.46586\/tches.v2019.i3.148-179"},{"key":"27_CR18","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. In: Bengio, Y., LeCun, Y. (eds.) 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, 7-9 May 2015, Conference Track Proceedings (2015), http:\/\/arxiv.org\/abs\/1412.6980"},{"key":"27_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201996","author":"PC Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104\u2013113. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-68697-5_9"},{"key":"27_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_25"},{"issue":"3","key":"27_CR21","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/s13389-023-00330-4","volume":"14","author":"M Kr\u010dek","year":"2024","unstructured":"Kr\u010dek, M., Perin, G.: Autoencoder-enabled model portability for reducing hyperparameter tuning efforts in side-channel analysis. J. Cryptogr. Eng. 14(3), 475\u2013497 (2024)","journal-title":"J. Cryptogr. Eng."},{"key":"27_CR22","unstructured":"Kulkarni, P., Verneuil, V., Picek, S., Batina, L.: Order vs. chaos: a language model approach for side-channel attacks. IACR Cryptol. ePrint Arch. p.\u00a01615 (2023). https:\/\/eprint.iacr.org\/2023\/1615"},{"key":"27_CR23","doi-asserted-by":"publisher","unstructured":"Le, T., Cl\u00e9di\u00e8re, J., Servi\u00e8re, C., Lacoume, J.: Noise reduction in side channel attack using fourth-order cumulant. IEEE Trans. Inf. Forensics Secur. 2(4), 710\u2013720 (2007). https:\/\/doi.org\/10.1109\/TIFS.2007.910252","DOI":"10.1109\/TIFS.2007.910252"},{"key":"27_CR24","doi-asserted-by":"crossref","unstructured":"Lu, X., Zhang, C., Cao, P., Gu, D., Lu, H.: Pay attention to the raw traces: a deep learning architecture for end-to-end profiling attacks. IACR Trans. Cryptographic Hardware Embedded Syst. (2021)","DOI":"10.46586\/tches.v2021.i3.235-274"},{"key":"27_CR25","doi-asserted-by":"publisher","unstructured":"Lu, Z., et al.: Scarefusion: side channel analysis data restoration with diffusion model. Microelectronics J.156, 106546 (2025). https:\/\/doi.org\/10.1016\/j.mejo.2024.106546, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1879239124002509","DOI":"10.1016\/j.mejo.2024.106546"},{"key":"27_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-49445-6_1","volume-title":"Security, Privacy, and Applied Cryptography Engineering","author":"H Maghrebi","year":"2016","unstructured":"Maghrebi, H., Portigliatti, T., Prouff, E.: Breaking cryptographic implementations using deep learning techniques. In: Carlet, C., Hasan, M.A., Saraswat, V. (eds.) SPACE 2016. LNCS, vol. 10076, pp. 3\u201326. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-49445-6_1"},{"key":"27_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-319-89641-0_4","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"H Maghrebi","year":"2018","unstructured":"Maghrebi, H., Prouff, E.: On the use of independent component analysis to denoise side-channel measurements. In: Fan, J., Gierlichs, B. (eds.) COSADE 2018. LNCS, vol. 10815, pp. 61\u201381. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-89641-0_4"},{"key":"27_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/978-3-540-24660-2_18","volume-title":"Topics in Cryptology \u2013 CT-RSA 2004","author":"S Mangard","year":"2004","unstructured":"Mangard, S.: Hardware Countermeasures against DPA \u2013 a statistical analysis of their effectiveness. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 222\u2013235. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24660-2_18"},{"key":"27_CR29","doi-asserted-by":"publisher","unstructured":"Masure, L., Cristiani, V., Lecomte, M., Standaert, F.: Don\u2019t learn what you already know scheme-aware modeling for profiling side-channel analysis against masking. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(1), 32\u201359 (2023). https:\/\/doi.org\/10.46586\/tches.v2023.i1.32-59","DOI":"10.46586\/tches.v2023.i1.32-59"},{"key":"27_CR30","doi-asserted-by":"publisher","unstructured":"Masure, L., Dumas, C., Prouff, E.: A comprehensive study of deep learning for side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(1), 348\u2013375 (2020). https:\/\/doi.org\/10.13154\/tches.v2020.i1.348-375","DOI":"10.13154\/tches.v2020.i1.348-375"},{"key":"27_CR31","doi-asserted-by":"publisher","unstructured":"Masure, L., Strullu, R.: Side-channel analysis against anssi\u2019s protected AES implementation on ARM: end-to-end attacks with multi-task learning. J. Cryptogr. Eng. 13(2), 129\u2013147 (2023). https:\/\/doi.org\/10.1007\/S13389-023-00311-7","DOI":"10.1007\/S13389-023-00311-7"},{"key":"27_CR32","doi-asserted-by":"publisher","unstructured":"Moser, B.B., Shanbhag, A.S., Raue, F., Frolov, S., Palacio, S., Dengel, A.: Diffusion models, image super-resolution and everything: A survey. CoRR abs. arXiv:2401.00736 (2024). https:\/\/doi.org\/10.48550\/ARXIV.2401.00736","DOI":"10.48550\/ARXIV.2401.00736"},{"key":"27_CR33","doi-asserted-by":"publisher","unstructured":"Mukhtar, N., Batina, L., Picek, S., Kong, Y.: Fake it till you make it: data augmentation using generative adversarial networks for all the crypto you need on small devices. In: Galbraith, S.D. (ed.) CT-RSA 2022. LNCS, vol. 13161, pp. 297\u2013321. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-95312-6_13","DOI":"10.1007\/978-3-030-95312-6_13"},{"key":"27_CR34","doi-asserted-by":"publisher","unstructured":"Oswald, D., Paar, C.: Improving side-channel analysis with optimal linear transforms. In: Mangard, S. (ed.) CARDIS 2012. LNCS, vol. 7771, pp. 219\u2013233. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-37288-9_15","DOI":"10.1007\/978-3-642-37288-9_15"},{"key":"27_CR35","doi-asserted-by":"publisher","unstructured":"Perin, G., Chmielewski, L., Batina, L., Picek, S.: Keep it unsupervised: horizontal attacks meet deep learning. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(1), 343\u2013372 (2021). https:\/\/doi.org\/10.46586\/TCHES.V2021.I1.343-372","DOI":"10.46586\/TCHES.V2021.I1.343-372"},{"key":"27_CR36","doi-asserted-by":"publisher","unstructured":"Perin, G., Chmielewski, L., Picek, S.: Strength in numbers: improving generalization with ensembles in machine learning-based profiled side-channel analysis. IACR Trans. Cryptographic Hardware and Embedded Syst. 2020(4), 337\u2013364 (2020). https:\/\/doi.org\/10.13154\/tches.v2020.i4.337-364. https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/8686","DOI":"10.13154\/tches.v2020.i4.337-364"},{"key":"27_CR37","doi-asserted-by":"publisher","unstructured":"Perin, G., Wu, L., Picek, S.: Exploring feature selection scenarios for deep learning-based side-channel analysis. IACR Trans. Cryptographic Hardware Embedded Syst. 2022(4), 828\u2013861 (Aug 2022). https:\/\/doi.org\/10.46586\/tches.v2022.i4.828-861, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/9842","DOI":"10.46586\/tches.v2022.i4.828-861"},{"key":"27_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/978-3-662-48324-4_3","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2015","author":"S Merino Del Pozo","year":"2015","unstructured":"Merino Del Pozo, S., Standaert, F.-X.: Blind source separation from single measurements using singular spectrum analysis. In: G\u00fcneysu, T., Handschuh, H. (eds.) CHES 2015. LNCS, vol. 9293, pp. 42\u201359. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48324-4_3"},{"key":"27_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/978-3-319-24574-4_28","volume-title":"Medical Image Computing and Computer-Assisted Intervention \u2013 MICCAI 2015","author":"O Ronneberger","year":"2015","unstructured":"Ronneberger, O., Fischer, P., Brox, T.: U-Net: convolutional networks for biomedical image segmentation. In: Navab, N., Hornegger, J., Wells, W.M., Frangi, A.F. (eds.) MICCAI 2015. LNCS, vol. 9351, pp. 234\u2013241. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24574-4_28"},{"key":"27_CR40","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-031-57543-3_7","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"I Savu","year":"2024","unstructured":"Savu, I., Kr\u010dek, M., Perin, G., Wu, L., Picek, S.: The need for more: unsupervised side-channel analysis with single network training and multi-output regression. In: Wacquez, R., Homma, N. (eds.) Constructive Side-Channel Analysis and Secure Design, pp. 113\u2013132. Springer Nature Switzerland, Cham (2024)"},{"key":"27_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/11545262_3","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"W Schindler","year":"2005","unstructured":"Schindler, W., Lemke, K., Paar, C.: A stochastic model for differential side channel cryptanalysis. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 30\u201346. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11545262_3"},{"key":"27_CR42","doi-asserted-by":"publisher","unstructured":"Timon, B.: Non-profiled deep learning-based side-channel attacks with sensitivity analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(2), 107\u2013131 (2019). https:\/\/doi.org\/10.13154\/tches.v2019.i2.107-131","DOI":"10.13154\/tches.v2019.i2.107-131"},{"key":"27_CR43","unstructured":"Wang, P., et al.: Enhancing the performance of practical profiling side-channel attacks using conditional generative adversarial networks. CoRR abs arXiv:2007.05285 (2020)"},{"key":"27_CR44","doi-asserted-by":"publisher","unstructured":"Wu, L., Perin, G., Picek, S.: The best of two worlds: deep learning-assisted template attack. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(3), 413\u2013437 (2022). https:\/\/doi.org\/10.46586\/TCHES.V2022.I3.413-437","DOI":"10.46586\/TCHES.V2022.I3.413-437"},{"key":"27_CR45","doi-asserted-by":"publisher","unstructured":"Wu, L., Perin, G., Picek, S.: I choose you: automated hyperparameter tuning for deep learning-based side-channel analysis. IEEE Trans. Emerging Topics Comput., 1\u201312 (2022). https:\/\/doi.org\/10.1109\/TETC.2022.3218372","DOI":"10.1109\/TETC.2022.3218372"},{"key":"27_CR46","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-031-53368-6_5","volume-title":"Selected Areas in Cryptography - SAC 2023","author":"L Wu","year":"2024","unstructured":"Wu, L., Perin, G., Picek, S.: Not so difficult in the end: Breaking the lookup table-based affine masking scheme. In: Carlet, C., Mandal, K., Rijmen, V. (eds.) Selected Areas in Cryptography - SAC 2023, pp. 82\u201396. Springer Nature Switzerland, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-53368-6_5"},{"key":"27_CR47","doi-asserted-by":"publisher","unstructured":"Wu, L., Perin, G., Picek, S.: Weakly profiling side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(3), 707\u2013730 (2024). https:\/\/doi.org\/10.46586\/tches.v2024.i3.707-730, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/11901","DOI":"10.46586\/tches.v2024.i3.707-730"},{"key":"27_CR48","doi-asserted-by":"publisher","unstructured":"Wu, L., Picek, S.: Remove some noise: On pre-processing of side-channel measurements with autoencoders. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(4), 389\u2013415 (2020). https:\/\/doi.org\/10.13154\/tches.v2020.i4.389-415","DOI":"10.13154\/tches.v2020.i4.389-415"},{"key":"27_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/978-3-030-41579-2_16","volume-title":"Information and Communications Security","author":"G Yang","year":"2020","unstructured":"Yang, G., Li, H., Ming, J., Zhou, Y.: CDAE: towards empowering denoising in side-channel analysis. In: Zhou, J., Luo, X., Shen, Q., Xu, Z. (eds.) ICICS 2019. LNCS, vol. 11999, pp. 269\u2013286. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-41579-2_16"},{"key":"27_CR50","doi-asserted-by":"publisher","unstructured":"Yang, L., et al.: Diffusion models: a comprehensive survey of methods and applications. ACM Comput. Surv. 56(4), 105:1\u2013105:39 (2024). https:\/\/doi.org\/10.1145\/3626235","DOI":"10.1145\/3626235"},{"key":"27_CR51","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/978-3-031-61486-6_7","volume-title":"Applied Cryptography and Network Security Workshops","author":"T Yap","year":"2024","unstructured":"Yap, T., Jap, D.: Creating from noise: Trace generations using diffusion model for side-channel attack. In: Andreoni, M. (ed.) Applied Cryptography and Network Security Workshops, pp. 102\u2013120. Springer Nature Switzerland, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-61486-6_7"},{"key":"27_CR52","doi-asserted-by":"publisher","unstructured":"Zaid, G., Bossuet, L., Carbone, M., Habrard, A., Venelli, A.: Conditional variational autoencoder based on stochastic attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(2), 310\u2013357 (2023). https:\/\/doi.org\/10.46586\/TCHES.V2023.I2.310-357","DOI":"10.46586\/TCHES.V2023.I2.310-357"},{"key":"27_CR53","doi-asserted-by":"publisher","unstructured":"Zaid, G., Bossuet, L., Habrard, A., Venelli, A.: Methodology for efficient cnn architectures in profiling attacks. IACR Trans. Crypto. Hard. Embed. Syst. 2020(1), 1\u201336 (Nov 2019). https:\/\/doi.org\/10.13154\/tches.v2020.i1.1-36, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/8391","DOI":"10.13154\/tches.v2020.i1.1-36"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography \u2013 SAC 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-10536-3_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:30:13Z","timestamp":1767321013000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-10536-3_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032105356","9783032105363"],"references-count":53,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-10536-3_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Selected Areas in Cryptography","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toronto, ON","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"32","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sacrypt2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sacworkshop.org\/SAC25\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}