{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:11:00Z","timestamp":1773155460051,"version":"3.50.1"},"publisher-location":"Cham","reference-count":53,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319896403","type":"print"},{"value":"9783319896410","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-89641-0_4","type":"book-chapter","created":{"date-parts":[[2018,4,10]],"date-time":"2018-04-10T07:23:34Z","timestamp":1523345014000},"page":"61-81","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["On the Use of Independent Component Analysis to Denoise Side-Channel Measurements"],"prefix":"10.1007","author":[{"given":"Houssem","family":"Maghrebi","sequence":"first","affiliation":[]},{"given":"Emmanuel","family":"Prouff","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,11]]},"reference":[{"key":"4_CR1","unstructured":"Python implementation of FastICA algorithm. http:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.decomposition.FastICA.html"},{"key":"4_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11894063_1","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"C Archambeau","year":"2006","unstructured":"Archambeau, C., Peeters, E., Standaert, F.-X., Quisquater, J.-J.: Template attacks in principal subspaces. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 1\u201314. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11894063_1"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1007\/978-3-662-48324-4_30","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2015","author":"J Balasch","year":"2015","unstructured":"Balasch, J., Gierlichs, B., Reparaz, O., Verbauwhede, I.: DPA, bitslicing and masking at 1 GHz. In: G\u00fcneysu, T., Handschuh, H. (eds.) CHES 2015. LNCS, vol. 9293, pp. 599\u2013619. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48324-4_30"},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/978-3-642-27954-6_24","volume-title":"Topics in Cryptology \u2013 CT-RSA 2012","author":"L Batina","year":"2012","unstructured":"Batina, L., Hogenboom, J., van Woudenberg, J.G.J.: Getting more from PCA: first results of using principal component analysis for extensive power analysis. In: Dunkelman, O. (ed.) CT-RSA 2012. LNCS, vol. 7178, pp. 383\u2013397. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-27954-6_24"},{"issue":"6","key":"4_CR5","doi-asserted-by":"publisher","first-page":"1129","DOI":"10.1162\/neco.1995.7.6.1129","volume":"7","author":"AJ Bell","year":"1995","unstructured":"Bell, A.J., Sejnowski, T.J.: An information-maximization approach to blind separation and blind deconvolution. Neural Comput. 7(6), 1129\u20131159 (1995)","journal-title":"Neural Comput."},{"key":"4_CR6","unstructured":"Bhasin, S., Danger, J.-L., Guilley, S., Najm, Z.: NICV: normalized inter-class variance for detection of side-channel leakage. In: International Symposium on Electromagnetic Compatibility (EMC 2014\/Tokyo). Session OS09: EM Information Leakage. Hitotsubashi Hall (National Center of Sciences), Chiyoda, Tokyo, Japan. IEEE, 12\u201316 May 2014"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Bhasin, S., Danger, J.-L., Guilley, S., Najm, Z.: Side-channel leakage and trace compression using normalized inter-class variance. In: Proceedings of the Third Workshop on Hardware and Architectural Support for Security and Privacy, HASP 2014, pp. 7:1\u20137:9. ACM, New York (2014)","DOI":"10.1145\/2611765.2611772"},{"key":"4_CR8","unstructured":"Bohy, L., Neve, M., Samyde, D., Quisquater, J.J.: Principal and independent component analysis for crypto-systems with hardware unmasked units. In: Proceedings of e-Smart 2003 (2003)"},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"E Brier","year":"2004","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16\u201329. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-28632-5_2"},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-54669-8_1","volume-title":"Smart Card Research and Advanced Applications","author":"E Cagli","year":"2017","unstructured":"Cagli, E., Dumas, C., Prouff, E.: Kernel discriminant analysis for information extraction in the presence of masking. In: Lemke-Rust, K., Tunstall, M. (eds.) CARDIS 2016. LNCS, vol. 10146, pp. 1\u201322. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-54669-8_1"},{"key":"4_CR11","unstructured":"Cardoso, J.F.: Python and Matlab implementations of JADE algorithm. https:\/\/github.com\/camilleanne\/pulse\/blob\/master\/jade.py and http:\/\/perso.telecom-paristech.fr\/~cardoso\/Algo\/Jade\/jadeR.m"},{"issue":"4","key":"4_CR12","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/97.566704","volume":"4","author":"JF Cardoso","year":"1997","unstructured":"Cardoso, J.F.: Infomax and maximum likelihood for blind source separation. IEEE Sig. Process. Lett. 4(4), 112\u2013114 (1997)","journal-title":"IEEE Sig. Process. Lett."},{"issue":"6","key":"4_CR13","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1049\/ip-f-2.1993.0054","volume":"140","author":"JF Cardoso","year":"1993","unstructured":"Cardoso, J.F., Souloumiac, A.: Blind beamforming for non-Gaussian signals. IEE Proc. F - Radar Sig. Process. 140(6), 362\u2013370 (1993)","journal-title":"IEE Proc. F - Radar Sig. Process."},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-319-08302-5_17","volume-title":"Smart Card Research and Advanced Applications","author":"O Choudary","year":"2014","unstructured":"Choudary, O., Kuhn, M.G.: Efficient template attacks. In: Francillon, A., Rohatgi, P. (eds.) CARDIS 2013. LNCS, vol. 8419, pp. 253\u2013270. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-08302-5_17"},{"issue":"3","key":"4_CR15","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1016\/0165-1684(94)90029-9","volume":"36","author":"P Comon","year":"1994","unstructured":"Comon, P.: Independent component analysis, a new concept? Sig. Process. 36(3), 287\u2013314 (1994)","journal-title":"Sig. Process."},{"key":"4_CR16","volume-title":"Handbook of Blind Source Separation: Independent Component Analysis and Applications","author":"P Comon","year":"2010","unstructured":"Comon, P., Jutten, C.: Handbook of Blind Source Separation: Independent Component Analysis and Applications. Academic Press, Cambridge (2010)"},{"key":"4_CR17","unstructured":"China Consulting Consortium: Common Criteria (aka CC) for Information Technology Security Evaluation (ISO\/IEC 15408) (2013). http:\/\/www.commoncriteriaportal.org\/"},{"key":"4_CR18","doi-asserted-by":"publisher","unstructured":"Debande, N., Souissi, Y., Elaabid, M.A., Guilley, S., Danger, J.-L.: Wavelet transform based pre-processing for side channel analysis. In: HASP, Vancouver, British Columbia, Canada, pp. 32\u201338. IEEE, 2 December 2012. https:\/\/doi.org\/10.1109\/MICROW.2012.15","DOI":"10.1109\/MICROW.2012.15"},{"key":"4_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-319-43283-0_10","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"AA Ding","year":"2016","unstructured":"Ding, A.A., Chen, C., Eisenbarth, T.: Simpler, faster, and more robust t-test based leakage detection. In: Standaert, F.-X., Oswald, E. (eds.) COSADE 2016. LNCS, vol. 9689, pp. 163\u2013183. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-43283-0_10"},{"key":"4_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1007\/978-3-662-49890-3_10","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2016","author":"F Durvaux","year":"2016","unstructured":"Durvaux, F., Standaert, F.-X.: From improved leakage detection to the detection of points of interests in leakage traces. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9665, pp. 240\u2013262. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49890-3_10"},{"issue":"7","key":"4_CR21","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1111\/j.1469-1809.1936.tb02137.x","volume":"7","author":"RA Fisher","year":"1936","unstructured":"Fisher, R.A.: The use of multiple measurements in taxonomic problems. Ann. Eugenics 7(7), 179\u2013188 (1936)","journal-title":"Ann. Eugenics"},{"issue":"9","key":"4_CR22","doi-asserted-by":"publisher","first-page":"881","DOI":"10.1109\/T-C.1974.224051","volume":"23","author":"JH Friedman","year":"1974","unstructured":"Friedman, J.H., Tukey, J.W.: A projection pursuit algorithm for exploratory data analysis. IEEE Trans. Comput. 23(9), 881\u2013890 (1974)","journal-title":"IEEE Trans. Comput."},{"key":"4_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/978-3-319-52153-4_21","volume-title":"Topics in Cryptology \u2013 CT-RSA 2017","author":"S Gao","year":"2017","unstructured":"Gao, S., Chen, H., Wu, W., Fan, L., Cao, W., Ma, X.: My traces learn what you did in the dark: recovering secret signals without key guesses. In: Handschuh, H. (ed.) CT-RSA 2017. LNCS, vol. 10159, pp. 363\u2013378. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-52153-4_21"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Genkin, D., Pachmanov, L., Pipman, I., Tromer, E., Yarom, Y.: ECDSA key extraction from mobile devices via nonintrusive physical side channels. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS 2016, pp. 1626\u20131638. ACM, New York (2016)","DOI":"10.1145\/2976749.2978353"},{"key":"4_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-540-30110-3_16","volume-title":"Independent Component Analysis and Blind Signal Separation","author":"P Georgiev","year":"2004","unstructured":"Georgiev, P., Theis, F.J.: Blind source separation of linear mixtures with singular matrices. In: Puntonet, C.G., Prieto, A. (eds.) ICA 2004. LNCS, vol. 3195, pp. 121\u2013128. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-30110-3_16"},{"key":"4_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/978-3-540-85053-3_27","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"B Gierlichs","year":"2008","unstructured":"Gierlichs, B., Batina, L., Tuyls, P., Preneel, B.: Mutual information analysis. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 426\u2013442. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85053-3_27"},{"key":"4_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/11894063_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"B Gierlichs","year":"2006","unstructured":"Gierlichs, B., Lemke-Rust, K., Paar, C.: Templates vs. stochastic methods. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 15\u201329. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11894063_2"},{"key":"4_CR28","unstructured":"Goodwill, G., Jun, B., Jaffe, J., Rohatgi, P.: A testing methodology for side-channel resistance validation. In: NIST Non-Invasive Attack Testing Workshop, September 2011. http:\/\/csrc.nist.gov\/news_events\/non-invasive-attack-testing-workshop\/papers\/08_Goodwill.pdf"},{"issue":"2","key":"4_CR29","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1214\/aos\/1176349519","volume":"13","author":"PJ Huber","year":"1985","unstructured":"Huber, P.J.: Projection pursuit. Ann. Stat. 13(2), 435\u2013475 (1985)","journal-title":"Ann. Stat."},{"key":"4_CR30","unstructured":"Hyv\u00e4rinen, A.: New approximations of differential entropy for independent component analysis and projection pursuit. In: Jordan, M.I., Kearns, M.J., Solla, S.A. (eds.) Advances in Neural Information Processing Systems 10, pp. 273\u2013279. MIT Press (1998)"},{"issue":"3","key":"4_CR31","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1109\/72.761722","volume":"10","author":"A Hyvarinen","year":"1999","unstructured":"Hyvarinen, A.: Fast and robust fixed-point algorithms for independent component analysis. Trans. Neur. Netw. 10(3), 626\u2013634 (1999)","journal-title":"Trans. Neur. Netw."},{"issue":"7","key":"4_CR32","doi-asserted-by":"publisher","first-page":"1739","DOI":"10.1162\/089976699300016214","volume":"11","author":"A Hyv\u00e4rinen","year":"1999","unstructured":"Hyv\u00e4rinen, A.: Sparse code shrinkage: denoising of nongaussian data by maximum likelihood estimation. Neural Comput. 11(7), 1739\u20131768 (1999)","journal-title":"Neural Comput."},{"issue":"7","key":"4_CR33","doi-asserted-by":"publisher","first-page":"1483","DOI":"10.1162\/neco.1997.9.7.1483","volume":"9","author":"A Hyv\u00e4rinen","year":"1997","unstructured":"Hyv\u00e4rinen, A., Oja, E.: A fast fixed-point algorithm for independent component analysis. Neural Comput. 9(7), 1483\u20131492 (1997)","journal-title":"Neural Comput."},{"key":"4_CR34","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1016\/S0893-6080(00)00026-5","volume":"13","author":"A Hyv\u00e4rinen","year":"2000","unstructured":"Hyv\u00e4rinen, A., Oja, E.: Independent component analysis: algorithms and applications. Neural Netw. 13, 411\u2013430 (2000)","journal-title":"Neural Netw."},{"key":"4_CR35","series-title":"Springer Series in Statistics","volume-title":"Principal Component Analysis","author":"IT Jolliffe","year":"2002","unstructured":"Jolliffe, I.T.: Principal Component Analysis. Springer Series in Statistics. Springer, Heidelberg (2002). ISBN 0387954422"},{"issue":"1","key":"4_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0165-1684(91)90079-X","volume":"24","author":"C Jutten","year":"1991","unstructured":"Jutten, C., Herault, J.: Blind separation of sources, part i: an adaptive algorithm based on neuromimetic architecture. Sig. Process. 24(1), 1\u201310 (1991)","journal-title":"Sig. Process."},{"key":"4_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_25"},{"issue":"4","key":"4_CR38","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1109\/TIFS.2007.910252","volume":"2","author":"T-H Le","year":"2007","unstructured":"Le, T.-H., Cledi\u00e8re, J., Servi\u00e8re, C., Lacoume, J.-L.: Noise reduction in side channel attack using fourth-order cumulant. IEEE Trans. Inf. Forensics Secur. 2(4), 710\u2013720 (2007). https:\/\/doi.org\/10.1109\/TIFS.2007.910252","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"620","DOI":"10.1007\/978-3-662-48324-4_31","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2015","author":"J Longo","year":"2015","unstructured":"Longo, J., De Mulder, E., Page, D., Tunstall, M.: SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip. In: G\u00fcneysu, T., Handschuh, H. (eds.) CHES 2015. LNCS, vol. 9293, pp. 620\u2013640. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48324-4_31"},{"key":"4_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-662-52993-5_12","volume-title":"Fast Software Encryption","author":"H Maghrebi","year":"2016","unstructured":"Maghrebi, H., Servant, V., Bringer, J.: There is wisdom in harnessing the strengths of your enemy: customized encoding to thwart side-channel attacks. In: Peyrin, T. (ed.) FSE 2016. LNCS, vol. 9783, pp. 223\u2013243. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-52993-5_12"},{"key":"4_CR41","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-38162-6","volume-title":"Power Analysis Attacks: Revealing the Secrets of Smart Cards","author":"S Mangard","year":"2006","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/978-0-387-38162-6. http:\/\/www.dpabook.org\/. ISBN 0-387-30857-1"},{"key":"4_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/978-3-662-48324-4_3","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2015","author":"S Merino Del Pozo","year":"2015","unstructured":"Merino Del Pozo, S., Standaert, F.-X.: Blind source separation from single measurements using singular spectrum analysis. In: G\u00fcneysu, T., Handschuh, H. (eds.) CHES 2015. LNCS, vol. 9293, pp. 42\u201359. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48324-4_3"},{"issue":"4","key":"4_CR43","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1088\/0954-898X_5_4_008","volume":"5","author":"J-P Nadal","year":"1994","unstructured":"Nadal, J.-P., Parga, N.: Nonlinear neurons in the low-noise limit: a factorial code maximizes information transfer. Netw.: Comput. Neural Syst. 5(4), 565\u2013581 (1994)","journal-title":"Netw.: Comput. Neural Syst."},{"key":"4_CR44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55016-4","volume-title":"Blind Source Separation: Advances in Theory, Algorithms and Applications","author":"GR Naik","year":"2014","unstructured":"Naik, G.R., Wang, W.: Blind Source Separation: Advances in Theory, Algorithms and Applications. Springer Publishing Company, Heidelberg (2014). Incorporated"},{"key":"4_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-3-319-10175-0_17","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"C O\u2019Flynn","year":"2014","unstructured":"O\u2019Flynn, C., Chen, Z.D.: ChipWhisperer: an open-source platform for hardware embedded security research. In: Prouff, E. (ed.) COSADE 2014. LNCS, vol. 8622, pp. 243\u2013260. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10175-0_17"},{"issue":"6","key":"4_CR46","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1109\/TC.2009.15","volume":"58","author":"E Prouff","year":"2009","unstructured":"Prouff, E., Rivain, M., B\u00e9van, R.: Statistical analysis of second order differential power analysis. IEEE Trans. Comput. 58(6), 799\u2013811 (2009)","journal-title":"IEEE Trans. Comput."},{"key":"4_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/978-3-662-48324-4_25","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2015","author":"T Schneider","year":"2015","unstructured":"Schneider, T., Moradi, A.: Leakage assessment methodology. In: G\u00fcneysu, T., Handschuh, H. (eds.) CHES 2015. LNCS, vol. 9293, pp. 495\u2013513. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48324-4_25"},{"key":"4_CR48","doi-asserted-by":"publisher","unstructured":"Souissi, Y., Guilley, S., Danger, J.-L., Duc, G., Mekki, S.: Improvement of power analysis attacks using Kalman filter. In: ICASSP, IEEE Signal Processing Society, Dallas, TX, USA, 14\u201319 March 2010, pp. 1778\u20131781. IEEE (2010). https:\/\/doi.org\/10.1109\/ICASSP.2010.5495428","DOI":"10.1109\/ICASSP.2010.5495428"},{"key":"4_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/978-3-540-85053-3_26","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"F-X Standaert","year":"2008","unstructured":"Standaert, F.-X., Archambeau, C.: Using subspace-based template attacks to compare and combine power and electromagnetic information leakages. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 411\u2013425. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85053-3_26"},{"key":"4_CR50","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/978-3-642-01001-9_26","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"F-X Standaert","year":"2009","unstructured":"Standaert, F.-X., Malkin, T.G., Yung, M.: A unified framework for the analysis of side-channel key recovery attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 443\u2013461. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-01001-9_26"},{"key":"4_CR51","unstructured":"TELECOM ParisTech SEN research group. DPA Contest ($$2^\\text{nd}$$ edition) 2009\u20132010. http:\/\/www.DPAcontest.org\/v2\/"},{"key":"4_CR52","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/978-3-642-19074-2_8","volume-title":"Topics in Cryptology \u2013 CT-RSA 2011","author":"JGJ van Woudenberg","year":"2011","unstructured":"van Woudenberg, J.G.J., Witteman, M.F., Bakker, B.: Improving differential power analysis by elastic alignment. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 104\u2013119. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19074-2_8"},{"issue":"4","key":"4_CR53","doi-asserted-by":"publisher","first-page":"1541","DOI":"10.1016\/j.jfranklin.2015.01.011","volume":"352","author":"R Wang","year":"2015","unstructured":"Wang, R., Ma, H.-G., Liu, G.-Q., Zuo, D.-G.: Selection of window length for singular spectrum analysis. J. Franklin Inst. 352(4), 1541\u20131560 (2015)","journal-title":"J. Franklin Inst."}],"container-title":["Lecture Notes in Computer Science","Constructive Side-Channel Analysis and Secure Design"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-89641-0_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T15:19:38Z","timestamp":1709824778000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-89641-0_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319896403","9783319896410"],"references-count":53,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-89641-0_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"11 April 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"COSADE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Constructive Side-Channel Analysis and Secure Design","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 April 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 April 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cosade2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.cosade.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}