{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:17:19Z","timestamp":1772043439462,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642372872","type":"print"},{"value":"9783642372889","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37288-9_18","type":"book-chapter","created":{"date-parts":[[2013,3,5]],"date-time":"2013-03-05T13:37:43Z","timestamp":1362490663000},"page":"263-276","source":"Crossref","is-referenced-by-count":56,"title":["Efficient Template Attacks Based on Probabilistic Multi-class Support Vector Machines"],"prefix":"10.1007","author":[{"given":"Timo","family":"Bartkewitz","sequence":"first","affiliation":[]},{"given":"Kerstin","family":"Lemke-Rust","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11894063_1","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"C. Archambeau","year":"2006","unstructured":"Archambeau, C., Peeters, E., Standaert, F.-X., Quisquater, J.-J.: Template Attacks in Principal Subspaces. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol.\u00a04249, pp. 1\u201314. Springer, Heidelberg (2006)"},{"key":"18_CR2","volume-title":"Pattern Recognition and Machine Learning","author":"C.M. Bishop","year":"2006","unstructured":"Bishop, C.M.: Pattern Recognition and Machine Learning. Springer, New York (2006)"},{"key":"18_CR3","unstructured":"Brank, J., Grobelnik, M., Milic-Frayling, N., Mladenic, D.: Feature Selection Using Linear Support Vector Machines. No. MSR-TR-2002-63, Microsoft Research (2002)"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Chang, C.C., Lin, C.J.: LIBSVM: A Library for Support Vector Machines. ACM Transactions on Intelligent Systems and Technology\u00a02, 27:1\u201327:27 (2011), Software available at \n                    \n                      http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm","DOI":"10.1145\/1961189.1961199"},{"key":"18_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-36400-5_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S. Chari","year":"2003","unstructured":"Chari, S., Rao, J., Rohatgi, P.: Template Attacks. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 13\u201328. Springer, Heidelberg (2003)"},{"key":"18_CR6","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511801389","volume-title":"An Introduction to Support Vector Machines and Other Kernel-Based Learning Methods","author":"N. Cristianini","year":"2000","unstructured":"Cristianini, N., Shawe-Taylor, J.: An Introduction to Support Vector Machines and Other Kernel-Based Learning Methods. Cambridge University Press, Cambridge (2000)"},{"key":"18_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/11494683_28","volume-title":"Multiple Classifier Systems","author":"K.-B. Duan","year":"2005","unstructured":"Duan, K.-B., Keerthi, S.S.: Which Is the Best Multiclass SVM Method? An Empirical Study. In: Oza, N.C., Polikar, R., Kittler, J., Roli, F. (eds.) MCS 2005. LNCS, vol.\u00a03541, pp. 278\u2013285. Springer, Heidelberg (2005)"},{"key":"18_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/11894063_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"B. Gierlichs","year":"2006","unstructured":"Gierlichs, B., Lemke-Rust, K., Paar, C.: Templates vs. Stochastic Methods. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol.\u00a04249, pp. 15\u201329. Springer, Heidelberg (2006)"},{"key":"18_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/978-3-642-29912-4_18","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"A. Heuser","year":"2012","unstructured":"Heuser, A., Zohner, M.: Intelligent Machine Homicide. In: Schindler, W., Huss, S.A. (eds.) COSADE 2012. LNCS, vol.\u00a07275, pp. 249\u2013264. Springer, Heidelberg (2012)"},{"key":"18_CR10","volume-title":"COSADE 2011","author":"G. Hospodar","year":"2011","unstructured":"Hospodar, G., De Mulder, E., Gierlichs, B., Vandewalle, J., Verbauwhede, I.: Least Squares Support Vector Machines for Side-Channel Analysis. In: COSADE 2011. CASED, Darmstadt (2011)"},{"key":"18_CR11","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/s13389-011-0023-x","volume":"1","author":"G. Hospodar","year":"2011","unstructured":"Hospodar, G., Gierlichs, B., De Mulder, E., Verbauwhede, I., Vandewalle, J.: Machine Learning in Side-channel Analysis: A First Study. Journal of Cryptographic Engineering\u00a01, 293\u2013302 (2011)","journal-title":"Journal of Cryptographic Engineering"},{"key":"18_CR12","volume-title":"COSADE 2011","author":"L. Lerman","year":"2011","unstructured":"Lerman, L., Bontempi, G., Markowitch, O.: Side Channel Attack: An Approach Based on Machine Learning. In: COSADE 2011. CASED, Darmstadt (2011)"},{"key":"18_CR13","first-page":"267","volume-title":"A Note on Platt\u2019s Probabilistic Outputs for Support Vector Machines","author":"H.T. Lin","year":"2007","unstructured":"Lin, H.T., Lin, C.J., Weng, R.C.: A Note on Platt\u2019s Probabilistic Outputs for Support Vector Machines, vol.\u00a068, pp. 267\u2013276. Kluwer Academic Publishers, Hingham (2007)"},{"key":"18_CR14","volume-title":"Power Analysis Attacks: Revealing the Secrets of Smart Cards","author":"S. Mangard","year":"2007","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer, Heidelberg (2007)"},{"key":"18_CR15","unstructured":"Microchip Technology Inc.: PIC18F2420\/2520\/4420\/4520 Data Sheet (2008)"},{"key":"18_CR16","first-page":"185","volume-title":"Advances in Kernel Methods","author":"J.C. Platt","year":"1999","unstructured":"Platt, J.C.: Fast Training of Support Vector Machines Using Sequential Minimal Optimization. In: Advances in Kernel Methods, pp. 185\u2013208. MIT Press, Cambridge (1999)"},{"key":"18_CR17","first-page":"61","volume-title":"Advances in Large Margin Classifiers","author":"J.C. Platt","year":"1999","unstructured":"Platt, J.C.: Probabilistic Outputs for Support Vector Machines and Comparisons to Regularized Likelihood Methods. In: Advances in Large Margin Classifiers, pp. 61\u201374. MIT Press, Cambridge (1999)"},{"key":"18_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1007\/978-3-540-31815-6_35","volume-title":"Information Security Applications","author":"C. Rechberger","year":"2005","unstructured":"Rechberger, C., Oswald, E.: Practical Template Attacks. In: Lim, C.H., Yung, M. (eds.) WISA 2004. LNCS, vol.\u00a03325, pp. 440\u2013456. Springer, Heidelberg (2005)"},{"key":"18_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/978-3-642-01001-9_26","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"F.-X. Standaert","year":"2009","unstructured":"Standaert, F.-X., Malkin, T.G., Yung, M.: A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol.\u00a05479, pp. 443\u2013461. Springer, Heidelberg (2009)"},{"key":"18_CR20","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2440-0","volume-title":"The Nature of Statistical Learning Theory","author":"V.N. Vapnik","year":"1995","unstructured":"Vapnik, V.N.: The Nature of Statistical Learning Theory. Springer, New York (1995)"},{"key":"18_CR21","unstructured":"Zhang, Y., Schneider, J.G.: Projection Penalties: Dimension Reduction without Loss. In: F\u00fcrnkranz, J., Joachims, T. (eds.) ICML 2010, pp. 1223\u20131230. Omnipress (2010)"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37288-9_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T14:49:43Z","timestamp":1557586183000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37288-9_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642372872","9783642372889"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37288-9_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}