{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T22:20:54Z","timestamp":1776205254206,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642400254","type":"print"},{"value":"9783642400261","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40026-1_12","type":"book-chapter","created":{"date-parts":[[2013,7,12]],"date-time":"2013-07-12T21:04:27Z","timestamp":1373663067000},"page":"184-199","source":"Crossref","is-referenced-by-count":22,"title":["Semi-Supervised Template Attack"],"prefix":"10.1007","author":[{"given":"Liran","family":"Lerman","sequence":"first","affiliation":[]},{"given":"Stephane Fernandes","family":"Medeiros","sequence":"additional","affiliation":[]},{"given":"Nikita","family":"Veshchikov","sequence":"additional","affiliation":[]},{"given":"C\u00e9dric","family":"Meuter","sequence":"additional","affiliation":[]},{"given":"Gianluca","family":"Bontempi","sequence":"additional","affiliation":[]},{"given":"Olivier","family":"Markowitch","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"Alpaydin, E.: Introduction to Machine Learning, 2nd edn. The MIT Press (2010)"},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/978-3-642-04138-9_9","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"L. Batina","year":"2009","unstructured":"Batina, L., Gierlichs, B., Lemke-Rust, K.: Differential Cluster Analysis. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol.\u00a05747, pp. 112\u2013127. Springer, Heidelberg (2009)"},{"key":"12_CR3","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L. Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Machine Learning\u00a045, 5\u201332 (2001)","journal-title":"Machine Learning"},{"key":"12_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-36400-5_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S. Chari","year":"2003","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 13\u201328. Springer, Heidelberg (2003)"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Cortes, C., Vapnik, V.: Support-vector networks. Machine Learning, 273\u2013297 (1995)","DOI":"10.1007\/BF00994018"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael: AES - The Advanced Encryption Standard. Springer (2002)","DOI":"10.1007\/978-3-662-04722-4"},{"key":"12_CR7","unstructured":"Dimitriadou, E., Hornik, K., Leisch, F., Meyer, D., Weingessel, A.: e1071: Misc Functions of the Department of Statistics (e1071), TU Wien. R package version 1.6 (2011)"},{"key":"12_CR8","unstructured":"Dyrkolbotn, G.O., Snekkenes, E.: Modified Template Attack: Detecting Address Bus Signals of Equal Hamming Weight. In: Ntnu, S.F.M. (ed.) The 2nd Norwegian Information Security Conference (NISK 2009), pp. 43\u201356. Tapir Akademisk Forlag (November 2009)"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Gan, G., Ma, C., Wu, J.: Data clustering - theory, algorithms, and applications. Series on Statistics and Applied Probability. SIAM, Society for Industrial and Applied Mathematics (2007)","DOI":"10.1137\/1.9780898718348"},{"key":"12_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-44709-1_21","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2001","author":"K. Gandolfi","year":"2001","unstructured":"Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic Analysis: Concrete Results. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.\u00a02162, pp. 251\u2013261. Springer, Heidelberg (2001)"},{"key":"12_CR11","volume-title":"Multivariate Statistics: Exercises and Solutions","author":"W. Hardle","year":"2007","unstructured":"Hardle, W., Hlavka, Z.: Multivariate Statistics: Exercises and Solutions, 1st edn. Springer Publishing Company, Incorporated (2007)","edition":"1"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Hastie, T., Tibshirani, R., Friedman, J.: The Elements of Statistical Learning: Data Mining, Inference, and Prediction, 2nd edn. Springer Series in Statistics. Springer (September 2009)","DOI":"10.1007\/978-0-387-84858-7"},{"key":"12_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/978-3-642-29912-4_18","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"A. Heuser","year":"2012","unstructured":"Heuser, A., Zohner, M.: Intelligent machine homicide. In: Schindler, W., Huss, S.A. (eds.) COSADE 2012. LNCS, vol.\u00a07275, pp. 249\u2013264. Springer, Heidelberg (2012)"},{"key":"12_CR14","unstructured":"Hollestelle, G., Burgers, W., Hartog, J.I.D.: Power Analysis on Smartcard Algorithms Using Simulation. Imported from DIES (2004)"},{"issue":"4","key":"12_CR15","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/s13389-011-0023-x","volume":"1","author":"G. Hospodar","year":"2011","unstructured":"Hospodar, G., Gierlichs, B., De Mulder, E., Verbauwhede, I., Vandewalle, J.: Machine learning in side-channel analysis: a first study. J. Cryptographic Engineering\u00a01(4), 293\u2013302 (2011)","journal-title":"J. Cryptographic Engineering"},{"key":"12_CR16","unstructured":"Hospodar, G., De Mulder, E., Gierlichs, B., Vandewalle, J., Verbauwhede, I.: Least Squares Support Vector Machines for Side-Channel Analysis. Center for Advanced Security Research Darmstadt, pp. 99\u2013104 (2011)"},{"key":"12_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"P.C. Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 104\u2013113. Springer, Heidelberg (1996)"},{"key":"12_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P.C. Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"12_CR19","unstructured":"Lerman, L., Bontempi, G., Markowitch, O.: Power analysis attack: an approach based on machine learning. International Journal of Applied Cryptography (to appear)"},{"key":"12_CR20","unstructured":"Lerman, L., Bontempi, G., Markowitch, O.: Side Channel Attack: an Approach Based on Machine Learning. Center for Advanced Security Research Darmstadt, pp. 29\u201341 (2011)"},{"key":"12_CR21","unstructured":"Lerman, L., Bontempi, G., Markowitch, O.: sideChannelAttack: Side Channel Attack, R package version 1.0-6 (2012)"},{"issue":"3","key":"12_CR22","first-page":"18","volume":"2","author":"A. Liaw","year":"2002","unstructured":"Liaw, A., Wiener, M.: Classification and regression by randomforest. R. News\u00a02(3), 18\u201322 (2002)","journal-title":"R. News"},{"key":"12_CR23","unstructured":"Maechler, M., Rousseeuw, P., Struyf, A., Hubert, M.: Cluster Analysis Basics and Extensions (2005)"},{"key":"12_CR24","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Investigations of Power Analysis Attacks on Smartcards. In: Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology, Berkeley, CA, USA, p. 17 (1999)"},{"key":"12_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-642-33027-8_9","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2012","author":"Y. Oren","year":"2012","unstructured":"Oren, Y., Renauld, M., Standaert, F.-X., Wool, A.: Algebraic side-channel attacks beyond the hamming weight leakage model. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol.\u00a07428, pp. 140\u2013154. Springer, Heidelberg (2012)"},{"key":"12_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/11967668_16","volume-title":"Topics in Cryptology \u2013 CT-RSA 2007","author":"E. Oswald","year":"2006","unstructured":"Oswald, E., Mangard, S.: Template Attacks on Masking\u2014Resistance Is Futile. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol.\u00a04377, pp. 243\u2013256. Springer, Heidelberg (2006)"},{"key":"12_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/978-3-642-16342-5_29","volume-title":"Information Security and Cryptology","author":"M. Renauld","year":"2010","unstructured":"Renauld, M., Standaert, F.-X.: Algebraic side-channel attacks. In: Bao, F., Yung, M., Lin, D., Jing, J. (eds.) Inscrypt 2009. LNCS, vol.\u00a06151, pp. 393\u2013410. Springer, Heidelberg (2010)"},{"key":"12_CR28","volume-title":"Pattern Recognition","author":"T. Sergios","year":"2006","unstructured":"Sergios, T., Konstantinos, K.: Pattern Recognition, 3rd edn. Academic Press, Inc., Orlando (2006)","edition":"3"},{"key":"12_CR29","unstructured":"Singh, S.S., Chauhan, N.C.: K-means v\/s k-medoids: A comparative study. In: National Conference on Recent Trends in Engineering and Technology (2011)"},{"key":"12_CR30","doi-asserted-by":"crossref","unstructured":"Standaert, F.-X., Peeters, E., Archambeau, C., Quisquater, J.-J.: Towards Security Limits in Side-Channel Attacks. IACR Cryptology ePrint Archive\u00a02007, 222 (2007)","DOI":"10.1007\/11894063_3"},{"issue":"3","key":"12_CR31","doi-asserted-by":"publisher","first-page":"363","DOI":"10.3844\/jcssp.2010.363.368","volume":"6","author":"T. Velmurugan","year":"2010","unstructured":"Velmurugan, T., Santhanam, T.: Computational complexity between k-means and k-medoids clustering algorithms for normal and uniform distributions of data points. Journal of Computer Science\u00a06(3), 363\u2013368 (2010)","journal-title":"Journal of Computer Science"},{"key":"12_CR32","unstructured":"Wang, S., Le, T.-H., Berthier, M.: When CPA and MIA go hand in hand. In: Center for Advanced Security Research Darmstadt, pp. 82\u201398 (2011)"},{"key":"12_CR33","unstructured":"Arduino website, \n                  \n                    http:\/\/www.arduino.cc\n                  \n                  \n                 (consulted December 8, 2011)"},{"issue":"1530","key":"12_CR34","first-page":"10","volume":"10","author":"X. Zhu","year":"2008","unstructured":"Zhu, X.: Semi-Supervised Learning Literature Survey Contents. SciencesNew York\u00a010(1530), 10 (2008)","journal-title":"SciencesNew York"}],"container-title":["Lecture Notes in Computer Science","Constructive Side-Channel Analysis and Secure Design"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40026-1_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T15:14:48Z","timestamp":1557933288000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40026-1_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642400254","9783642400261"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40026-1_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}