{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T06:30:10Z","timestamp":1764570610498,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662483237"},{"type":"electronic","value":"9783662483244"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-48324-4_2","type":"book-chapter","created":{"date-parts":[[2015,8,31]],"date-time":"2015-08-31T06:27:48Z","timestamp":1441002468000},"page":"22-41","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Less is More"],"prefix":"10.1007","author":[{"given":"Nicolas","family":"Bruneau","sequence":"first","affiliation":[]},{"given":"Sylvain","family":"Guilley","sequence":"additional","affiliation":[]},{"given":"Annelie","family":"Heuser","sequence":"additional","affiliation":[]},{"given":"Damien","family":"Marion","sequence":"additional","affiliation":[]},{"given":"Olivier","family":"Rioul","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,9,1]]},"reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11894063_1","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"C Archambeau","year":"2006","unstructured":"Archambeau, C., Peeters, E., Standaert, F.-X., Quisquater, J.-J.: Template attacks in principal subspaces. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 1\u201314. Springer, Heidelberg (2006)"},{"key":"2_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/978-3-642-27954-6_24","volume-title":"Topics in Cryptology \u2013 CT-RSA 2012","author":"L Batina","year":"2012","unstructured":"Batina, L., Hogenboom, J., van Woudenberg, J.G.J.: Getting more from PCA: first results of using principal component analysis for extensive power analysis. In: Dunkelman, O. (ed.) CT-RSA 2012. LNCS, vol. 7178, pp. 383\u2013397. Springer, Heidelberg (2012)"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Bhasin, S., Danger, J.-L., Guilley, S., Najm, Z.: Side-channel leakage and trace compression using normalized inter-class variance. In: Proceedings of the Third Workshop on Hardware and Architectural Support for Security and Privacy, HASP 2014, pp. 7:1\u20137:9. ACM, New York (2014)","DOI":"10.1145\/2611765.2611772"},{"key":"2_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"E Brier","year":"2004","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16\u201329. Springer, Heidelberg (2004)"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/978-3-319-12060-7_13","volume-title":"Security, Privacy, and Applied Cryptography Engineering","author":"N Bruneau","year":"2014","unstructured":"Bruneau, N., Danger, J.-L., Guilley, S., Heuser, A., Teglia, Y.: Boosting higher-order correlation attacks by dimensionality reduction. In: Chakraborty, R.S., Matyas, V., Schaumont, P. (eds.) SPACE 2014. LNCS, vol. 8804, pp. 183\u2013200. Springer, Heidelberg (2014)"},{"key":"2_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-36400-5_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S Chari","year":"2002","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski, B.S., Ko\u00e7, K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13\u201328. Springer, Heidelberg (2002)"},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1007\/978-3-319-14123-7_17","volume-title":"Smart Card Research and Advanced Applications","author":"O Choudary","year":"2014","unstructured":"Choudary, O., Kuhn, M.G.: Efficient template attacks. In: Francillon, A., Rohatgi, P. (eds.) CARDIS 2013. LNCS, vol. 8419, pp. 253\u2013270. Springer, Heidelberg (2014)"},{"key":"2_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13389-014-0075-9","volume":"4","author":"C Clavier","year":"2014","unstructured":"Clavier, C., Danger, J.-L., Duc, G., Elaabid, M.A., G\u00e9rard, B., Guilley, S., Heuser, A., Kasper, M., Li, Y., Lomn\u00e9, V., Nakatsu, D., Ohta, K., Sakiyama, K., Sauvage, L., Schindler, W., St\u00f6ttinger, M., Veyrat-Charvillon, N., Walle, M., Wurcker, A.: Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest. J. Cryptogr. Eng. 4, 1\u201316 (2014)","journal-title":"J. Cryptogr. Eng."},{"key":"2_CR9","volume-title":"Elements of Information Theory","author":"TM Cover","year":"2006","unstructured":"Cover, T.M., Thomas, J.A.: Elements of Information Theory, 2nd edn. Wiley-Interscience, New York (2006). ISBN-10: ISBN-10: 0471241954, ISBN-13: 978\u20130471241959","edition":"2"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Danger, J.-L., Debande, N., Guilley, S., Souissi, Y.: High-order timing attacks. In: Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2 2014, pp. 7\u201312. ACM, New York (2014)","DOI":"10.1145\/2556315.2556316"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Debande, N., Souissi, Y., Elaabid, M.A., Guilley, S., Danger, J.-L.: Wavelet transform based pre-processing for side channel analysis. In: 45th Annual IEEE\/ACM International Symposium on Microarchitecture, MICRO 2012, Workshops Proceedings, Vancouver, BC, Canada, 1\u20135 December 2012, pp. 32\u201338. IEEE Computer Society (2012)","DOI":"10.1109\/MICROW.2012.15"},{"key":"2_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-319-21476-4_3","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"F Durvaux","year":"2015","unstructured":"Durvaux, F., Standaert, F.-X., Veyrat-Charvillon, N., Mairy, J.-B., Deville, Y.: Efficient selection of time samples for higher-order DPA with projection pursuits. In: Mangard, S., Poschmann, A.Y. (eds.) COSADE 2015. LNCS, vol. 9064, pp. 34\u201350. Springer, Heidelberg (2015). \n                      http:\/\/eprint.iacr.org\/2014\/412"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Fei, Y., Luo, Q., Ding, A.A.: A statistical model for DPA with novel algorithmic confusion analysis. In: Prouff, E., Schaumont, P. (eds.) [25], pp. 233\u2013250","DOI":"10.1007\/978-3-642-33027-8_14"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/11894063_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"B Gierlichs","year":"2006","unstructured":"Gierlichs, B., Lemke-Rust, K., Paar, C.: Templates vs. stochastic methods. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 15\u201329. Springer, Heidelberg (2006)"},{"issue":"11","key":"2_CR15","doi-asserted-by":"publisher","first-page":"1482","DOI":"10.1109\/TC.2008.109","volume":"57","author":"S Guilley","year":"2008","unstructured":"Guilley, S., Chaudhuri, S., Sauvage, L., Hoogvorst, P., Pacalet, R., Bertoni, G.M.: Security evaluation of WDDL and SecLib countermeasures against power attacks. IEEE Trans. Comput. 57(11), 1482\u20131497 (2008)","journal-title":"IEEE Trans. Comput."},{"key":"2_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1007\/978-3-319-12087-4_21","volume-title":"Information Security and Cryptology","author":"S Hajra","year":"2014","unstructured":"Hajra, S., Mukhopadhyay, D.: Multivariate leakage model for improving non-profiling DPA on noisy power traces. In: Lin, D., Xu, S., Yung, M. (eds.) Inscrypt 2013. LNCS, vol. 8567, pp. 325\u2013342. Springer, Heidelberg (2014)"},{"key":"2_CR17","unstructured":"Hajra, S., Mukhopadhyay, D.: SNR to success rate: reaching the limit of non-profiling DPA. Cryptology ePrint Archive, Report 2013\/865 (2013). \n                      http:\/\/eprint.iacr.org\/2013\/865\/"},{"key":"2_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/978-3-319-10175-0_12","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"S Hajra","year":"2014","unstructured":"Hajra, S., Mukhopadhyay, D.: On the optimal pre-processing for non-profiling differential power analysis. In: Prouff, E. (ed.) COSADE 2014. LNCS, vol. 8622, pp. 161\u2013178. Springer, Heidelberg (2014)"},{"issue":"6","key":"2_CR19","doi-asserted-by":"publisher","first-page":"915","DOI":"10.1109\/TCAD.2014.2387830","volume":"34","author":"S Hajra","year":"2015","unstructured":"Hajra, S., Mukhopadhyay, D.: Reaching the limit of nonprofiling DPA. IEEE Trans. CAD Integr. Circ. Syst. 34(6), 915\u2013927 (2015)","journal-title":"IEEE Trans. CAD Integr. Circ. Syst."},{"key":"2_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/978-3-662-44709-3_4","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2014","author":"A Heuser","year":"2014","unstructured":"Heuser, A., Rioul, O., Guilley, S.: Good is not good enough. In: Batina, L., Robshaw, M. (eds.) CHES 2014. LNCS, vol. 8731, pp. 55\u201374. Springer, Heidelberg (2014)"},{"key":"2_CR21","unstructured":"Karsmakers, P., Gierlichs, B., Pelckmans, K., De Cock, K., Suykens, J., Preneel, B., De Moor, B.: Side channel attacks on cryptographic devices as a classification problem. COSIC technical report (2009)"},{"key":"2_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"PC Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"2_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/978-3-642-37288-9_15","volume-title":"Smart Card Research and Advanced Applications","author":"D Oswald","year":"2013","unstructured":"Oswald, D., Paar, C.: Improving side-channel analysis with optimal linear transforms. In: Mangard, S. (ed.) CARDIS 2012. LNCS, vol. 7771, pp. 219\u2013233. Springer, Heidelberg (2013)"},{"key":"2_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/11605805_13","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"E Oswald","year":"2006","unstructured":"Oswald, E., Mangard, S., Herbst, C., Tillich, S.: Practical second-order DPA attacks for masked smart card implementations of block ciphers. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 192\u2013207. Springer, Heidelberg (2006)"},{"key":"2_CR25","series-title":"Lecture Notes in Computer Science","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2012","year":"2012","unstructured":"Prouff, E., Schaumont, P. (eds.): CHES 2012. LNCS, vol. 7428. Springer, Heidelberg (2012)"},{"key":"2_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-642-20465-4_8","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2011","author":"M Renauld","year":"2011","unstructured":"Renauld, M., Standaert, F.-X., Veyrat-Charvillon, N., Kamel, D., Flandre, D.: A formal study of power variability issues and side-channel attacks for nanoscale devices. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 109\u2013128. Springer, Heidelberg (2011)"},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"Reparaz, O., Gierlichs, B., Verbauwhede, I.: Selecting time samples for multivariate DPA attacks. In: Prouff, E., Schaumont, P. (eds.) [25], pp. 155\u2013174","DOI":"10.1007\/978-3-642-33027-8_10"},{"key":"2_CR28","unstructured":"Satoh, A.: Side-channel Attack Standard Evaluation Board, SASEBO-GII. Project of the AIST - RCIS (Research Center for Information Security). \n                      http:\/\/www.rcis.aist.go.jp\/special\/SASEBO\/SASEBO-GII-en.html\n                      \n                    . Accessed 31 May 2015"},{"key":"2_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/978-3-642-30955-7_15","volume-title":"Information Security Theory and Practice","author":"Y Souissi","year":"2012","unstructured":"Souissi, Y., Debande, N., Mekki, S., Guilley, S., Maalaoui, A., Danger, J.-L.: On the optimality of correlation power attack on embedded cryptographic systems. In: Askoxylakis, I., P\u00f6hls, H.C., Posegga, J. (eds.) WISTP 2012. LNCS, vol. 7322, pp. 169\u2013178. Springer, Heidelberg (2012)"},{"key":"2_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/978-3-642-24209-0_27","volume-title":"Information Security and Cryptology - ICISC 2010","author":"Y Souissi","year":"2011","unstructured":"Souissi, Y., Nassar, M., Guilley, S., Danger, J.-L., Flament, F.: First principal components analysis: a new side channel distinguisher. In: Rhee, K.-H., Nyang, D.H. (eds.) ICISC 2010. LNCS, vol. 6829, pp. 407\u2013419. Springer, Heidelberg (2011)"},{"key":"2_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/978-3-540-85053-3_26","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"F-X Standaert","year":"2008","unstructured":"Standaert, F.-X., Archambeau, C.: Using subspace-based template attacks to compare and combine power and electromagnetic information leakages. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 411\u2013425. Springer, Heidelberg (2008)"},{"issue":"8","key":"2_CR32","doi-asserted-by":"publisher","first-page":"1157","DOI":"10.1109\/JPROC.2014.2325397","volume":"102","author":"D Strobel","year":"2014","unstructured":"Strobel, D., Oswald, D., Richter, B., Schellenberg, F., Paar, C.: Microcontrollers as (in)security devices for pervasive computing applications. Proc. IEEE 102(8), 1157\u20131173 (2014)","journal-title":"Proc. IEEE"},{"issue":"15","key":"2_CR33","doi-asserted-by":"publisher","first-page":"1139","DOI":"10.1587\/elex.7.1139","volume":"7","author":"T Sugawara","year":"2010","unstructured":"Sugawara, T., Homma, N., Aoki, T., Satoh, A.: Profiling attack using multivariate regression analysis. IEICE Electron. Express 7(15), 1139\u20131144 (2010)","journal-title":"IEICE Electron. Express"},{"key":"2_CR34","unstructured":"TELECOM ParisTech. DPA Contest, \n                      \n                        \n                      \n                      $$2^\\text{ nd }$$\n                     edition. \n                      http:\/\/www.DPAcontest.org\/v2\/\n                      \n                    . Accessed 31 May 2015"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems -- CHES 2015"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-48324-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T20:02:54Z","timestamp":1566849774000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-48324-4_2"}},"subtitle":["Dimensionality Reduction from a Theoretical Perspective"],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662483237","9783662483244"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-48324-4_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"1 September 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}