{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T19:36:32Z","timestamp":1725910592414},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811063848"},{"type":"electronic","value":"9789811063855"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-6385-5_46","type":"book-chapter","created":{"date-parts":[[2017,9,15]],"date-time":"2017-09-15T14:03:52Z","timestamp":1505484232000},"page":"549-557","source":"Crossref","is-referenced-by-count":1,"title":["Side-Channel Attacks Based on Collaborative Learning"],"prefix":"10.1007","author":[{"given":"Biao","family":"Liu","sequence":"first","affiliation":[]},{"given":"Zhao","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Jiali","family":"Li","sequence":"additional","affiliation":[]},{"given":"Huamin","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,16]]},"reference":[{"key":"46_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1007\/978-3-642-01957-9_30","volume-title":"Applied Cryptography and Network Security","author":"F-X Standaert","year":"2009","unstructured":"Standaert, F.-X., Koeune, F., Schindler, W.: How to compare profiled side-channel attacks? In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 485\u2013498. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-01957-9_30"},{"key":"46_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-36400-5_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S Chari","year":"2003","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski, B.S., Ko\u00e7, K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13\u201328. Springer, Heidelberg (2003). doi: 10.1007\/3-540-36400-5_3"},{"key":"46_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/11545262_3","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"W Schindler","year":"2005","unstructured":"Schindler, W., Lemke, K., Paar, C.: A stochastic model for differential side channel cryptanalysis. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 30\u201346. Springer, Heidelberg (2005). doi: 10.1007\/11545262_3"},{"key":"46_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1007\/978-3-540-74835-9_30","volume-title":"Computer Security \u2013 ESORICS 2007","author":"K Lemke-Rust","year":"2007","unstructured":"Lemke-Rust, K., Paar, C.: Analyzing side channel leakage of masked implementations with stochastic methods. In: Biskup, J., L\u00f3pez, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 454\u2013468. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-74835-9_30"},{"issue":"4","key":"46_CR5","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/s13389-011-0023-x","volume":"1","author":"G Hospodar","year":"2011","unstructured":"Hospodar, G., Gierlichs, B., Mulder, E.D., et al.: Machine learning in side-channel analysis: a first study. J. Crypt. Eng. 1(4), 293\u2013302 (2011)","journal-title":"J. Crypt. Eng."},{"issue":"2","key":"46_CR6","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1504\/IJACT.2014.062740","volume":"3","author":"H Patel","year":"2014","unstructured":"Patel, H., Baldwin, R.O.: Random forest profiling attack on advanced encryption standard. In. J. Appl. Crypt. 3(2), 181\u2013194 (2014)","journal-title":"In. J. Appl. Crypt."},{"key":"46_CR7","unstructured":"Karsmakers, P., Gierlichs, B., Pelckmans, K., et al.: Side channel attacks on cryptographic devices as a classification problem. Esat.kuleuven.be"},{"key":"46_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/978-3-642-40026-1_12","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"L Lerman","year":"2013","unstructured":"Lerman, L., Medeiros, S.F., Veshchikov, N., Meuter, C., Bontempi, G., Markowitch, O.: Semi-supervised template attack. In: Prouff, E. (ed.) COSADE 2013. LNCS, vol. 7864, pp. 184\u2013199. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-40026-1_12"},{"key":"46_CR9","doi-asserted-by":"crossref","unstructured":"Blum, A., Mitchell, T.: Combining labeled and unlabeled data with co-training. In: Colt, pp. 92\u2013100 (1998)","DOI":"10.1145\/279943.279962"},{"key":"46_CR10","unstructured":"Goldman, S.A., Zhou, Y.: Enhancing supervised learning with unlabeled data. In: Proceedings of the Seventeenth International Conference on Machine Learning, pp. 327\u2013334 (2000)"},{"issue":"11","key":"46_CR11","doi-asserted-by":"crossref","first-page":"1529","DOI":"10.1109\/TKDE.2005.186","volume":"17","author":"Z Zhou","year":"2005","unstructured":"Zhou, Z., Li, M.: Tri-training: exploiting unlabeled data using three classifiers. IEEE Trans. Knowl. Data Eng. 17(11), 1529\u20131541 (2005)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"11","key":"46_CR12","doi-asserted-by":"crossref","first-page":"1871","DOI":"10.3724\/SP.J.1004.2013.01871","volume":"39","author":"Z Zhou","year":"2013","unstructured":"Zhou, Z.: Disagreement-based semi-supervised learning. Acta Autom. Sin. 39(11), 1871\u20131878 (2013)","journal-title":"Acta Autom. Sin."},{"issue":"6","key":"46_CR13","first-page":"1564","volume":"8","author":"V Vapnik","year":"1995","unstructured":"Vapnik, V.: The nature of statistical learning theory. IEEE Trans. Neural Netw. 8(6), 1564 (1995)","journal-title":"IEEE Trans. Neural Netw."},{"key":"46_CR14","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20, 273\u2013297 (1995)","journal-title":"Mach. Learn."},{"issue":"4","key":"46_CR15","doi-asserted-by":"crossref","first-page":"61","DOI":"10.7551\/mitpress\/1113.003.0008","volume":"10","author":"JC Platt","year":"2000","unstructured":"Platt, J.C.: Probabilistic outputs for support vector machines and comparisons to regularized likelihood methods. Adv. Large Margin Classif. 10(4), 61\u201374 (2000)","journal-title":"Adv. Large Margin Classif."},{"key":"46_CR16","unstructured":"Description of the masked AES of the DPA contest v4. http:\/\/www.dpacontest.org\/v4\/data\/rsm\/aes-rsm.pdf"},{"key":"46_CR17","doi-asserted-by":"crossref","unstructured":"Nassar, M., Souissi, Y., Guilley, S., et al.: RSM: a small and fast countermeasure for AES, secure against 1st and 2nd-order zero-offset SCAs. In: Design, Automation & Test in Europe Conference & Exhibition. IEEE, pp. 1173\u20131178 (2012)","DOI":"10.1109\/DATE.2012.6176671"},{"key":"46_CR18","first-page":"112","volume":"11","author":"B Liu","year":"2014","unstructured":"Liu, B.: Correlation power attack on aes cipher chip with rotating masking. J. Huazhong Univ. Sci. Technol. (Nat. Sci. Ed.) 11, 112\u2013116 (2014)","journal-title":"J. Huazhong Univ. Sci. Technol. (Nat. Sci. Ed.)"},{"key":"46_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1007\/978-3-540-31815-6_35","volume-title":"Information Security Applications","author":"C Rechberger","year":"2005","unstructured":"Rechberger, C., Oswald, E.: Practical template attacks. In: Lim, C.H., Yung, M. (eds.) WISA 2004. LNCS, vol. 3325, pp. 440\u2013456. Springer, Heidelberg (2005). doi: 10.1007\/978-3-540-31815-6_35"},{"key":"46_CR20","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/s13389-014-0089-3","volume":"5","author":"L Lerman","year":"2015","unstructured":"Lerman, L., Bontempi, G., Labelowitch, O.: A machine learning approach against a masked AES. J. Crypt. Eng. 5, 123\u2013139 (2015). International Conference Smart Card Research and Advanced Applications, Cardis","journal-title":"J. Crypt. Eng."}],"container-title":["Communications in Computer and Information Science","Data Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-6385-5_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,27]],"date-time":"2024-06-27T00:03:45Z","timestamp":1719446625000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-6385-5_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811063848","9789811063855"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-6385-5_46","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]}}}