{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:45:25Z","timestamp":1767321925904,"version":"3.48.0"},"publisher-location":"Singapore","reference-count":30,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819562053","type":"print"},{"value":"9789819562060","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-6206-0_27","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:43:09Z","timestamp":1767321789000},"page":"512-529","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["TS-Seg: Temporal-Spatial Feature Fusion Based Side-Channel Trace Segmentation"],"prefix":"10.1007","author":[{"given":"Yuxuan","family":"Meng","sequence":"first","affiliation":[]},{"given":"Baosheng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Qianqian","family":"Xing","sequence":"additional","affiliation":[]},{"given":"Xiaofeng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"27_CR1","doi-asserted-by":"publisher","first-page":"26","DOI":"10.3390\/cryptography6020026","volume":"6","author":"A Barenghi","year":"2022","unstructured":"Barenghi, A., Falcetti, G., Pelosi, G.: Locating side channel leakage in time through matched filters. Cryptography 6, 26 (2022)","journal-title":"Cryptography"},{"key":"27_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/978-3-319-43283-0_11","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"A Beckers","year":"2016","unstructured":"Beckers, A., Balasch, J., Gierlichs, B., Verbauwhede, I.: Design and implementation of a waveform-matching based triggering system. In: Standaert, F.-X., Oswald, E. (eds.) COSADE 2016. LNCS, vol. 9689, pp. 184\u2013198. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-43283-0_11"},{"key":"27_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"E Brier","year":"2004","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16\u201329. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-28632-5_2"},{"key":"27_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-319-66787-4_3","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2017","author":"E Cagli","year":"2017","unstructured":"Cagli, E., Dumas, C., Prouff, E.: Convolutional neural networks with data augmentation against jitter-based countermeasures. In: Fischer, W., Homma, N. (eds.) CHES 2017. LNCS, vol. 10529, pp. 45\u201368. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66787-4_3"},{"key":"27_CR5","doi-asserted-by":"publisher","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: 4th Conference on Cryptographic Hardware and Embedded Systems (CHES), Redwood Shores, CA, USA, vol.\u00a02523, pp. 13\u201328. Springer (2002). https:\/\/doi.org\/10.1007\/3-540-36400-5_3","DOI":"10.1007\/3-540-36400-5_3"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Chiari, G., Galli, D., Lattari, F., Matteucci, M., Zoni, D.: A deep-learning technique to locate cryptographic operations in side-channel traces. In: Design, Automation & Test in Europe Conference & Exhibition (DATE), Valencia, Spain, pp.\u00a01\u20136. IEEE (2024)","DOI":"10.23919\/DATE58400.2024.10546758"},{"key":"27_CR7","unstructured":"Cong\u00a0Chen, O.D., et al.: NTRU: a submission to the NIST post-quantum standardization effort (2020). https:\/\/ntru.org"},{"key":"27_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/978-3-642-04138-9_12","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"J-S Coron","year":"2009","unstructured":"Coron, J.-S., Kizhvatov, I.: An efficient method for random delay generation in embedded software. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 156\u2013170. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04138-9_12"},{"key":"27_CR9","doi-asserted-by":"publisher","unstructured":"Coron, J., Kizhvatov, I.: Analysis and improvement of the random delay countermeasure of CHES 2009. In: 12th Conference on Cryptographic Hardware and Embedded Systems (CHES), Santa Barbara, CA, USA, vol.\u00a06225, pp. 95\u2013109. Springer (2010). https:\/\/doi.org\/10.1007\/978-3-642-15031-9_7","DOI":"10.1007\/978-3-642-15031-9_7"},{"key":"27_CR10","unstructured":"D\u2019Anvers, J.P., et al.: SABER: mod-LWR based KEM (2020). https:\/\/www.esat.kuleuven.be\/cosic\/pqcrypto\/saber"},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"Dubrova, E., Ngo, K., G\u00e4rtner, J., Wang, R.: Breaking a fifth-order masked implementation of crystals-kyber by copy-paste. In: Proceedings of the 10th ACM Asia Public-Key Cryptography Workshop (APKC), Melbourne, VIC, Australia, pp. 10\u201320. ACM (2023)","DOI":"10.1145\/3591866.3593072"},{"key":"27_CR12","unstructured":"Durvaux, F., Renauld, M., Standaert, F., van Oldeneel\u00a0tot Oldenzeel, L., Veyrat-Charvillon, N.: Cryptanalysis of the CHES 2009\/2010 random delay countermeasure. IACR Cryptol. ePrint Arch, p.\u00a038 (2012)"},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"Galli, D., Chiari, G., Zoni, D.: Hound: locating cryptographic primitives in desynchronized side-channel traces using deep-learning. In: 42nd IEEE International Conference on Computer Design (ICCD), Milan, Italy, pp. 114\u2013121. IEEE (2024)","DOI":"10.1109\/ICCD63220.2024.00027"},{"key":"27_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-642-27954-6_15","volume-title":"Topics in Cryptology \u2013 CT-RSA 2012","author":"J Heyszl","year":"2012","unstructured":"Heyszl, J., Mangard, S., Heinz, B., Stumpf, F., Sigl, G.: Localized electromagnetic analysis of cryptographic implementations. In: Dunkelman, O. (ed.) CT-RSA 2012. LNCS, vol. 7178, pp. 231\u2013244. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-27954-6_15"},{"key":"27_CR15","doi-asserted-by":"crossref","unstructured":"Hoang, A., et al.: Deep learning enhanced side channel analysis on crystals-kyber. In: 25th International Symposium on Quality Electronic Design (ISQED), San Francisco, CA, USA, pp.\u00a01\u20138. IEEE (2024)","DOI":"10.1109\/ISQED60706.2024.10528674"},{"key":"27_CR16","doi-asserted-by":"publisher","unstructured":"Hu, Y., Wang, A., Gong, W., Wu, J., Wang, Z., Zhang, S., Ma, S.: Cross-correlation based trace segmentation for clustering power analysis on public key cryptosystems. In: International Conference on Applied Cryptography and Network Security (ACNS), Abu Dhabi, United Arab Emirates, vol. 14586, pp. 359\u2013375. Springer (2024). https:\/\/doi.org\/10.1007\/978-3-031-61486-6_21","DOI":"10.1007\/978-3-031-61486-6_21"},{"key":"27_CR17","doi-asserted-by":"publisher","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: 19th Annual International Cryptology Conference, Santa Barbara, California, USA. vol.\u00a01666, pp. 388\u2013397. Springer (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_25","DOI":"10.1007\/3-540-48405-1_25"},{"key":"27_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-49445-6_1","volume-title":"Security, Privacy, and Applied Cryptography Engineering","author":"H Maghrebi","year":"2016","unstructured":"Maghrebi, H., Portigliatti, T., Prouff, E.: Breaking cryptographic implementations using deep learning techniques. In: Carlet, C., Hasan, M.A., Saraswat, V. (eds.) SPACE 2016. LNCS, vol. 10076, pp. 3\u201326. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-49445-6_1"},{"key":"27_CR19","doi-asserted-by":"crossref","unstructured":"Mujdei, C., et al.: Side-channel analysis of lattice-based post-quantum cryptography: exploiting polynomial multiplication. ACM Trans. Embed. Comput. Syst. 23(2), 27:1\u201327:23 (2024)","DOI":"10.1145\/3569420"},{"key":"27_CR20","unstructured":"NewAE: Chipwhisperer Pro (2020). https:\/\/wiki.newae.com\/Tutorial$_$P1$_$Using$_$a$_$Custom$_$Trigger"},{"issue":"8","key":"27_CR21","doi-asserted-by":"publisher","first-page":"764","DOI":"10.1109\/TC.1978.1675187","volume":"27","author":"HJ Nussbaumer","year":"1978","unstructured":"Nussbaumer, H.J.: Fast multipliers for number theoretic transforms. IEEE Trans. Comput. 27(8), 764\u2013765 (1978)","journal-title":"IEEE Trans. Comput."},{"key":"27_CR22","unstructured":"Park, J., et al.: PQC-SEP: power side-channel evaluation platform for post-quantum cryptography algorithms. IACR Cryptol. ePrint Arch, p.\u00a0527 (2022)"},{"key":"27_CR23","doi-asserted-by":"crossref","unstructured":"Ravi, P., Chattopadhyay, A., D\u2019Anvers, J., Baksi, A.: Side-channel and fault-injection attacks over lattice-based post-quantum schemes (Kyber, Dilithium): survey and new results. ACM Trans. Embed. Comput. Syst. 23(2), 35:1\u201335:54 (2024)","DOI":"10.1145\/3603170"},{"key":"27_CR24","unstructured":"Riscure: ICWAVES (2020). https:\/\/www.riscure.com\/security-tools\/inspector-hardware"},{"key":"27_CR25","unstructured":"Schwabe, P., et al.: CRYSTALS-Kyber (2021). https:\/\/pq-crystals.org\/kyber\/index.shtml"},{"key":"27_CR26","doi-asserted-by":"crossref","unstructured":"Shaller, A., Zamir, L., Nojoumian, M.: Roadmap of post-quantum cryptography standardization: side-channel attacks and countermeasures. Inf. Comput. 295(Part B), 105112 (2023)","DOI":"10.1016\/j.ic.2023.105112"},{"key":"27_CR27","doi-asserted-by":"publisher","first-page":"3353","DOI":"10.1109\/TIFS.2024.3359890","volume":"19","author":"T Tosun","year":"2024","unstructured":"Tosun, T., Savas, E.: Zero-value filtering for accelerating non-profiled side-channel attack on incomplete NTT-based implementations of lattice-based cryptography. IEEE Trans. Inf. Forensics Secur. 19, 3353\u20133365 (2024)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"27_CR28","first-page":"345","volume":"2022","author":"J Trautmann","year":"2022","unstructured":"Trautmann, J., Beckers, A., Wouters, L., Wildermann, S., Verbauwhede, I., Teich, J.: Semi-automatic locating of cryptographic operations in side-channel traces. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(1), 345\u2013366 (2022)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"27_CR29","doi-asserted-by":"publisher","unstructured":"Wang, A., He, S., Wei, C., Sun, S., Ding, Y., Wang, J.: Using convolutional neural network to redress outliers in clustering based side-channel analysis on cryptosystem. In: 7th Smart Computing and Communication, New York City, NY, USA. vol. 13828, pp. 360\u2013370. Springer (2022). https:\/\/doi.org\/10.1007\/978-3-031-28124-2_34","DOI":"10.1007\/978-3-031-28124-2_34"},{"issue":"4","key":"27_CR30","doi-asserted-by":"publisher","first-page":"40","DOI":"10.46586\/tches.v2024.i4.40-83","volume":"2024","author":"Z Wang","year":"2024","unstructured":"Wang, Z., et al.: SPA-GPT: general pulse tailor for simple power analysis based on reinforcement learning. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(4), 40\u201383 (2024)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-6206-0_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:43:11Z","timestamp":1767321791000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-6206-0_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819562053","9789819562060"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-6206-0_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Inscrypt","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisc22025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/inscrypt2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}