{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T23:15:17Z","timestamp":1776208517036,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":46,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819609437","type":"print"},{"value":"9789819609444","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0944-4_4","type":"book-chapter","created":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T06:01:23Z","timestamp":1733896883000},"page":"99-131","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["It\u2019s a\u00a0Kind of\u00a0Magic: A Novel Conditional GAN Framework for\u00a0Efficient Profiling Side-Channel Analysis"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-1598-8400","authenticated-orcid":false,"given":"Sengim","family":"Karayal\u00e7\u0131n","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8475-1853","authenticated-orcid":false,"given":"Marina","family":"Kr\u010dek","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7139-732X","authenticated-orcid":false,"given":"Lichao","family":"Wu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7509-4337","authenticated-orcid":false,"given":"Stjepan","family":"Picek","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3799-7636","authenticated-orcid":false,"given":"Guilherme","family":"Perin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,12]]},"reference":[{"key":"4_CR1","doi-asserted-by":"publisher","unstructured":"Agrawal, D., Archambeault, B., Rao, J.R., Rohatgi, P.: The EM side-channel(s). In: Jr., B.S.K., Ko\u00e7, \u00c7.K., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers. Lecture Notes in Computer Science, vol.\u00a02523, pp. 29\u201345. Springer (2002). https:\/\/doi.org\/10.1007\/3-540-36400-5_4","DOI":"10.1007\/3-540-36400-5_4"},{"key":"4_CR2","doi-asserted-by":"publisher","unstructured":"Bach, S., Binder, A., Montavon, G., Klauschen, F., M\u00fcller, K.R., Samek, W.: On pixel-wise explanations for non-linear classifier decisions by layer-wise relevance propagation. PLOS ONE 10(7), 1\u201346 (07 2015). https:\/\/doi.org\/10.1371\/journal.pone.0130140","DOI":"10.1371\/journal.pone.0130140"},{"issue":"2","key":"4_CR3","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s13389-019-00220-8","volume":"10","author":"R Benadjila","year":"2020","unstructured":"Benadjila, R., Prouff, E., Strullu, R., Cagli, E., Dumas, C.: Deep learning for side-channel analysis and introduction to ASCAD database. J. Cryptographic Engineering 10(2), 163\u2013188 (2020). https:\/\/doi.org\/10.1007\/s13389-019-00220-8","journal-title":"J. Cryptographic Engineering"},{"key":"4_CR4","doi-asserted-by":"publisher","unstructured":"Bhasin, S., Bruneau, N., Danger, J., Guilley, S., Najm, Z.: Analysis and improvements of the DPA contest v4 implementation. In: Chakraborty, R.S., Matyas, V., Schaumont, P. (eds.) Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings. Lecture Notes in Computer Science, vol.\u00a08804, pp. 201\u2013218. Springer (2014). https:\/\/doi.org\/10.1007\/978-3-319-12060-7_14, https:\/\/doi.org\/10.1007\/978-3-319-12060-7_14","DOI":"10.1007\/978-3-319-12060-7_14"},{"key":"4_CR5","doi-asserted-by":"publisher","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings. Lecture Notes in Computer Science, vol.\u00a03156, pp. 16\u201329. Springer (2004). https:\/\/doi.org\/10.1007\/978-3-540-28632-5_2","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"4_CR6","unstructured":"Bronchain, O., Cassiers, G., Standaert, F.: Give me 5 minutes: Attacking ASCAD with a single side-channel trace. IACR Cryptol. ePrint Arch. p.\u00a0817 (2021), https:\/\/eprint.iacr.org\/2021\/817"},{"key":"4_CR7","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1109\/TIFS.2022.3144871","volume":"17","author":"O Bronchain","year":"2022","unstructured":"Bronchain, O., Durvaux, F., Masure, L., Standaert, F.: Efficient profiled side-channel analysis of masked implementations, extended. IEEE Trans. Inf. Forensics Secur. 17, 574\u2013584 (2022). https:\/\/doi.org\/10.1109\/TIFS.2022.3144871","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4_CR8","doi-asserted-by":"publisher","unstructured":"Bronchain, O., Standaert, F.: Side-channel countermeasures\u2019 dissection and the limits of closed source security evaluations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(2), 1\u201325 (2020). https:\/\/doi.org\/10.13154\/tches.v2020.i2.1-25","DOI":"10.13154\/tches.v2020.i2.1-25"},{"key":"4_CR9","doi-asserted-by":"publisher","first-page":"3863","DOI":"10.1109\/TIFS.2022.3216959","volume":"17","author":"P Cao","year":"2022","unstructured":"Cao, P., Zhang, C., Lu, X., Gu, D., Xu, S.: Improving deep learning based second-order side-channel analysis with bilinear CNN. IEEE Trans. Inf. Forensics Secur. 17, 3863\u20133876 (2022). https:\/\/doi.org\/10.1109\/TIFS.2022.3216959","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4_CR10","doi-asserted-by":"publisher","unstructured":"Cao, P., Zhang, H., Gu, D., Lu, Y., Yuan, Y.: AL-PA: cross-device profiled side-channel attack using adversarial learning. In: Oshana, R. (ed.) DAC \u201922: 59th ACM\/IEEE Design Automation Conference, San Francisco, California, USA, July 10 - 14, 2022. pp. 691\u2013696. ACM (2022). https:\/\/doi.org\/10.1145\/3489517.3530517","DOI":"10.1145\/3489517.3530517"},{"key":"4_CR11","doi-asserted-by":"publisher","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Jr., B.S.K., Ko\u00e7, \u00c7.K., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers. Lecture Notes in Computer Science, vol.\u00a02523, pp. 13\u201328. Springer (2002). https:\/\/doi.org\/10.1007\/3-540-36400-5_3","DOI":"10.1007\/3-540-36400-5_3"},{"key":"4_CR12","unstructured":"Chen, X., Duan, Y., Houthooft, R., Schulman, J., Sutskever, I., Abbeel, P.: Infogan: Interpretable representation learning by information maximizing generative adversarial nets. In: Lee, D.D., Sugiyama, M., von Luxburg, U., Guyon, I., Garnett, R. (eds.) Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016, December 5-10, 2016, Barcelona, Spain. pp. 2172\u20132180 (2016), https:\/\/proceedings.neurips.cc\/paper\/2016\/hash\/7c9d0b1f96aebd7b5eca8c3edaa19ebb-Abstract.html"},{"key":"4_CR13","doi-asserted-by":"publisher","unstructured":"Cristiani, V., Lecomte, M., Maurine, P.: The evil machine: Encode, visualize and interpret the leakage. In: Proceedings of the 38th ACM\/SIGAPP Symposium on Applied Computing. p. 1566-1575. SAC \u201923, Association for Computing Machinery, New York, NY, USA (2023). https:\/\/doi.org\/10.1145\/3555776.3577688","DOI":"10.1145\/3555776.3577688"},{"key":"4_CR14","unstructured":"Dubrova, E., Ngo, K., G\u00e4rtner, J.: Breaking a fifth-order masked implementation of crystals-kyber by copy-paste. IACR Cryptol. ePrint Arch. p.\u00a01713 (2022), https:\/\/eprint.iacr.org\/2022\/1713"},{"key":"4_CR15","unstructured":"Genevey-Metat, C., G\u00e9rard, B., Heuser, A.: On what to learn: Train or adapt a deeply learned profile? IACR Cryptol. ePrint Arch. p.\u00a0952 (2020), https:\/\/eprint.iacr.org\/2020\/952"},{"key":"4_CR16","doi-asserted-by":"publisher","unstructured":"Genevey-Metat, C., Heuser, A., G\u00e9rard, B.: Trace-to-trace translation for SCA. In: Grosso, V., P\u00f6ppelmann, T. (eds.) Smart Card Research and Advanced Applications - 20th International Conference, CARDIS 2021, L\u00fcbeck, Germany, November 11-12, 2021, Revised Selected Papers. Lecture Notes in Computer Science, vol. 13173, pp. 24\u201343. Springer (2021). https:\/\/doi.org\/10.1007\/978-3-030-97348-3_2","DOI":"10.1007\/978-3-030-97348-3_2"},{"key":"4_CR17","doi-asserted-by":"publisher","unstructured":"Genkin, D., Shamir, A., Tromer, E.: RSA key extraction via low-bandwidth acoustic cryptanalysis. In: Garay, J.A., Gennaro, R. (eds.) Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I. Lecture Notes in Computer Science, vol.\u00a08616, pp. 444\u2013461. Springer (2014). https:\/\/doi.org\/10.1007\/978-3-662-44371-2_25","DOI":"10.1007\/978-3-662-44371-2_25"},{"key":"4_CR18","doi-asserted-by":"publisher","unstructured":"Gierlichs, B., Batina, L., Tuyls, P., Preneel, B.: Mutual information analysis. In: Oswald, E., Rohatgi, P. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings. Lecture Notes in Computer Science, vol.\u00a05154, pp. 426\u2013442. Springer (2008). https:\/\/doi.org\/10.1007\/978-3-540-85053-3_27","DOI":"10.1007\/978-3-540-85053-3_27"},{"key":"4_CR19","unstructured":"Goodfellow, I., Bengio, Y., Courville, A.: Deep Learning. MIT Press (2016), http:\/\/www.deeplearningbook.org"},{"key":"4_CR20","unstructured":"Goodfellow, I.J., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A.C., Bengio, Y.: Generative adversarial nets. In: Ghahramani, Z., Welling, M., Cortes, C., Lawrence, N.D., Weinberger, K.Q. (eds.) Advances in Neural Information Processing Systems 27: Annual Conference on Neural Information Processing Systems 2014, December 8-13 2014, Montreal, Quebec, Canada. pp. 2672\u20132680 (2014), https:\/\/proceedings.neurips.cc\/paper\/2014\/hash\/5ca3e9b122f61f8f06494c97b1afccf3-Abstract.html"},{"key":"4_CR21","unstructured":"Heusel, M., Ramsauer, H., Unterthiner, T., Nessler, B., Hochreiter, S.: Gans trained by a two time-scale update rule converge to a local nash equilibrium. In: Guyon, I., von Luxburg, U., Bengio, S., Wallach, H.M., Fergus, R., Vishwanathan, S.V.N., Garnett, R. (eds.) Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, December 4-9, 2017, Long Beach, CA, USA. pp. 6626\u20136637 (2017), https:\/\/proceedings.neurips.cc\/paper\/2017\/hash\/8a1d694707eb0fefe65871369074926d-Abstract.html"},{"key":"4_CR22","unstructured":"Hu, Y., Zheng, Y., Feng, P., Liu, L., Zhang, C., Gohr, A., Jacob, S., Schindler, W., Buhan, I., Tobich, K.: Machine learning and side channel analysis in a CTF competition. IACR Cryptol. ePrint Arch. p.\u00a0860 (2019), https:\/\/eprint.iacr.org\/2019\/860"},{"key":"4_CR23","doi-asserted-by":"publisher","unstructured":"Hutter, M., Schmidt, J.: The temperature side channel and heating fault attacks. In: Francillon, A., Rohatgi, P. (eds.) Smart Card Research and Advanced Applications - 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers. Lecture Notes in Computer Science, vol.\u00a08419, pp. 219\u2013235. Springer (2013). https:\/\/doi.org\/10.1007\/978-3-319-08302-5_15","DOI":"10.1007\/978-3-319-08302-5_15"},{"key":"4_CR24","doi-asserted-by":"publisher","unstructured":"Isola, P., Zhu, J., Zhou, T., Efros, A.A.: Image-to-image translation with conditional adversarial networks. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2017, Honolulu, HI, USA, July 21-26, 2017. pp. 5967\u20135976. IEEE Computer Society (2017). https:\/\/doi.org\/10.1109\/CVPR.2017.632","DOI":"10.1109\/CVPR.2017.632"},{"key":"4_CR25","unstructured":"Karayalcin, S., Krcek, M., Wu, L., Picek, S., Perin, G.: It\u2019s a kind of magic: A novel conditional GAN framework for efficient profiling side-channel analysis (extended version). Cryptology ePrint Archive, Paper 2023\/1108 (2023), https:\/\/eprint.iacr.org\/2023\/1108"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Kocher, P.C.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Proceedings of CRYPTO\u201996. LNCS, vol.\u00a01109, pp. 104\u2013113. Springer-Verlag (1996)","DOI":"10.1007\/3-540-68697-5_9"},{"key":"4_CR27","doi-asserted-by":"publisher","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M.J. (ed.) Advances in Cryptology - CRYPTO \u201999, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings. Lecture Notes in Computer Science, vol.\u00a01666, pp. 388\u2013397. Springer (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_25","DOI":"10.1007\/3-540-48405-1_25"},{"key":"4_CR28","doi-asserted-by":"crossref","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology. pp. 388\u2013397. CRYPTO \u201999, Springer-Verlag, London, UK, UK (1999), http:\/\/dl.acm.org\/citation.cfm?id=646764.703989","DOI":"10.1007\/3-540-48405-1_25"},{"key":"4_CR29","unstructured":"Kong, J., Kim, J., Bae, J.: Hifi-gan: Generative adversarial networks for efficient and high fidelity speech synthesis. In: Larochelle, H., Ranzato, M., Hadsell, R., Balcan, M., Lin, H. (eds.) Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, NeurIPS 2020, December 6-12, 2020, virtual (2020), https:\/\/proceedings.neurips.cc\/paper\/2020\/hash\/c5d736809766d46260d816d8dbc9eb44-Abstract.html"},{"key":"4_CR30","doi-asserted-by":"publisher","unstructured":"Masure, L., Cristiani, V., Lecomte, M., Standaert, F.: Don\u2019t learn what you already know scheme-aware modeling for profiling side-channel analysis against masking. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(1), 32\u201359 (2023). https:\/\/doi.org\/10.46586\/tches.v2023.i1.32-59","DOI":"10.46586\/tches.v2023.i1.32-59"},{"key":"4_CR31","unstructured":"Masure, L., Strullu, R.: Side channel analysis against the anssi\u2019s protected AES implementation on ARM. IACR Cryptol. ePrint Arch. p.\u00a0592 (2021), https:\/\/eprint.iacr.org\/2021\/592"},{"key":"4_CR32","unstructured":"Mirza, M., Osindero, S.: Conditional generative adversarial nets. CoRR abs\/1411.1784 (2014), http:\/\/arxiv.org\/abs\/1411.1784"},{"key":"4_CR33","doi-asserted-by":"publisher","unstructured":"Mukhtar, N., Batina, L., Picek, S., Kong, Y.: Fake it till you make it: Data augmentation using generative adversarial networks for all the crypto you need on small devices. In: Galbraith, S.D. (ed.) Topics in Cryptology - CT-RSA 2022 - Cryptographers\u2019 Track at the RSA Conference 2022, Virtual Event, March 1-2, 2022, Proceedings. Lecture Notes in Computer Science, vol. 13161, pp. 297\u2013321. Springer (2022). https:\/\/doi.org\/10.1007\/978-3-030-95312-6_13","DOI":"10.1007\/978-3-030-95312-6_13"},{"key":"4_CR34","doi-asserted-by":"publisher","unstructured":"Perin, G., Wu, L., Picek, S.: Exploring feature selection scenarios for deep learning-based side-channel analysis. IACR Transactions on Cryptographic Hardware and Embedded Systems 2022(4), 828-861 (Aug 2022). https:\/\/doi.org\/10.46586\/tches.v2022.i4.828-861, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/9842","DOI":"10.46586\/tches.v2022.i4.828-861"},{"key":"4_CR35","doi-asserted-by":"publisher","unstructured":"Picek, S., Heuser, A., Jovic, A., Bhasin, S., Regazzoni, F.: The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations. IACR Transactions on Cryptographic Hardware and Embedded Systems 2019(1), 209\u2013237 (Nov 2018). https:\/\/doi.org\/10.13154\/tches.v2019.i1.209-237, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/7339","DOI":"10.13154\/tches.v2019.i1.209-237"},{"key":"4_CR36","doi-asserted-by":"publisher","unstructured":"Picek, S., Perin, G., Mariot, L., Wu, L., Batina, L.: Sok: Deep learning-based physical side-channel analysis. ACM Comput. Surv. (oct 2022). https:\/\/doi.org\/10.1145\/3569577, just Accepted","DOI":"10.1145\/3569577"},{"key":"4_CR37","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/978-3-642-01001-9_26","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"FX Standaert","year":"2009","unstructured":"Standaert, F.X., Malkin, T.G., Yung, M.: A unified framework for the analysis of side-channel key recovery attacks. In: Joux, A. (ed.) Advances in Cryptology - EUROCRYPT 2009. pp. 443\u2013461. Springer Berlin Heidelberg, Berlin, Heidelberg (2009)"},{"key":"4_CR38","doi-asserted-by":"publisher","unstructured":"Thapar, D., Alam, M., Mukhopadhyay, D.: Deep learning assisted cross-family profiled side-channel attacks using transfer learning. In: 22nd International Symposium on Quality Electronic Design, ISQED 2021, Santa Clara, CA, USA, April 7-9, 2021. pp. 178\u2013185. IEEE (2021). https:\/\/doi.org\/10.1109\/ISQED51717.2021.9424254","DOI":"10.1109\/ISQED51717.2021.9424254"},{"key":"4_CR39","doi-asserted-by":"publisher","unstructured":"Vasselle, A., Thiebeauld, H., Maurine, P.: Spatial dependency analysis to extract information from side-channel mixtures: extended version. J. Cryptogr. Eng. 13(4), 409\u2013425 (2023). https:\/\/doi.org\/10.1007\/S13389-022-00307-9","DOI":"10.1007\/S13389-022-00307-9"},{"key":"4_CR40","doi-asserted-by":"crossref","unstructured":"Veyrat-Charvillon, N., G\u00e9rard, B., Standaert, F.X.: Soft analytical side-channel attacks. In: Advances in Cryptology\u2013ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, ROC, December 7-11, 2014. Proceedings, Part I 20. pp. 282\u2013296. Springer (2014)","DOI":"10.1007\/978-3-662-45611-8_15"},{"key":"4_CR41","unstructured":"Wang, P., Chen, P., Luo, Z., Dong, G., Zheng, M., Yu, N., Hu, H.: Enhancing the performance of practical profiling side-channel attacks using conditional generative adversarial networks. CoRR abs\/2007.05285 (2020), https:\/\/arxiv.org\/abs\/2007.05285"},{"key":"4_CR42","doi-asserted-by":"publisher","unstructured":"Wu, L., Perin, G., Picek, S.: Not so difficult in the end: Breaking the lookup table-based affine masking scheme. In: Carlet, C., Mandal, K., Rijmen, V. (eds.) Selected Areas in Cryptography - SAC 2023 - 30th International Conference, Fredericton, Canada, August 14-18, 2023, Revised Selected Papers. Lecture Notes in Computer Science, vol. 14201, pp. 82\u201396. Springer (2023). https:\/\/doi.org\/10.1007\/978-3-031-53368-6_5","DOI":"10.1007\/978-3-031-53368-6_5"},{"key":"4_CR43","doi-asserted-by":"publisher","unstructured":"Yu, H., Shan, H., Panoff, M., Jin, Y.: Cross-device profiled side-channel attacks using meta-transfer learning. In: 58th ACM\/IEEE Design Automation Conference, DAC 2021, San Francisco, CA, USA, December 5-9, 2021. pp. 703\u2013708. IEEE (2021). https:\/\/doi.org\/10.1109\/DAC18074.2021.9586100","DOI":"10.1109\/DAC18074.2021.9586100"},{"key":"4_CR44","doi-asserted-by":"publisher","unstructured":"Zaid, G., Bossuet, L., Carbone, M., Habrard, A., Venelli, A.: Conditional variational autoencoder based on stochastic attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(2), 310\u2013357 (2023). https:\/\/doi.org\/10.46586\/tches.v2023.i2.310-357","DOI":"10.46586\/tches.v2023.i2.310-357"},{"key":"4_CR45","doi-asserted-by":"publisher","unstructured":"Zaid, G., Bossuet, L., Habrard, A., Venelli, A.: Methodology for efficient cnn architectures in profiling attacks. IACR Transactions on Cryptographic Hardware and Embedded Systems 2020(1), 1\u201336 (Nov 2019). https:\/\/doi.org\/10.13154\/tches.v2020.i1.1-36, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/8391","DOI":"10.13154\/tches.v2020.i1.1-36"},{"key":"4_CR46","doi-asserted-by":"publisher","unstructured":"Zhu, J., Park, T., Isola, P., Efros, A.A.: Unpaired image-to-image translation using cycle-consistent adversarial networks. In: IEEE International Conference on Computer Vision, ICCV 2017, Venice, Italy, October 22-29, 2017. pp. 2242\u20132251. IEEE Computer Society (2017). https:\/\/doi.org\/10.1109\/ICCV.2017.244","DOI":"10.1109\/ICCV.2017.244"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0944-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T06:11:34Z","timestamp":1733897494000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0944-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,12]]},"ISBN":["9789819609437","9789819609444"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0944-4_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,12]]},"assertion":[{"value":"12 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASIACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Application of Cryptology and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asiacrypt2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asiacrypt.iacr.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}