{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,25]],"date-time":"2023-10-25T09:45:13Z","timestamp":1698227113282},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,8,23]],"date-time":"2023-08-23T00:00:00Z","timestamp":1692748800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,8,23]],"date-time":"2023-08-23T00:00:00Z","timestamp":1692748800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptol"],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1007\/s00145-023-09476-0","type":"journal-article","created":{"date-parts":[[2023,8,23]],"date-time":"2023-08-23T07:02:22Z","timestamp":1692774142000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Revisiting Mutual Information Analysis: Multidimensionality, Neural Estimation and Optimality Proofs"],"prefix":"10.1007","volume":"36","author":[{"given":"Valence","family":"Cristiani","sequence":"first","affiliation":[]},{"given":"Maxime","family":"Lecomte","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"Maurine","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,23]]},"reference":[{"key":"9476_CR1","unstructured":"M.I. Belghazi, A. Baratin, S. Rajeswar, S. Ozair, Y. Bengio, A. Courville, R.\u00a0Devon Hjelm, Mine: Mutual information neural estimation (2018)"},{"key":"9476_CR2","doi-asserted-by":"crossref","unstructured":"E. Brier, C. Clavier, F. Olivier, Correlation power analysis with a leakage model, in Marc Joye and Jean-Jacques Quisquater, editors, Cryptographic Hardware and Embedded Systems - CHES 2004 (Springer, Berlin, Heidelberg, 2004)","DOI":"10.1007\/978-3-540-28632-5_2"},{"issue":"2","key":"9476_CR3","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/s00145-010-9084-8","volume":"24","author":"L Batina","year":"2011","unstructured":"L. Batina, B. Gierlichs, E. Prouff, M. Rivain, F.-X. Standaert, N. Veyrat-Charvillon, Mutual information analysis: A comprehensive study. J. Cryptol. 24(2), 269\u2013291 (2011)","journal-title":"J. Cryptol."},{"key":"9476_CR4","volume-title":"Study of deep learning techniques for side-channel analysis and introduction to ascad database","author":"R Benadjila","year":"2018","unstructured":"R. Benadjila, E. Prouff, R. Strullu, E. Cagli, C. Dumas, Study of deep learning techniques for side-channel analysis and introduction to ascad database (ANSSI, France & CEA, LETI, MINATEC Campus, France, 2018)"},{"key":"9476_CR5","doi-asserted-by":"crossref","unstructured":"J. Normand, Beaudry and Renato Renner. An intuitive proof of the data processing inequality (2012)","DOI":"10.26421\/QIC12.5-6-4"},{"key":"9476_CR6","unstructured":"C. Chan, A. Al-Bashabsheh, H.P. Huang, M. Lim, D.S. Handason Tam, C. Zhao, Neural entropic estimation: A faster path to mutual information estimation (2019)"},{"key":"9476_CR7","doi-asserted-by":"crossref","unstructured":"E. Cagli, C. Dumas, E. Prouff, Convolutional neural networks with data augmentation against jitter-based countermeasures, in Wieland Fischer and Naofumi Homma, editors, Cryptographic Hardware and Embedded Systems\u2014CHES 2017 (Springer International Publishing, Cham, 2017), pp. 45\u201368","DOI":"10.1007\/978-3-319-66787-4_3"},{"key":"9476_CR8","doi-asserted-by":"crossref","unstructured":"S. Chari, C.S. Jutla, J.R. Rao, P. Rohatgi, Towards sound approaches to counteract power-analysis attacks, in Michael Wiener, editor, Advances in Cryptology\u2014CRYPTO\u2019 99 (Springer, Berlin, Heidelberg, 1999), pp. 398\u2013412","DOI":"10.1007\/3-540-48405-1_26"},{"key":"9476_CR9","unstructured":"K. Choi, S. Lee, Regularized mutual information neural estimation (2020)"},{"key":"9476_CR10","doi-asserted-by":"crossref","unstructured":"V. Cristiani, M. Lecomte, T. Hiscock, A bit-level approach to side channel based disassembling, in CARDIS 2019 (Prague, Czech Republic, 2019)","DOI":"10.1007\/978-3-030-42068-0_9"},{"key":"9476_CR11","doi-asserted-by":"crossref","unstructured":"V. Cristiani, M. Lecomte, P. Maurine, Leakage assessment through neural estimation of the mutual information, in International Conference on Applied Cryptography and Network Security (ACNS), volume 12418 of Lecture Notes in Computer Science (Rome, Italy, 2020), pp. 144\u2013162","DOI":"10.1007\/978-3-030-61638-0_9"},{"key":"9476_CR12","doi-asserted-by":"crossref","unstructured":"J. Doget, E. Prouff, M. Rivain, F.-X. Standaert, Univariate side channel attacks and leakage modeling. J. Cryptog. Eng. 1, 123\u2013144 (2012)","DOI":"10.1007\/s13389-011-0010-2"},{"key":"9476_CR13","doi-asserted-by":"crossref","unstructured":"M.\u00a0Abdelaziz Elaabid, S. Guilley, Portability of templates. J. Cryptogra. Eng. 2, 63\u201374 (2012)","DOI":"10.1007\/s13389-012-0030-6"},{"key":"9476_CR14","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2008","author":"B Gierlichs","year":"2008","unstructured":"B. Gierlichs, L. Batina, P. Tuyls, B. Preneel, Mutual information analysis, in Elisabeth Oswald, Pankaj Rohatgi, editors, Cryptographic Hardware and Embedded Systems\u2014CHES 2008 (Springer, Berlin, Heidelberg, 2008)"},{"key":"9476_CR15","unstructured":"D.P. Kingma, J. Ba, Adam: A method for stochastic optimization (2014)"},{"key":"9476_CR16","doi-asserted-by":"crossref","unstructured":"P. Kocher, J. Jaffe, B. Jun, Differential power analysis, in Annual International Cryptology Conference (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"key":"9476_CR17","doi-asserted-by":"crossref","unstructured":"P.C. Kocher, Timing attacks on implementations of Diffie-Hellman, rsa, dss, and other systems, in Advances in Cryptology\u2014CRYPTO \u201996, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18\u201322, 1996, Proceedings, volume 1109 of Lecture Notes in Computer Science (Springer, 1996), pp. 104\u2013113","DOI":"10.1007\/3-540-68697-5_9"},{"key":"9476_CR18","unstructured":"X. Lin, I. Sur, S.A. Nastase, A. Divakaran, U. Hasson, M.R. Amer, Data-efficient mutual information neural estimator (2019)"},{"key":"9476_CR19","doi-asserted-by":"crossref","unstructured":"L. Masure, V. Cristiani, M. Lecomte, F.-X. Standaert, Don\u2019t learn what you already know: Scheme-aware modeling for profiling side-channel analysis against masking. Cryptology ePrint Archive, Paper 2022\/493 (2022). https:\/\/eprint.iacr.org\/2022\/493","DOI":"10.46586\/tches.v2023.i1.32-59"},{"key":"9476_CR20","doi-asserted-by":"crossref","unstructured":"L. Masure, C. Dumas, E. Prouff, A comprehensive study of deep learning for side-channel analysis. IACR Trans. Cryptograph. Hardware Embedded Syst. 2020 (2019)","DOI":"10.46586\/tches.v2020.i1.348-375"},{"key":"9476_CR21","unstructured":"A. Moradi, T. Eisenbarth, A. Poschmann, C. Rolfes, C. Paar, M.T. Manzuri, M. Salmasizadeh, Information leakage of flip-flops in dpa-resistant logic styles. IACR Cryptology ePrint Archive 2008, 188 (2008)"},{"key":"9476_CR22","doi-asserted-by":"crossref","unstructured":"T.S. Messerges, Using second-order power analysis to attack dpa resistant software, in \u00c7etin\u00a0K. Ko\u00e7 and Christof Paar, editors, Cryptographic Hardware and Embedded Systems\u2014CHES 2000 (Springer, Berlin, Heidelberg, 2000), pp. 238\u2013251","DOI":"10.1007\/3-540-44499-8_19"},{"key":"9476_CR23","doi-asserted-by":"crossref","unstructured":"H. Maghrebi, T. Portigliatti, E. Prouff, Breaking cryptographic implementations using deep learning techniques, in Claude Carlet, M.\u00a0Anwar Hasan, and Vishal Saraswat, editors, Security, Privacy, and Applied Cryptography Engineering (Springer International Publishing, Cham, 2016), pp. 3\u201326","DOI":"10.1007\/978-3-319-49445-6_1"},{"key":"9476_CR24","unstructured":"C. Percival, Cache missing for fun and profit, in Proceeding of BSDCan 2005 (2005)"},{"key":"9476_CR25","doi-asserted-by":"crossref","unstructured":"E. Prouff, M. Rivain, Theoretical and practical aspects of mutual information based side channel analysis, in Michel Abdalla, David Pointcheval, Pierre-Alain Fouque, and Damien Vergnaud, editors, Applied Cryptography and Network Security (Springer, Berlin, Heidelberg, 2009), pp. 499\u2013518","DOI":"10.1007\/978-3-642-01957-9_31"},{"key":"9476_CR26","doi-asserted-by":"crossref","unstructured":"E. Prouff, M. Rivain, Masking against side-channel attacks: A formal security proof, in Thomas Johansson and Phong\u00a0Q. Nguyen, editors, Advances in Cryptology\u2014EUROCRYPT 2013 (Springer, Berlin, Heidelberg, 2013), pp. 142\u2013159","DOI":"10.1007\/978-3-642-38348-9_9"},{"issue":"6","key":"9476_CR27","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1109\/TC.2009.15","volume":"58","author":"E Prouff","year":"2009","unstructured":"E.\u00a0Prouff, M.\u00a0Rivain, R.\u00a0Bevan, Statistical analysis of second order differential power analysis. IEEE Trans. Comput. 58(6), 799\u2013811 (2009)","journal-title":"IEEE Transactions on Computers"},{"key":"9476_CR28","doi-asserted-by":"crossref","unstructured":"J.-J. Quisquater, D. Samyde, Electromagnetic analysis (ema): Measures and counter-measures for smart cards, in Isabelle Attali and Thomas Jensen, editors, Smart Card Programming and Security (Springer, Berlin, Heidelberg, 2001), pp. 200\u2013210","DOI":"10.1007\/3-540-45418-7_17"},{"key":"9476_CR29","doi-asserted-by":"crossref","unstructured":"O. Reparaz, B. Gierlichs, I. Verbauwhede, Generic dpa attacks: Curse or blessing? In Emmanuel Prouff, editor, Constructive Side-Channel Analysis and Secure Design (Springer International Publishing, Cham, 2014), pp. 98\u2013111","DOI":"10.1007\/978-3-319-10175-0_8"},{"key":"9476_CR30","doi-asserted-by":"crossref","unstructured":"O. Reparaz, B. Gierlichs, I. Verbauwhede, A note on the use of margins to compare distinguishers, in Emmanuel Prouff, editor, Constructive Side-Channel Analysis and Secure Design (Springer International Publishing, Cham, 2014), pp. 1\u20138","DOI":"10.1007\/978-3-319-10175-0_1"},{"issue":"3","key":"9476_CR31","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"C.E. Shannon, A mathematical theory of communication. Bell Syst. Tech. J. 27(3), 379\u2013423 (1948)","journal-title":"Bell Syst. Tech. J."},{"key":"9476_CR32","doi-asserted-by":"crossref","unstructured":"A. Schaub, E. Schneider, A. Hollender, V. Calasans, L. Jolie, R. Touillon, A. Heuser, S. Guilley, O. Rioul, Attacking suggest boxes in web applications over https using side-channel stochastic algorithms. 8924, 116\u2013130 (2014)","DOI":"10.1007\/978-3-319-17127-2_8"},{"issue":"2","key":"9476_CR33","doi-asserted-by":"publisher","first-page":"107","DOI":"10.46586\/tches.v2019.i2.107-131","volume":"2019","author":"B Timon","year":"2019","unstructured":"B. Timon, Non-profiled deep learning-based side-channel attacks with sensitivity analysis. IACR Trans. Cryptograph. Hardware Embedded Syst. 2019(2), 107\u2013131 (2019)","journal-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems"},{"key":"9476_CR34","doi-asserted-by":"crossref","unstructured":"N. Veyrat-Charvillon, F.-X. Standaert, Mutual information analysis: How, when and why? In Christophe Clavier and Kris Gaj, editors, Cryptographic Hardware and Embedded Systems\u2014CHES 2009 (Springer, Berlin, Heidelberg, 2009), pp. 429\u2013443","DOI":"10.1007\/978-3-642-04138-9_30"},{"key":"9476_CR35","doi-asserted-by":"crossref","unstructured":"C. Whitnall, E. Oswald, A comprehensive evaluation of mutual information analysis using a fair evaluation framework. In Phillip Rogaway, editor, Advances in Cryptology\u2014CRYPTO 2011 (Springer, Berlin, Heidelberg, 2011), pp. 316\u2013334","DOI":"10.1007\/978-3-642-22792-9_18"},{"key":"9476_CR36","doi-asserted-by":"crossref","unstructured":"C. Whitnall, E. Oswald, F.-X. Standaert, The myth of generic dpa...and the magic of learning, in Josh Benaloh, editor, Topics in Cryptology\u2014CT-RSA 2014 (Springer International Publishing, Cham, 2011), pp. 183\u2013205","DOI":"10.1007\/978-3-319-04852-9_10"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-023-09476-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00145-023-09476-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-023-09476-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T16:03:06Z","timestamp":1698163386000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00145-023-09476-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,23]]},"references-count":36,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["9476"],"URL":"https:\/\/doi.org\/10.1007\/s00145-023-09476-0","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"value":"0933-2790","type":"print"},{"value":"1432-1378","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,23]]},"assertion":[{"value":"16 November 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 July 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 July 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 August 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"38"}}