{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:39:28Z","timestamp":1740123568093,"version":"3.37.3"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,6,27]],"date-time":"2018-06-27T00:00:00Z","timestamp":1530057600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Artif Intell Rev"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s10462-018-9640-4","type":"journal-article","created":{"date-parts":[[2018,6,26]],"date-time":"2018-06-26T22:41:38Z","timestamp":1530052898000},"page":"607-623","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["The investigation of neural networks performance in side-channel attacks"],"prefix":"10.1007","volume":"52","author":[{"given":"Yinan","family":"Kong","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0879-113X","authenticated-orcid":false,"given":"Ehsan","family":"Saeedi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,27]]},"reference":[{"key":"9640_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/10958513_17","volume-title":"Zero-value point attacks on elliptic curve cryptosystem","author":"T Akishita","year":"2003","unstructured":"Akishita T, Takagi T (2003) Zero-value point attacks on elliptic curve cryptosystem. Springer, Berlin"},{"key":"9640_CR2","unstructured":"Archambeau C\u00e9dric, Peeters E, Standaert F-X, Quisquater J-J (2006) Template attacks in principal subspaces. In: Cryptographic hardware and embedded systems-CHES 2006. Springer, pp 1\u201314"},{"key":"9640_CR3","first-page":"1","volume":"3","author":"DS Badde","year":"2013","unstructured":"Badde DS, Gupta AK, Patki VK (2013) Cascade and feed forward back propagation artificial neural network models for prediction of compressive strength of ready mix concrete. IOSR J Mech Civil Eng 3:1\u20136","journal-title":"IOSR J Mech Civil Eng"},{"key":"9640_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37288-9_18","volume-title":"Efficient template attacks based on probabilistic multi-class support vector machines","author":"T Bartkewitz","year":"2013","unstructured":"Bartkewitz T, Lemke-Rust K (2013) Efficient template attacks based on probabilistic multi-class support vector machines. Springer, Berlin"},{"key":"9640_CR5","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107360211","volume-title":"Elliptic curves in cryptography","author":"IF Blake","year":"1999","unstructured":"Blake IF, Seroussi G, Smart N (1999) Elliptic curves in cryptography, vol 265. Cambridge University Press, Cambridge"},{"key":"9640_CR6","doi-asserted-by":"crossref","unstructured":"Chari S, Rao JR, Rohatgi P (2003) Template attacks. In: Cryptographic hardware and embedded systems-CHES 2002. Springer, pp 13\u201328","DOI":"10.1007\/3-540-36400-5_3"},{"issue":"4","key":"9640_CR7","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/BF02551274","volume":"2","author":"G Cybenko","year":"1989","unstructured":"Cybenko G (1989) Approximation by superpositions of a sigmoidal function. Math Control Signals Syst 2(4):303\u2013314","journal-title":"Math Control Signals Syst"},{"key":"9640_CR8","volume-title":"Pattern recognition: a statistical approach","author":"PA Devijver","year":"1982","unstructured":"Devijver PA, Kittler J (1982) Pattern recognition: a statistical approach, vol 761. Prentice-Hall, London"},{"key":"9640_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13389-016-0141-6","volume":"8","author":"Q Ge","year":"2016","unstructured":"Ge Q, Yarom Y, Cock D, Heiser G (2016) A survey of microarchitectural timing attacks and countermeasures on contemporary hardware. J Cryptogr Eng 8:1\u201327","journal-title":"J Cryptogr Eng"},{"key":"9640_CR10","doi-asserted-by":"crossref","unstructured":"Goundar RR, Joye M, Miyaji A (2010) Co-z addition formul\u00e6 and binary ladders on elliptic curves. In: Cryptographic hardware and embedded systems, CHES 2010. Springer, pp 65\u201379","DOI":"10.1007\/978-3-642-15031-9_5"},{"key":"9640_CR11","volume-title":"Neural networks and learning machines","author":"SS Haykin","year":"2009","unstructured":"Haykin SS (2009) Neural networks and learning machines, vol 3. Pearson Education, Upper Saddle River"},{"key":"9640_CR12","doi-asserted-by":"crossref","unstructured":"Heuser A, Zohner M (2012) Intelligent machine homicide. In: Constructive side-channel analysis and secure design. Springer, pp 249\u2013264","DOI":"10.1007\/978-3-642-29912-4_18"},{"issue":"5","key":"9640_CR13","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1016\/0893-6080(89)90020-8","volume":"2","author":"K Hornik","year":"1989","unstructured":"Hornik K, Stinchcombe M, White H (1989) Multilayer feedforward networks are universal approximators. Neural Netw 2(5):359\u2013366","journal-title":"Neural Netw"},{"key":"9640_CR14","doi-asserted-by":"crossref","unstructured":"Inci MS, Gulmezoglu B, Eisenbarth T, Sunar B (2016) Co-location detection on the cloud. In: International workshop on constructive side-channel analysis and secure design. Springer, pp 19\u201334","DOI":"10.1007\/978-3-319-43283-0_2"},{"key":"9640_CR15","volume-title":"Principal component analysis","author":"I Jolliffe","year":"2005","unstructured":"Jolliffe I (2005) Principal component analysis. Wiley, Hoboken"},{"issue":"177","key":"9640_CR16","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48(177):203\u2013209","journal-title":"Math Comput"},{"key":"9640_CR17","unstructured":"Lipp M (2016) Cache attacks on arm. Ph.D. thesis, Masters thesis, Graz, University of Technology. \n                    https:\/\/HrBwww.blackhat.com\/docs\/eu-16\/materials\/eu-16-Lipp-ARMageddon-How-Your-Smartphone-CPU-BrHrBeaks-Software-Level-Security-And-Privacy-wp.pdf,2006"},{"key":"9640_CR18","unstructured":"Medwed M, Oswald E (2008) Template attacks on ecdsa. In: Information security applications. Springer, pp 14\u201327"},{"key":"9640_CR19","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in cryptology\u2014CRYPTO 85 proceedings","author":"VS Miller","year":"1986","unstructured":"Miller VS (1986) Use of elliptic curves in cryptography. In: Williams HC (ed) Advances in cryptology\u2014CRYPTO 85 proceedings, vol 218. Lecture notes in computer science. Springer, Berlin, pp 417\u2013426"},{"key":"9640_CR20","volume-title":"Perceptrons\u2013expanded edition: an introduction to computational geometry","author":"ML Minsky","year":"1987","unstructured":"Minsky ML, Papert SA (1987) Perceptrons\u2013expanded edition: an introduction to computational geometry. MIT press, Boston"},{"issue":"3","key":"9640_CR21","doi-asserted-by":"publisher","first-page":"516","DOI":"10.1109\/72.668893","volume":"9","author":"PP Raghu","year":"1998","unstructured":"Raghu PP, Yegnanarayana B (1998) Supervised texture classification using a probabilistic neural network and constraint satisfaction model. IEEE Trans Neural Netw 9(3):516\u2013522","journal-title":"IEEE Trans Neural Netw"},{"key":"9640_CR22","doi-asserted-by":"crossref","unstructured":"Saeedi E, Kong Y (2014) Side channel information analysis based on machine learning. In: 2014 8th international conference on signal processing and communication systems (ICSPCS). IEEE, pp 1\u20137","DOI":"10.1109\/ICSPCS.2014.7021075"},{"key":"9640_CR23","doi-asserted-by":"crossref","unstructured":"Saeedi E, Hossain MS, Kong Y (2015) Multi-class SVMS analysis of side-channel information of elliptic curve cryptosystem. In: 2015 international symposium on performance evaluation of computer and telecommunication systems (SPECTS). IEEE, pp 1\u20136","DOI":"10.1109\/SPECTS.2015.7285297"},{"key":"9640_CR24","volume-title":"A tutorial on principal components analysis, 51:52","author":"LI Smith","year":"2002","unstructured":"Smith LI (2002) A tutorial on principal components analysis, 51:52. Cornell University, Ithaca"},{"issue":"1","key":"9640_CR25","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/0893-6080(90)90049-Q","volume":"3","author":"DF Specht","year":"1990","unstructured":"Specht DF (1990) Probabilistic neural networks. Neural Netw 3(1):109\u2013118","journal-title":"Neural Netw"},{"key":"9640_CR26","unstructured":"Varadarajan V, Zhang Y, Ristenpart T, Swift MM (2015) A placement vulnerability study in multi-tenant public clouds. In: USENIX security symposium, pp 913\u2013928"},{"key":"9640_CR27","unstructured":"Xu Z, Wang H, Wu Z (2015) A measurement study on co-residence threat inside the cloud. In: USENIX security symposium, pp 929\u2013944"},{"issue":"2","key":"9640_CR28","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/s13389-017-0152-y","volume":"7","author":"Y Yarom","year":"2017","unstructured":"Yarom Y, Genkin D, Heninger N (2017) Cachebleed: a timing attack on openssl constant-time rsa. J Cryptogr Eng 7(2):99\u2013112","journal-title":"J Cryptogr Eng"}],"container-title":["Artificial Intelligence Review"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-018-9640-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10462-018-9640-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-018-9640-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,26]],"date-time":"2019-06-26T19:03:03Z","timestamp":1561575783000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10462-018-9640-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,27]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["9640"],"URL":"https:\/\/doi.org\/10.1007\/s10462-018-9640-4","relation":{},"ISSN":["0269-2821","1573-7462"],"issn-type":[{"type":"print","value":"0269-2821"},{"type":"electronic","value":"1573-7462"}],"subject":[],"published":{"date-parts":[[2018,6,27]]},"assertion":[{"value":"27 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}