{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T18:51:59Z","timestamp":1770231119520,"version":"3.49.0"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T00:00:00Z","timestamp":1756857600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T00:00:00Z","timestamp":1756857600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s10586-025-05401-1","type":"journal-article","created":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T14:07:37Z","timestamp":1756908457000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["NPSCA-CGAN: a signal processing framework for enhanced non-profiled side-channel attacks"],"prefix":"10.1007","volume":"28","author":[{"given":"Cheng","family":"Tang","sequence":"first","affiliation":[]},{"given":"Lang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Ou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,3]]},"reference":[{"issue":"3","key":"5401_CR1","doi-asserted-by":"publisher","first-page":"413","DOI":"10.46586\/TCHES.V2022.I3.413-437","volume":"2022","author":"L Wu","year":"2022","unstructured":"Wu, L., Perin, G., Picek, S.: The best of two worlds: deep learning-assisted template attack. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(3), 413\u2013437 (2022). https:\/\/doi.org\/10.46586\/TCHES.V2022.I3.413-437","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"5401_CR2","doi-asserted-by":"publisher","unstructured":"Park, A., Han, D.: Chosen ciphertext simple power analysis on software 8-bit implementation of ring-lwe encryption. In: 2016 IEEE Asian Hardware-Oriented Security and Trust, AsianHOST 2016, Yilan, Taiwan, pp. 1\u20136 (2016). https:\/\/doi.org\/10.1109\/ASIANHOST.2016.7835555","DOI":"10.1109\/ASIANHOST.2016.7835555"},{"issue":"1","key":"5401_CR3","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/S13389-011-0006-Y","volume":"1","author":"PC Kocher","year":"2011","unstructured":"Kocher, P.C., Jaffe, J., Jun, B., Rohatgi, P.: Introduction to differential power analysis. J. Cryptogr. Eng. 1(1), 5\u201327 (2011). https:\/\/doi.org\/10.1007\/S13389-011-0006-Y","journal-title":"J. Cryptogr. Eng."},{"key":"5401_CR4","doi-asserted-by":"publisher","first-page":"4882","DOI":"10.1109\/TIFS.2021.3117091","volume":"16","author":"A Wang","year":"2021","unstructured":"Wang, A., Li, Y., Ding, Y., Zhu, L., Wang, Y.: Efficient framework for genetic algorithm-based correlation power analysis. IEEE Trans. Inf. Forensics Secur. 16, 4882\u20134894 (2021). https:\/\/doi.org\/10.1109\/TIFS.2021.3117091","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"5401_CR5","doi-asserted-by":"publisher","first-page":"107","DOI":"10.13154\/TCHES.V2019.I2.107-131","volume":"2019","author":"B Timon","year":"2019","unstructured":"Timon, B.: Non-profiled deep learning-based side-channel attacks with sensitivity analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(2), 107\u2013131 (2019). https:\/\/doi.org\/10.13154\/TCHES.V2019.I2.107-131","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"5401_CR6","doi-asserted-by":"publisher","unstructured":"Alipour, A., Papadimitriou, A., Beroulle, V., Aerabi, E., H\u00e9ly, D.: On the performance of non-profiled differential deep learning attacks against an AES encryption algorithm protected using a correlated noise generation based hiding countermeasure. In: 2020 Design, Automation & Test in Europe Conference & Exhibition, DATE 2020, Grenoble, France, March 9-13, 2020, pp. 614\u2013617 (2020). https:\/\/doi.org\/10.23919\/DATE48585.2020.9116387","DOI":"10.23919\/DATE48585.2020.9116387"},{"key":"5401_CR7","doi-asserted-by":"publisher","unstructured":"Do, N., Hoang, V., Doan, V.: Performance analysis of non-profiled side channel attacks based on convolutional neural networks. In: 2020 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2020, Ha Long, Vietnam, December 8-10, 2020, pp. 66\u201369 (2020). https:\/\/doi.org\/10.1109\/APCCAS50809.2020.9301673","DOI":"10.1109\/APCCAS50809.2020.9301673"},{"issue":"4","key":"5401_CR8","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/S13389-023-00312-6","volume":"13","author":"K Kuroda","year":"2023","unstructured":"Kuroda, K., Fukuda, Y., Yoshida, K., Fujino, T.: Practical aspects on non-profiled deep-learning side-channel attacks against AES software implementation with two types of masking countermeasures including RSM. J. Cryptogr. Eng. 13(4), 427\u2013442 (2023). https:\/\/doi.org\/10.1007\/S13389-023-00312-6","journal-title":"J. Cryptogr. Eng."},{"key":"5401_CR9","doi-asserted-by":"publisher","unstructured":"Do, N.-T., Le, P.-C., Hoang, V.-P., Doan, V.-S., Nguyen, H.G., Pham, C.-K.: Mo-dlsca: Deep learning based non-profiled side channel analysis using multi-output neural networks. In: 2022 International Conference on Advanced Technologies for Communications (ATC), pp. 245\u2013250 (2022). https:\/\/doi.org\/10.1109\/ATC55345.2022.9943024","DOI":"10.1109\/ATC55345.2022.9943024"},{"key":"5401_CR10","first-page":"241","volume-title":"Indust. Netw. Intell. Syst.","author":"N-T Do","year":"2022","unstructured":"Do, N.-T., Hoang, V.-P., Sang Doan, V.: Performance analysis of non-profiled side channel attack based on multi-layer perceptron using significant hamming weight labeling. In: Vo, N.-S., Vien, Q.-T., Ha, D.-B. (eds.) Indust. Netw. Intell. Syst., pp. 241\u2013254. Springer, Cham (2022)"},{"key":"5401_CR11","doi-asserted-by":"publisher","unstructured":"Chen, J., Ng, J., Kyaw, N.A., Lwin, N.K.Z., Chong, K., Lin, Z., Chang, J.S., Gwee, B.: Non-profiling based correlation optimization deep learning analysis. In: IEEE International Symposium on Circuits and Systems, ISCAS 2022, Austin, TX, USA, May 27 - June 1, 2022, pp. 2246\u20132250 (2022). https:\/\/doi.org\/10.1109\/ISCAS48785.2022.9937217","DOI":"10.1109\/ISCAS48785.2022.9937217"},{"key":"5401_CR12","doi-asserted-by":"crossref","unstructured":"Wu, L., Perin, G., Picek, S.: Hiding in plain sight: non-profiling deep learning-based side-channel analysis with plaintext\/ciphertext. IACR Cryptol. ePrint Arch., 209 (2023)","DOI":"10.62056\/ay4c3txol7"},{"key":"5401_CR13","unstructured":"Kwon, D., Kim, H., Hong, S.: Improving non-profiled side-channel attacks using autoencoder based preprocessing. IACR Cryptol. ePrint Arch., 396 (2020)"},{"key":"5401_CR14","doi-asserted-by":"crossref","unstructured":"Karayalcin, S., Krcek, M., Wu, L., Picek, S., Perin, G.: It\u2019s a kind of magic: a novel conditional GAN framework for efficient profiling side-channel analysis. IACR Cryptol. ePrint Arch., 1108 (2023)","DOI":"10.1007\/978-981-96-0944-4_4"},{"issue":"2","key":"5401_CR15","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1109\/TCSI.2009.2019411","volume":"57\u2013I","author":"M Alioto","year":"2010","unstructured":"Alioto, M., Giancane, L., Scotti, G., Trifiletti, A.: Leakage power analysis attacks: A novel class of attacks to nanometer cryptographic circuits. IEEE Trans. Circuits Syst. I Regul. Pap. 57\u2013I(2), 355\u2013367 (2010). https:\/\/doi.org\/10.1109\/TCSI.2009.2019411","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"issue":"11","key":"5401_CR16","doi-asserted-by":"publisher","first-page":"1626","DOI":"10.1109\/TC.2020.3013196","volume":"69","author":"K Ramezanpour","year":"2020","unstructured":"Ramezanpour, K., Ampadu, P., Diehl, W.: SCAUL: power side-channel analysis with unsupervised learning. IEEE Trans. Comput. 69(11), 1626\u20131638 (2020). https:\/\/doi.org\/10.1109\/TC.2020.3013196","journal-title":"IEEE Trans. Comput."},{"issue":"2","key":"5401_CR17","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1109\/TETC.2022.3218372","volume":"12","author":"L Wu","year":"2024","unstructured":"Wu, L., Perin, G., Picek, S.: I choose you: automated hyperparameter tuning for deep learning-based side-channel analysis. IEEE Trans. Emerg. Top. Comput. 12(2), 546\u2013557 (2024). https:\/\/doi.org\/10.1109\/TETC.2022.3218372","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"issue":"3","key":"5401_CR18","doi-asserted-by":"publisher","first-page":"147","DOI":"10.13154\/TCHES.V2020.I3.147-168","volume":"2020","author":"L Wouters","year":"2020","unstructured":"Wouters, L., Arribas, V., Gierlichs, B., Preneel, B.: Revisiting a methodology for efficient CNN architectures in profiling attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3), 147\u2013168 (2020). https:\/\/doi.org\/10.13154\/TCHES.V2020.I3.147-168","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"5401_CR19","unstructured":"Goodfellow, I.J., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A.C., Bengio, Y.: Generative adversarial nets. In: Ghahramani, Z., Welling, M., Cortes, C., Lawrence, N.D., Weinberger, K.Q. (eds.) Advances in Neural Information Processing Systems 27: Annual Conference on Neural Information Processing Systems 2014, December 8-13 2014, Montreal, Quebec, Canada, pp. 2672\u20132680 (2014). https:\/\/proceedings.neurips.cc\/paper\/2014\/hash\/5ca3e9b122f61f8f06494c97b1afccf3-Abstract.html"},{"key":"5401_CR20","unstructured":"Mirza, M., Osindero, S.: Conditional generative adversarial nets. CoRR arXiv:abs\/1411.1784 (2014)"},{"key":"5401_CR21","doi-asserted-by":"publisher","first-page":"133470","DOI":"10.1109\/ACCESS.2020.3006512","volume":"8","author":"J Chi","year":"2020","unstructured":"Chi, J., Wu, C., Yu, X., Ji, P., Chu, H.: Single low-dose CT image denoising using a generative adversarial network with modified u-net generator and multi-level discriminator. IEEE Access 8, 133470\u2013133487 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3006512","journal-title":"IEEE Access"},{"issue":"1","key":"5401_CR22","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1093\/mnrasl\/slx008","volume":"467","author":"K Schawinski","year":"2017","unstructured":"Schawinski, K., Zhang, C., Zhang, H., Fowler, L., Santhanam, G.K.: Generative adversarial networks recover features in astrophysical images of galaxies beyond the deconvolution limit. Monthly Notices Royal Astron. Soc.: Lett. 467(1), 110\u2013114 (2017)","journal-title":"Monthly Notices Royal Astron. Soc.: Lett."},{"key":"5401_CR23","unstructured":"Wang, P., Chen, P., Luo, Z., Dong, G., Zheng, M., Yu, N., Hu, H.: Enhancing the performance of practical profiling side-channel attacks using conditional generative adversarial networks. CoRR arXiv:abs\/2007.05285 (2020)"},{"key":"5401_CR24","doi-asserted-by":"publisher","unstructured":"Mukhtar, N., Batina, L., Picek, S., Kong, Y.: Fake it till you make it: Data augmentation using generative adversarial networks for all the crypto you need on small devices. In: Galbraith, S.D. (ed.) Topics in Cryptology-CT-RSA 2022-Cryptographers\u2019 Track at the RSA Conference 2022, Virtual Event, March 1-2, 2022, Proceedings. Lecture Notes in Computer Science, vol. 13161, pp. 297\u2013321. Springer, (2022). https:\/\/doi.org\/10.1007\/978-3-030-95312-6_13","DOI":"10.1007\/978-3-030-95312-6_13"},{"key":"5401_CR25","doi-asserted-by":"publisher","unstructured":"Coron, J., Giraud, C., Prouff, E., Renner, S., Rivain, M., Vadnala, P.K.: Conversion of security proofs from one leakage model to another: A new issue. In: Schindler, W., Huss, S.A. (eds.) Constructive side-channel analysis and secure design-third international workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings. Lecture Notes in Computer Science, vol. 7275, pp. 69\u201381 (2012). https:\/\/doi.org\/10.1007\/978-3-642-29912-4_6","DOI":"10.1007\/978-3-642-29912-4_6"},{"issue":"4","key":"5401_CR26","doi-asserted-by":"publisher","first-page":"337","DOI":"10.13154\/TCHES.V2020.I4.337-364","volume":"2020","author":"G Perin","year":"2020","unstructured":"Perin, G., Chmielewski, L., Picek, S.: Strength in numbers: improving generalization with ensembles in machine learning-based profiled side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(4), 337\u2013364 (2020). https:\/\/doi.org\/10.13154\/TCHES.V2020.I4.337-364","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"5401_CR27","unstructured":"Maas, A.L., Hannun, A.Y., Ng, A.Y., et al.: Rectifier nonlinearities improve neural network acoustic models. In: Proc. Icml, vol. 30, p. 3 (2013). Atlanta, GA"},{"key":"5401_CR28","unstructured":"Radford, A., Metz, L., Chintala, S.: Unsupervised representation learning with deep convolutional generative adversarial networks. In: Bengio, Y., LeCun, Y. (eds.) 4th International Conference on Learning Representations, ICLR 2016, San Juan, Puerto Rico, May 2-4, 2016, Conference Track Proceedings (2016). arXiv:1511.06434"},{"key":"5401_CR29","doi-asserted-by":"publisher","unstructured":"Isola, P., Zhu, J., Zhou, T., Efros, A.A.: Image-to-image translation with conditional adversarial networks. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2017, Honolulu, HI, USA, July 21-26, 2017, pp. 5967\u20135976 (2017). https:\/\/doi.org\/10.1109\/CVPR.2017.632","DOI":"10.1109\/CVPR.2017.632"},{"key":"5401_CR30","doi-asserted-by":"publisher","unstructured":"Batina, L., Hogenboom, J., Woudenberg, J.G.J.: Getting more from PCA: first results of using principal component analysis for extensive power analysis. In: Dunkelman, O. (ed.) Topics in Cryptology-CT-RSA 2012-The Cryptographers\u2019 Track at the RSA Conference 2012, San Francisco, CA, USA, February 27\u2013March 2, 2012. Proceedings. Lecture Notes in Computer Science, vol. 7178, pp. 383\u2013397 (2012). https:\/\/doi.org\/10.1007\/978-3-642-27954-6_24","DOI":"10.1007\/978-3-642-27954-6_24"},{"key":"5401_CR31","doi-asserted-by":"publisher","unstructured":"Standaert, F., Archambeau, C.: Using subspace-based template attacks to compare and combine power and electromagnetic information leakages. In: Oswald, E., Rohatgi, P. (eds.) Cryptographic Hardware and Embedded Systems-CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings. Lecture Notes in Computer Science, vol. 5154, pp. 411\u2013425 (2008). https:\/\/doi.org\/10.1007\/978-3-540-85053-3_26","DOI":"10.1007\/978-3-540-85053-3_26"},{"key":"5401_CR32","doi-asserted-by":"publisher","unstructured":"Coron, J., Kizhvatov, I.: An efficient method for random delay generation in embedded software. In: Clavier, C., Gaj, K. (eds.) Cryptographic Hardware and Embedded Systems-CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings. Lecture Notes in Computer Science, vol. 5747, pp. 156\u2013170 (2009). https:\/\/doi.org\/10.1007\/978-3-642-04138-9_12","DOI":"10.1007\/978-3-642-04138-9_12"},{"key":"5401_CR33","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power analysis attacks-revealing the secrets of smart cards, (2007)"},{"key":"5401_CR34","doi-asserted-by":"publisher","unstructured":"Woudenberg, J.G.J., Witteman, M.F., Bakker, B.: Improving differential power analysis by elastic alignment. In: Kiayias, A. (ed.) Topics in Cryptology - CT-RSA 2011 - The Cryptographers\u2019 Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings. Lecture Notes in Computer Science, vol. 6558, pp. 104\u2013119 (2011). https:\/\/doi.org\/10.1007\/978-3-642-19074-2_8","DOI":"10.1007\/978-3-642-19074-2_8"},{"issue":"2","key":"5401_CR35","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/S13389-019-00220-8","volume":"10","author":"R Benadjila","year":"2020","unstructured":"Benadjila, R., Prouff, E., Strullu, R., Cagli, E., Dumas, C.: Deep learning for side-channel analysis and introduction to ASCAD database. J. Cryptogr. Eng. 10(2), 163\u2013188 (2020). https:\/\/doi.org\/10.1007\/S13389-019-00220-8","journal-title":"J. Cryptogr. Eng."},{"key":"5401_CR36","doi-asserted-by":"publisher","unstructured":"Hettwer, B., Gehrer, S., G\u00fcneysu, T.: Profiled power analysis attacks using convolutional neural networks with domain knowledge. In: Cid, C., Jr., M.J.J. (eds.) Selected Areas in Cryptography-SAC 2018-25th International Conference, Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers. Lecture Notes in Computer Science, vol. 11349, pp. 479\u2013498 (2018). https:\/\/doi.org\/10.1007\/978-3-030-10970-7_22","DOI":"10.1007\/978-3-030-10970-7_22"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05401-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05401-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05401-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T09:34:23Z","timestamp":1759743263000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05401-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,3]]},"references-count":36,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["5401"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05401-1","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,3]]},"assertion":[{"value":"5 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 March 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 April 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 September 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"641"}}