{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T13:59:26Z","timestamp":1764079166712},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,5,14]],"date-time":"2016-05-14T00:00:00Z","timestamp":1463184000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Electron Test"],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1007\/s10836-016-5590-4","type":"journal-article","created":{"date-parts":[[2016,5,14]],"date-time":"2016-05-14T05:41:54Z","timestamp":1463204514000},"page":"345-356","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Side-Channel Information Characterisation Based on Cascade-Forward Back-Propagation Neural Network"],"prefix":"10.1007","volume":"32","author":[{"given":"Ehsan","family":"Saeedi","sequence":"first","affiliation":[]},{"given":"Md Selim","family":"Hossain","sequence":"additional","affiliation":[]},{"given":"Yinan","family":"Kong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,14]]},"reference":[{"key":"5590_CR1","unstructured":"(2000). IEEE standard specifications for public-key cryptography. IEEE Std 1363\u20132000, pp 1\u2013228"},{"key":"5590_CR2","unstructured":"Backes M, D\u00fcrmuth M, Gerling S, Pinkal M, Sporleder C (2010) Acoustic side-channel attacks on printers. In: USENIX Security symposium, pp 307\u2013322"},{"key":"5590_CR3","first-page":"1","volume":"3","author":"DS Badde","year":"2013","unstructured":"Badde DS, Gupta AK, Patki VK (2013) Cascade and feed forward back propagation artificial neural network models for prediction of compressive strength of ready mix concrete. IOSR Journal of Mechanical and Civil Engineering 3:1\u20136","journal-title":"IOSR Journal of Mechanical and Civil Engineering"},{"key":"5590_CR4","doi-asserted-by":"crossref","unstructured":"Bartkewitz T, Lemke-Rust K (2013) Efficient template attacks based on probabilistic multi-class support vector machines. Springer","DOI":"10.1007\/978-3-642-37288-9_18"},{"issue":"2","key":"5590_CR5","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1162\/neco.1992.4.2.141","volume":"4","author":"R Battiti","year":"1992","unstructured":"Battiti R (1992) First-and second-order methods for learning: between steepest descent and newton\u2019s method. Neural Comput 4(2):141\u2013166","journal-title":"Neural Comput"},{"key":"5590_CR6","doi-asserted-by":"crossref","unstructured":"Bauer S (2012) Attacking exponent blinding in rsa without crt. Springer","DOI":"10.1007\/978-3-642-29912-4_7"},{"issue":"2","key":"5590_CR7","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/S0004-3702(02)00121-2","volume":"136","author":"M Bowling","year":"2002","unstructured":"Bowling M, Veloso M (2002) Multiagent learning using a variable learning rate. Artif Intell 136(2):215\u2013250","journal-title":"Artif Intell"},{"issue":"4","key":"5590_CR8","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1007\/BF02551274","volume":"2","author":"G Cybenko","year":"1989","unstructured":"Cybenko G (1989) Approximation by superpositions of a sigmoidal function. Math Control Signals Syst 2 (4):303\u2013314","journal-title":"Math Control Signals Syst"},{"key":"5590_CR9","doi-asserted-by":"crossref","unstructured":"De Mulder E, Buysschaert P, Ors SB, Delmotte P, Preneel B, Vandenbosch G, Verbauwhede I (2005) Electromagnetic analysis attack on an fpga implementation of an elliptic curve cryptosystem. In: The International Conference on Computer as a tool, 2005. EUROCON 2005, vol 2. IEEE, pp 1879\u2013 1882","DOI":"10.1109\/EURCON.2005.1630348"},{"key":"5590_CR10","unstructured":"Demuth H, Beale M (2000) Neural network toolbox users guide"},{"key":"5590_CR11","doi-asserted-by":"crossref","unstructured":"Dennis JE Jr, Schnabel RB (1996) Numerical methods for unconstrained optimization and nonlinear equations, vol 16. Siam","DOI":"10.1137\/1.9781611971200"},{"key":"5590_CR12","volume-title":"Neural network design","author":"MT Hagan","year":"1996","unstructured":"Hagan MT, Demuth HB, Beale MH (1996) Neural network design. Pws Publication, Boston"},{"key":"5590_CR13","unstructured":"Hankerson D, Menezes AJ, Vanstone S (2003) Guide to Elliptic Curve Cryptography, Springer, New York"},{"key":"5590_CR14","unstructured":"Haykin SS (2009) Neural networks and learning machines, volume 3. Pearson Education Upper Saddle River"},{"key":"5590_CR15","doi-asserted-by":"crossref","unstructured":"Heuser A, Zohner M (2012) Intelligent machine homicide. In: Constructive side-channel analysis and secure design, pp 249\u2013264. Springer","DOI":"10.1007\/978-3-642-29912-4_18"},{"key":"5590_CR16","doi-asserted-by":"crossref","unstructured":"Heyszl J, Mangard S, Heinz B, Stumpf F, Sigl G (2012) Localized electromagnetic analysis of cryptographic implementations. In: Topics in cryptology\u2013CT-RSA 2012, pp 231\u2013244. Springer","DOI":"10.1007\/978-3-642-27954-6_15"},{"issue":"4","key":"5590_CR17","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/s13389-011-0023-x","volume":"1","author":"G Hospodar","year":"2011","unstructured":"Hospodar G, Gierlichs B, De Mulder E, Verbauwhede I, Vandewalle J (2011) Machine learning in side-channel analysis: a first study. Journal of Cryptographic Engineering 1(4):293\u2013302","journal-title":"Journal of Cryptographic Engineering"},{"key":"5590_CR18","doi-asserted-by":"crossref","unstructured":"Hospodar G, Maes R, Verbauwhede I (2012) Machine learning attacks on 65nm arbiter pufs Accurate modeling poses strict bounds on usability. In: 2012 IEEE international workshop on Information forensics and security (WIFS), pp 37\u201342. IEEE","DOI":"10.1109\/WIFS.2012.6412622"},{"key":"5590_CR19","unstructured":"Hospodar G, Verbauwhede I, Vandewalle J, Mulder B (2011) Least squares support vector machines for side-channel analysis. Center for Advanced Security Research Darmstadt:99\u2013104"},{"key":"5590_CR20","doi-asserted-by":"crossref","unstructured":"Itoh K, Izu T, Takenaka M (2003) Address-bit differential power analysis of cryptographic schemes ok-ecdh and ok-ecdsa. In: Cryptographic hardware and embedded systems-CHES 2002, pp 129\u2013143. Springer","DOI":"10.1007\/3-540-36400-5_11"},{"issue":"177","key":"5590_CR21","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48(177):203\u2013209","journal-title":"Math Comput"},{"key":"5590_CR22","doi-asserted-by":"crossref","unstructured":"Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Wiener M (ed) Advances in Cryptology CRYPTO 99, volume 1666 of Lecture Notes in Computer Science, pp 388\u2013397. Springer, Berlin","DOI":"10.1007\/3-540-48405-1_25"},{"key":"5590_CR23","doi-asserted-by":"crossref","unstructured":"Kopf B, Durmuth M A provably secure and efficient countermeasure against timing attacks. In: 22nd IEEE Computer Security Foundations Symposium, 2009. CSF\u201909. IEEE, p 2009","DOI":"10.1109\/CSF.2009.21"},{"key":"5590_CR24","unstructured":"Mangard S, Oswald E, Popp T (2008) Power analysis attacks: Revealing the secrets of smart cards, vol 31. Springer Science & Business Media"},{"issue":"2","key":"5590_CR25","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1137\/0111030","volume":"11","author":"DW Marquardt","year":"1963","unstructured":"Marquardt DW (1963) An algorithm for least-squares estimation of nonlinear parameters. J Soc Ind Appl Math 11(2):431\u2013441","journal-title":"J Soc Ind Appl Math"},{"key":"5590_CR26","doi-asserted-by":"crossref","unstructured":"Miller VS (1986) Use of elliptic curves in cryptography. In: Williams HC (ed) Advances in Cryptology - CRYPTO 85 Proceedings, volume 218 of Lecture Notes in Computer Science, pp 417\u2013426. Springer, Berlin","DOI":"10.1007\/3-540-39799-X_31"},{"issue":"4","key":"5590_CR27","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1016\/S0893-6080(05)80056-5","volume":"6","author":"MF M\u00f8ller","year":"1993","unstructured":"M\u00f8ller MF (1993) A scaled conjugate gradient algorithm for fast supervised learning. Neural netw 6(4):525\u2013533","journal-title":"Neural netw"},{"key":"5590_CR28","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1016\/j.compeleceng.2007.05.009","volume":"33","author":"E De Mulder","year":"2007","unstructured":"De Mulder E, \u00d6rs SB, Preneel B, Verbauwhede I (2007) Differential power and electromagnetic attacks on a fpga implementation of elliptic curve cryptosystems. Comput Electr Eng 33:367\u2013382","journal-title":"Comput Electr Eng"},{"issue":"1","key":"5590_CR29","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/BF01593790","volume":"12","author":"MJD Powell","year":"1977","unstructured":"Powell MJD (1977) Restart procedures for the conjugate gradient method. Math Program 12(1):241\u2013254","journal-title":"Math Program"},{"key":"5590_CR30","doi-asserted-by":"crossref","unstructured":"Riedmiller M, Braun H (1993) A direct adaptive method for faster backpropagation learning: The rprop algorithm. In: IEEE International Conference on Neural networks, 1993. IEEE, pp 586\u2013 591","DOI":"10.1109\/ICNN.1993.298623"},{"key":"5590_CR31","first-page":"89","volume-title":"Constructive Side-Channel Analysis and Secure Design, volume 7275 of Lecture Notes in Computer Science","author":"J Rolt","year":"2012","unstructured":"Rolt J, Das A, Natale G, Flottes M-L, Rouzeyre B, Verbauwhede I (2012) A new scan attack on rsa in presence of industrial countermeasures. In: Schindler W, Huss SA (eds) Constructive Side-Channel Analysis and Secure Design, volume 7275 of Lecture Notes in Computer Science. Springer, Berlin, pp 89\u2013 104"},{"key":"5590_CR32","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair U, Sehnke F, S\u00f6lter J, Dror G, Devadas S, Schmidhuber J (2010) Modeling attacks on physical unclonable functions. In: Proceedings of the 17th ACM Conference on Computer and Communications Security. ACM, pp 237\u2013249","DOI":"10.1145\/1866307.1866335"},{"key":"5590_CR33","doi-asserted-by":"crossref","unstructured":"Saeedi E, Kong Y (2014) Side channel information analysis based on machine learning. In: 2014 8th International Conference on Signal Processing and Communication Systems (ICSPCS). IEEE, pp 1\u20137","DOI":"10.1109\/ICSPCS.2014.7021075"},{"key":"5590_CR34","unstructured":"Schetinin V (2005) An evolving cascade neural network technique for cleaning sleep electroencephalograms arXiv: cs0504067"},{"key":"5590_CR35","first-page":"52","volume":"51","author":"LI Smith","year":"2002","unstructured":"Smith LI (2002) A tutorial on principal components analysis. Cornell University, USA 51:52","journal-title":"Cornell University, USA"},{"key":"5590_CR36","doi-asserted-by":"crossref","unstructured":"Tillich S, Herbst C (2008) Attacking state-of-the-art software countermeasuresa case study for aes. In: Cryptographic Hardware and Embedded Systems\u2013CHES 2008. Springer, pp 228\u2013243","DOI":"10.1007\/978-3-540-85053-3_15"},{"issue":"1","key":"5590_CR37","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1162\/neco.1995.7.1.117","volume":"7","author":"PM Williams","year":"1995","unstructured":"Williams PM (1995) Bayesian regularization and pruning using a laplace prior. Neural Comput 7(1):117\u2013143","journal-title":"Neural Comput"}],"container-title":["Journal of Electronic Testing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-016-5590-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10836-016-5590-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-016-5590-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,7]],"date-time":"2019-09-07T17:31:50Z","timestamp":1567877510000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10836-016-5590-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,14]]},"references-count":37,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,6]]}},"alternative-id":["5590"],"URL":"https:\/\/doi.org\/10.1007\/s10836-016-5590-4","relation":{},"ISSN":["0923-8174","1573-0727"],"issn-type":[{"value":"0923-8174","type":"print"},{"value":"1573-0727","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,5,14]]}}}