{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T10:57:04Z","timestamp":1775041024206,"version":"3.50.1"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T00:00:00Z","timestamp":1631145600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T00:00:00Z","timestamp":1631145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2022,4]]},"DOI":"10.1007\/s11704-020-0209-4","type":"journal-article","created":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T17:05:37Z","timestamp":1631207137000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Side-channel analysis attacks based on deep learning network"],"prefix":"10.1007","volume":"16","author":[{"given":"Yu","family":"Ou","sequence":"first","affiliation":[]},{"given":"Lang","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,9]]},"reference":[{"key":"209_CR1","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1016\/j.compeleceng.2018.02.030","volume":"67","author":"M Jaegeun","year":"2018","unstructured":"Jaegeun M, Im Y Jung, Hyuk J P. IoT application protection against power analysis attack. Computers and Electrical Engineering, 2018, 67: 566\u2013578","journal-title":"Computers and Electrical Engineering"},{"key":"209_CR2","doi-asserted-by":"crossref","unstructured":"Brier E, Clavier C, Olivier F. Correlation power analysis with a leakage model. In: Proceedings of International Conference on Cryptographic Hardware and Embedded Systems. 2004, 16\u201329","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"209_CR3","doi-asserted-by":"publisher","first-page":"17833","DOI":"10.1109\/ACCESS.2020.2967904","volume":"8","author":"J Chang","year":"2020","unstructured":"Chang J, Wang H, Wang F, Zhang A, Ji Y. RKA security for identity-based signature scheme. IEEE Access, 2020, 8: 17833\u201317841","journal-title":"IEEE Access"},{"key":"209_CR4","doi-asserted-by":"crossref","unstructured":"Mangard S, Pramstaller N, Oswald E. Successfully attacking masked AES hardware implementations. In: Proceedings of International Conference on Cryptographic Hardware and Embedded Systems. 2005, 157\u2013171","DOI":"10.1007\/11545262_12"},{"issue":"1","key":"209_CR5","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/TDSC.2017.2729549","volume":"17","author":"J Van Cleemput","year":"2020","unstructured":"Van Cleemput J, De Sutter B, De Bosschere B. Adaptive compiler strategies for mitigating timing side channel attacks. IEEE Transactions on Dependable and Secure Computing, 2020, 17(1): 35\u201349","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"209_CR6","doi-asserted-by":"crossref","unstructured":"Yoshikawa M, Nozaki Y, Asahi K. Multiple rounds aware power analysis attack for a lightweight cipher SIMECK. In: Proceedings of IEEE Second International Conference on Big Data Computing Service & Applications. 2016, 252\u2013256","DOI":"10.1109\/BigDataService.2016.17"},{"issue":"1","key":"209_CR7","doi-asserted-by":"publisher","first-page":"971","DOI":"10.1109\/TPS.2018.2874955","volume":"47","author":"BS Go","year":"2019","unstructured":"GO BS, Le DV, Song MG, Park M, Yu I K. Design and electromagnetic analysis of an induction-type coilgun system with a pulse power module. IEEE Transactions on Plasma Science, 2019, 47(1): 971\u2013976","journal-title":"IEEE Transactions on Plasma Science"},{"issue":"1","key":"209_CR8","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s13389-011-0006-y","volume":"1","author":"P Kocher","year":"2011","unstructured":"Kocher P, Jaffe J, Jun B, Rohatgi P. Introduction to differential power analysis. Journal of Cryptographic Engineering, 2011, 1(1): 5\u201327","journal-title":"Journal of Cryptographic Engineering"},{"issue":"1","key":"209_CR9","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/s13389-012-0028-0","volume":"2","author":"C Carlet","year":"2012","unstructured":"Carlet C, Faugere J C, Goyet C, Renault G. Analysis of the algebraic side channel attack. Journal of Cryptographic Engineering, 2012, 2(1): 45\u201362","journal-title":"Journal of Cryptographic Engineering"},{"key":"209_CR10","doi-asserted-by":"crossref","unstructured":"Ghoshal A, Patranabis S, Mukhopadhyay D. Template-based fault injection analysis of block ciphers. In: Proceedings of International Conference on Security, Privacy, and Applied Cryptography Engineering. 2018, 21\u201336","DOI":"10.1007\/978-3-030-05072-6_2"},{"key":"209_CR11","doi-asserted-by":"crossref","unstructured":"Wan W, Chen H, Chen J. The attack case of ECDSA on blockchain based on improved simple power analysis. In: Proceedings of International Conference on Artificial Intelligence and Security. 2019, 120\u2013132","DOI":"10.1007\/978-3-030-24268-8_12"},{"key":"209_CR12","doi-asserted-by":"crossref","unstructured":"Rivest R L. Cryptography and machine learning. In: Proceedings of Advances in Cryptology-ASIACRYPT. 1991, 427\u2013439","DOI":"10.1007\/3-540-57332-1_36"},{"issue":"4","key":"209_CR13","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/s13389-011-0023-x","volume":"1","author":"G Hospodar","year":"2011","unstructured":"Hospodar G, Gierlichs B, Mulder E D, Verbauwhede I, Vandewalle J. Machine learning in side-channel analysis: a first study. Journal of Cryptographic Engineering, 2011, 1(4): 293\u2013302","journal-title":"Journal of Cryptographic Engineering"},{"key":"209_CR14","doi-asserted-by":"crossref","unstructured":"Heuser A, Zohner M. Intelligent machine homicide-breaking cryptographic devices using support vector machines. In: Proceedings of Constructive Side-Channel Analysis and Secure Design. 2012, 249\u2013264","DOI":"10.1007\/978-3-642-29912-4_18"},{"key":"209_CR15","doi-asserted-by":"crossref","unstructured":"Bartkewitz T, Lemke-Rust K. Efficient template attacks based on probabilistic multi-class support vector machines. In: Proceedings of Smart Card Research and Advanced Applications. 2012, 263\u2013276","DOI":"10.1007\/978-3-642-37288-9_18"},{"key":"209_CR16","doi-asserted-by":"crossref","unstructured":"Lerman L, Poussier R, Bontempi G, Markowitch O, Standaert F X. Template attacks vs. machine learning revisited (and the curse of dimensionality in side-channel analysis). In: Proceedings of Constructive Side-Channel Analysis and Secure Design. 2015, 20\u201333","DOI":"10.1007\/978-3-319-21476-4_2"},{"key":"209_CR17","doi-asserted-by":"crossref","unstructured":"Martinasek Z, Dzurenda P, Malina L. Profiling power analysis attack based on MLP in DPA contest V4.2. In: Proceedings of International Conference on Telecommunications and Signal Processing. 2016, 223\u2013226","DOI":"10.1109\/TSP.2016.7760865"},{"key":"209_CR18","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/978-3-319-15765-8_18","volume":"343","author":"Z Martinasek","year":"2015","unstructured":"Martinasek Z, Malina L, Trasy K. Profiling power analysis attack based on multi-layer perceptron network. Computational Problems in Science and Engineering, 2015, 343: 317\u2013339","journal-title":"Computational Problems in Science and Engineering"},{"key":"209_CR19","doi-asserted-by":"crossref","unstructured":"Cagli E, Dumas C, Prouff E. Convolutional neural networks with data augmentation against jitter-based countermeasures. In: Proceedings of International Conference on Cryptographic Hardware and Embedded Systems. 2017, 45\u201368","DOI":"10.1007\/978-3-319-66787-4_3"},{"key":"209_CR20","doi-asserted-by":"crossref","unstructured":"Maghrebi H, Portigliatti T, Prouff E. Breaking cryptographic implementations using deep learning techniques. In: Proceedings of International Conference on Security, Privacy, and Applied Cryptography Engineering. 2016, 3\u201326","DOI":"10.1007\/978-3-319-49445-6_1"},{"issue":"2","key":"209_CR21","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s13389-019-00220-8","volume":"10","author":"E Prouff","year":"2020","unstructured":"Prouff E, Strullu R, Benadjila R, Cagli E, Dumas C. Study of deep learning techniques for side-channel analysis and introduction to ASCAD database. Journal of Cryptographic Engineering, 2020, 10(2): 163\u2013188","journal-title":"Journal of Cryptographic Engineering"},{"key":"209_CR22","doi-asserted-by":"publisher","first-page":"5428","DOI":"10.1109\/ACCESS.2019.2961810","volume":"8","author":"R Chen","year":"2020","unstructured":"Chen R, Wu W, Qi H, Wang J, Wang H. A stacked autoencoder neural network algorithm for breast cancer diagnosis with magnetic detection electrical impedance tomography. IEEE Access, 2020, 8: 5428\u20135437","journal-title":"IEEE Access"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-020-0209-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11704-020-0209-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-020-0209-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,20]],"date-time":"2023-05-20T21:01:38Z","timestamp":1684616498000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11704-020-0209-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,9]]},"references-count":22,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["209"],"URL":"https:\/\/doi.org\/10.1007\/s11704-020-0209-4","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,9]]},"assertion":[{"value":"18 May 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 July 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 September 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"162303"}}