{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T12:08:12Z","timestamp":1777723692028,"version":"3.51.4"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2011,10,27]],"date-time":"2011-10-27T00:00:00Z","timestamp":1319673600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Cryptogr Eng"],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1007\/s13389-011-0023-x","type":"journal-article","created":{"date-parts":[[2011,10,26]],"date-time":"2011-10-26T06:17:31Z","timestamp":1319609851000},"page":"293-302","source":"Crossref","is-referenced-by-count":240,"title":["Machine learning in side-channel analysis: a first study"],"prefix":"10.1007","volume":"1","author":[{"given":"Gabriel","family":"Hospodar","sequence":"first","affiliation":[]},{"given":"Benedikt","family":"Gierlichs","sequence":"additional","affiliation":[]},{"given":"Elke","family":"De Mulder","sequence":"additional","affiliation":[]},{"given":"Ingrid","family":"Verbauwhede","sequence":"additional","affiliation":[]},{"given":"Joos","family":"Vandewalle","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,10,27]]},"reference":[{"key":"23_CR1","unstructured":"Aizerman, M.A., Braverman, E.A., Rozonoer, L.: Theoretical foundations of the potential function method in pattern recognition learning. In: Automation and Remote Control, vol. 25, pp. 821\u2013837 (1964)"},{"key":"23_CR2","unstructured":"Backes, M., D\u00fcrmuth, M., Gerling, S., Pinkal, M., Sporleder, C.: Acoustic side-channel attacks on printers. In: USENIX, p. 20 USENIX Association, USA (2010)"},{"key":"23_CR3","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198538493.001.0001","volume-title":"Neural Networks for Pattern Recognition","author":"C. Bishop","year":"1995","unstructured":"Bishop C.: Neural Networks for Pattern Recognition. Oxford University Press, USA (1995)"},{"key":"23_CR4","unstructured":"Brabanter, K.D., Karsmakers, P., Ojeda, F., Alzate, C., Brabanter, J.D., Pelckmans, K., Moor, B.D., Vandewalle, J., Suykens, J.: LS-SVMlab toolbox user\u2019s guide version 1.7. http:\/\/www.esat.kuleuven.be\/sista\/lssvmlab\/ (2010)"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: CHES, vol. LCNS 2523, pp. 13\u201328. Springer, USA (2002)","DOI":"10.1007\/3-540-36400-5_3"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Coron, J.S., Goubin, L.: On boolean and arithmetic masking against differential power analysis. In: CHES, pp. 231\u2013237. Springer, London (2000)","DOI":"10.1007\/3-540-44499-8_18"},{"key":"23_CR7","first-page":"273","volume":"20","author":"C. Cortes","year":"1995","unstructured":"Cortes C., Vapnik V.: Support-vector networks. Mach. Learn. 20, 273\u2013297 (1995)","journal-title":"Mach. Learn."},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Gandolfi, K., Naccache, D., Paar, C., G, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: concrete results. In: CHES, vol. 2162, pp. 251\u2013261. Springer, Berlin (2001)","DOI":"10.1007\/3-540-44709-1_21"},{"key":"23_CR9","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/B:MACH.0000008082.80494.e0","volume":"54","author":"T.V. Gestel","year":"2004","unstructured":"Gestel T.V., Suykens J., Baesens B., Viaene S., Vanthienen J., Dedene G., Moor B.D., Vandewalle J.: Benchmarking least squares support vector machine classifiers. Mach. Learn. 54, 5\u201332 (2004)","journal-title":"Mach. Learn."},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Gierlichs, B., Lemke-Rust, K., Paar, C.: Templates vs. stochastic methods. In: CHES, vol. LCNS 4249, pp. 15\u201329. Springer, Japan (2006)","DOI":"10.1007\/11894063_2"},{"key":"23_CR11","volume-title":"Neural Networks: A Comprehensive Foundation","author":"S. Haykin","year":"1998","unstructured":"Haykin S.: Neural Networks: A Comprehensive Foundation. Macmillan College Publishing Company, Englewood Cliffs (1998)"},{"key":"23_CR12","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-1904-8","volume-title":"Principal Component Analysis","author":"I.T. Jolliffe","year":"1986","unstructured":"Jolliffe I.T.: Principal Component Analysis. Springer, Berlin (1986)"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie- Hellman, RSA, DSS, and other systems. In: Crypto 96\u2014Advances in Cryptology, pp. 104\u2013113. Springer, UK (1996)","DOI":"10.1007\/3-540-68697-5_9"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Crypto 99\u2014Advances in Cryptology. LCNS, vol. 1666, pp. 388\u2013397. Springer, USA (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"key":"23_CR15","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"T.S. Messerges","year":"2002","unstructured":"Messerges T.S., Dabbish E.A., Sloan R.H.: Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51, 541\u2013552 (2002)","journal-title":"IEEE Trans. Comput."},{"key":"23_CR16","volume-title":"Machine Learning","author":"T.M. Mitchell","year":"1997","unstructured":"Mitchell T.M.: Machine Learning. McGraw-Hill, New York (1997)"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Quisquater, J.J., Samyde, D.: Electromagnetic analysis (EMA): measures and counter-measures for smart cards. In: Proc. Smart Card Programming and Security. LCNS, vol. 2140, pp. 200\u2013210 (2001)","DOI":"10.1007\/3-540-45418-7_17"},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"Rechberger, C., Oswald, E.: Practical template attacks. In: WISA, vol. 3325, pp. 440\u2013456. Springer, Korea (2004)","DOI":"10.1007\/978-3-540-31815-6_35"},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"Rivest, R.L.: Cryptography and machine learning. In: Advances in Cryptology ASIACRYPT, pp. 427\u2013439. Springer, Berlin (1993)","DOI":"10.1007\/3-540-57332-1_36"},{"key":"23_CR20","doi-asserted-by":"crossref","DOI":"10.1142\/9789812776655","volume-title":"Least Squares Support Vector Machines","author":"J. Suykens","year":"2002","unstructured":"Suykens J., Gestel T.V., Brabanter J.D., Moor B.D., Vandewalle J.: Least Squares Support Vector Machines. World Scientific, Singapore (2002)"}],"container-title":["Journal of Cryptographic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-011-0023-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13389-011-0023-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-011-0023-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,14]],"date-time":"2024-04-14T04:16:12Z","timestamp":1713068172000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13389-011-0023-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,27]]},"references-count":20,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2011,12]]}},"alternative-id":["23"],"URL":"https:\/\/doi.org\/10.1007\/s13389-011-0023-x","relation":{},"ISSN":["2190-8508","2190-8516"],"issn-type":[{"value":"2190-8508","type":"print"},{"value":"2190-8516","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,10,27]]}}}