{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T23:58:23Z","timestamp":1772063903909,"version":"3.50.1"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2014,11,4]],"date-time":"2014-11-04T00:00:00Z","timestamp":1415059200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptogr Eng"],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1007\/s13389-014-0089-3","type":"journal-article","created":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T12:54:57Z","timestamp":1415019297000},"page":"123-139","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":113,"title":["A machine learning approach against a masked AES"],"prefix":"10.1007","volume":"5","author":[{"given":"Liran","family":"Lerman","sequence":"first","affiliation":[]},{"given":"Gianluca","family":"Bontempi","sequence":"additional","affiliation":[]},{"given":"Olivier","family":"Markowitch","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,4]]},"reference":[{"key":"89_CR1","series-title":"LNCS","first-page":"309","volume-title":"CHES","author":"M-L Akkar","year":"2001","unstructured":"Akkar, M.-L., Giraud, C.: An implementation of DES and AES, secure against some attacks. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES. LNCS, vol. 2162, pp. 309\u2013318. Springer, Berlin (2001)"},{"key":"89_CR2","series-title":"LNCS","first-page":"263","volume-title":"CARDIS","author":"T Bartkewitz","year":"2012","unstructured":"Bartkewitz, T., Lemke-Rust, K.: Efficient template attacks based on probabilistic multi-class support vector machines. In: Mangard, S. (ed.) CARDIS. LNCS, vol. 7771, pp. 263\u2013276. Springer, Berlin (2012)"},{"key":"89_CR3","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45, 5\u201332 (2001)","journal-title":"Mach. Learn."},{"key":"89_CR4","series-title":"LNCS","first-page":"398","volume-title":"CRYPTO","author":"S Chari","year":"1999","unstructured":"Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards sound approaches to counteract power-analysis attacks. In: Wiener, M.J. (ed.) CRYPTO. LNCS, vol. 1666, pp. 398\u2013412. Springer, Berlin (1999)"},{"key":"89_CR5","doi-asserted-by":"crossref","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES. LNCS, vol. 2523, pp. 13\u201328. Springer, Berlin (2002)","DOI":"10.1007\/3-540-36400-5_3"},{"key":"89_CR6","doi-asserted-by":"crossref","first-page":"492","DOI":"10.1145\/1015047.1015050","volume":"3","author":"J-S Coron","year":"2004","unstructured":"Coron, J.-S., Naccache, D., Kocher, P.: Statistics and secret leakage. ACM Trans. Embed. Comput. Syst. 3, 492\u2013508 (2004)","journal-title":"ACM Trans. Embed. Comput. Syst."},{"issue":"3","key":"89_CR7","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273\u2013297 (1995)","journal-title":"Mach. Learn."},{"issue":"1\u20134","key":"89_CR8","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/S1088-467X(97)00008-5","volume":"1","author":"M Dash","year":"1997","unstructured":"Dash, M., Liu, H.: Feature selection for classification. Intell. Data Anal. 1(1\u20134), 131\u2013156 (1997)","journal-title":"Intell. Data Anal."},{"key":"89_CR9","unstructured":"Dimitriadou, E., Hornik, K., Leisch, F., Meyer, D., Weingessel, A.: e1071: Misc functions of the Department of Statistics (e1071), TU Wien. R package version 1.6 (2011)"},{"issue":"2","key":"89_CR10","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/s13389-011-0010-2","volume":"1","author":"J Doget","year":"2011","unstructured":"Doget, J., Prouff, E., Rivain, M., Standaert, F.-X.: Univariate side channel attacks and leakage modeling. J. Cryptogr. Eng. 1(2), 123\u2013144 (2011)","journal-title":"J. Cryptogr. Eng."},{"key":"89_CR11","unstructured":"DPAContest V4. http:\/\/www.dpacontest.org\/home\/ (2014). Accessed 1 Feb 2014"},{"key":"89_CR12","series-title":"LNCS","first-page":"459","volume-title":"EUROCRYPT","author":"F Durvaux","year":"2014","unstructured":"Durvaux, F., Standaert, F.-X., Veyrat-Charvillon, N.: How to certify the leakage of a chip? In: Nguyen, P.Q., Oswald, E. (eds.) EUROCRYPT. LNCS, vol. 8441, pp. 459\u2013476. Springer, Berlin (2014)"},{"key":"89_CR13","unstructured":"Gonzalez Estrada, E., Villasenor Alva, J.A.: mvShapiroTest: generalized Shapiro\u2013Wilk test for multivariate normality. R package version 0.0.1 (2009)"},{"key":"89_CR14","series-title":"LNCS","first-page":"251","volume-title":"CHES","author":"K Gandolfi","year":"2001","unstructured":"Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: concrete results. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES. LNCS, vol. 2162, pp. 251\u2013261. Springer, Berlin (2001)"},{"key":"89_CR15","doi-asserted-by":"crossref","unstructured":"Gierlichs, B., Batina, L., Tuyls, P., Preneel, B.: Mutual information analysis\u2014a generic side-channel distinguisher. In: CHES. LNCS, vol. 5154, pp. 426\u2013442. Springer, Berlin (2008)","DOI":"10.1007\/978-3-540-85053-3_27"},{"key":"89_CR16","unstructured":"Gierlichs, B., Janussen, K.: Template attacks on masking: an interpretation. In: Lucks, S., Sadeghi, A.-R., Wolf, C. (eds.) WEWoRC (2007)"},{"key":"89_CR17","doi-asserted-by":"crossref","unstructured":"Gierlichs, B., Lemke-Rust, K., Paar, C.: Templates vs. stochastic methods. In: Proceedings of the 8th International Conference on Cryptographic Hardware and Embedded Systems. LNCS, vol. 4249, pp. 15\u201329. Springer, Berlin (2006)","DOI":"10.1007\/11894063_2"},{"key":"89_CR18","doi-asserted-by":"crossref","unstructured":"Golic, J.Dj., Tymen, C.: Multiplicative masking and power analysis of AES. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES. LNCS, vol. 2523, pp. 198\u2013212. Springer, Berlin (2002)","DOI":"10.1007\/3-540-36400-5_16"},{"key":"89_CR19","unstructured":"Hajra, S., Mukhopadhyay, D.: SNR to success rate: reaching the limit of non-profiling DPA. Cryptology ePrint Archive, Report 2013\/865 (2013). http:\/\/eprint.iacr.org\/"},{"key":"89_CR20","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-84858-7","volume-title":"The Elements of Statistical Learning: Data Mining, Inference and Prediction","author":"T Hastie","year":"2009","unstructured":"Hastie, T., Tibshirani, R., Friedman, J.: The Elements of Statistical Learning: Data Mining, Inference and Prediction, 2nd edn. Springer, Berlin (2009)","edition":"2"},{"key":"89_CR21","doi-asserted-by":"crossref","unstructured":"Heuser, A., Zohner, M.: Intelligent machine homicide\u2014breaking cryptographic devices using support vector machines. In: Proceedings of the Third International Conference on Constructive Side-Channel Analysis and Secure Design. LNCS, vol. 7275, pp. 249\u2013264. Springer, Berlin (2012)","DOI":"10.1007\/978-3-642-29912-4_18"},{"issue":"4","key":"89_CR22","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/s13389-011-0023-x","volume":"1","author":"G Hospodar","year":"2011","unstructured":"Hospodar, G., Gierlichs, B., Mulder, E.D., Verbauwhede, I., Vandewalle, J.: Machine learning in side-channel analysis: a first study. J. Cryptogr. Eng. 1(4), 293\u2013302 (2011)","journal-title":"J. Cryptogr. Eng."},{"key":"89_CR23","unstructured":"Hospodar, G., Mulder, E.D., Gierlichs, B., Vandewalle, J., Verbauwhede, I.: Least squares support vector machines for side-channel analysis. In: Second International Workshop on Constructive SideChannel Analysis and Secure Design, pp. 99\u2013104. Center for Advanced Security Research, Darmstadt (2011)"},{"issue":"5","key":"89_CR24","doi-asserted-by":"crossref","first-page":"429","DOI":"10.3233\/IDA-2002-6504","volume":"6","author":"N Japkowicz","year":"2002","unstructured":"Japkowicz, N., Stephen, S.: The class imbalance problem: a systematic study. Intell. Data Anal. J. 6(5), 429\u2013449 (2002)","journal-title":"Intell. Data Anal. J."},{"key":"89_CR25","series-title":"LNCS","first-page":"104","volume-title":"CRYPTO","author":"PC Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie\u2013Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO. LNCS, vol. 1109, pp. 104\u2013113. Springer, Berlin (1996)"},{"key":"89_CR26","doi-asserted-by":"crossref","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: CRYPTO. LNCS, pp. 388\u2013397. Springer, Berlin (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"key":"89_CR27","unstructured":"Lerman, L., Bontempi, G., Markowitch, O.: Side channel attack: an approach based on machine learning. In: Second International Workshop on Constructive SideChannel Analysis and Secure Design, pp. 29\u201341. Center for Advanced Security Research, Darmstadt (2011)"},{"issue":"2","key":"89_CR28","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1504\/IJACT.2014.062722","volume":"3","author":"L Lerman","year":"2014","unstructured":"Lerman, L., Bontempi, G., Markowitch, O.: Power analysis attack: an approach based on machine learning. Int. J. Appl. Cryptogr. 3(2), 97\u2013115 (2014)","journal-title":"Int. J. Appl. Cryptogr."},{"key":"89_CR29","doi-asserted-by":"crossref","unstructured":"Lerman, L., Bontempi, G., Ben Taieb, S., Markowitch, O.: A time series approach for profiling attack. In: Gierlichs, B., Guilley, S., Mukhopadhyay, D. (eds.) SPACE. LNCS, vol. 8204, pp. 75\u201394. Springer, Berlin (2013)","DOI":"10.1007\/978-3-642-41224-0_7"},{"key":"89_CR30","doi-asserted-by":"crossref","unstructured":"Lerman, L., Fernandes Medeiros, S., Bontempi, G., Markowitch, O.: A machine learning approach against a masked AES. In: Francillon, A., Rohatgi, P. (eds.) International Conference on Smart Card Research and Advanced Applications (CARDIS). LNCS. Springer, Berlin (2013)","DOI":"10.1007\/978-3-319-08302-5_5"},{"issue":"3","key":"89_CR31","first-page":"18","volume":"2","author":"A Liaw","year":"2002","unstructured":"Liaw, A., Wiener, M.: Classification and regression by randomforest. R News 2(3), 18\u201322 (2002)","journal-title":"R News"},{"key":"89_CR32","series-title":"LNCS","first-page":"506","volume-title":"ASIACRYPT","author":"V Lomn\u00e9","year":"2013","unstructured":"Lomn\u00e9, V., Prouff, E., Roche, T.: Behind the scene of side channel attacks. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT. LNCS, vol. 8269, pp. 506\u2013525. Springer, Berlin (2013)"},{"key":"89_CR33","volume-title":"Power Analysis Attacks\u2014Revealing the Secrets of Smart Cards","author":"S Mangard","year":"2007","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks\u2014Revealing the Secrets of Smart Cards. Springer, Berlin (2007)"},{"issue":"3","key":"89_CR34","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1093\/biomet\/57.3.519","volume":"57","author":"KV Mardia","year":"1970","unstructured":"Mardia, K.V.: Measures of multivariate skewness and kurtosis with applications. Biometrika 57(3), 519\u2013530 (1970)","journal-title":"Biometrika"},{"issue":"2","key":"89_CR35","first-page":"586","volume":"22","author":"Z Martinasek","year":"2013","unstructured":"Martinasek, Z., Zeman, V.: Innovative method of the power analysis. Radioengineering 22(2), 586\u2013594 (2013)","journal-title":"Radioengineering"},{"key":"89_CR36","series-title":"LNCS","first-page":"150","volume-title":"FSE","author":"TS Messerges","year":"2001","unstructured":"Messerges, T.S.: Securing the AES finalists against power analysis attacks. In: Goos, G., Hartmanis, J., Leeuwen, J., Schneier, B. (eds.) FSE. LNCS, vol. 1978, pp. 150\u2013164. Springer, Berlin (2001)"},{"issue":"2","key":"89_CR37","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/s13389-012-0038-y","volume":"3","author":"DP Montminy","year":"2013","unstructured":"Montminy, D.P., Baldwin, R.O., Temple, M.A., Laspe, E.D.: Improving cross-device attacks using zero-mean unit-variance normalization. J. Cryptogr. Eng. 3(2), 99\u2013110 (2013)","journal-title":"J. Cryptogr. Eng."},{"key":"89_CR38","unstructured":"Moradi, A., Guilley, S., Heuser, A.: Detecting hidden leakages. Cryptology ePrint Archive, Report 2013\/842 (2013). http:\/\/eprint.iacr.org\/"},{"key":"89_CR39","doi-asserted-by":"crossref","unstructured":"Nassar, M., Souissi, Y., Guilley, S., Danger, J.-L.: RSM: a small and fast countermeasure for AES, secure against 1st and 2nd-order zero-offset SCAs. In: Rosenstiel, W., Thiele, L. (eds.) DATE, pp. 1173\u20131178. IEEE (2012)","DOI":"10.1109\/DATE.2012.6176671"},{"key":"89_CR40","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1007\/11967668_16","volume-title":"Topics in Cryptology\u2014CT-RSA 2007","author":"E Oswald","year":"2006","unstructured":"Oswald, E., Mangard, S.: Template attacks on masking-resistance is futile. In: Abe, M. (ed.) Topics in Cryptology\u2014CT-RSA 2007. LNCS, vol. 4377, pp. 243\u2013256. Springer, Berlin (2006)"},{"issue":"6","key":"89_CR41","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1080\/14786440109462720","volume":"2","author":"K Pearson","year":"1901","unstructured":"Pearson, K.: On lines and planes of closest fit to systems of points in space. Philos. Mag. 2(6), 559\u2013572 (1901)","journal-title":"Philos. Mag."},{"issue":"8","key":"89_CR42","doi-asserted-by":"crossref","first-page":"1226","DOI":"10.1109\/TPAMI.2005.159","volume":"27","author":"H Peng","year":"2005","unstructured":"Peng, H., Long, F., Ding, C.: Feature selection based on mutual information criteria of max-dependency, max-relevance, and min-redundancy. IEEE Trans. Pattern Anal. Mach. Intell. 27(8), 1226\u20131238 (2005)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"89_CR43","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1007\/11502760_29","volume-title":"Fast Software Encryption","author":"E Prouff","year":"2005","unstructured":"Prouff, E.: DPA attacks and S-boxes. In: Gilbert, H., Handschuh, H. (eds.) Fast Software Encryption. LNCS, vol. 3557, pp. 424\u2013441. Springer, Berlin (2005)"},{"key":"89_CR44","series-title":"LNCS","first-page":"127","volume-title":"FSE","author":"M Rivain","year":"2008","unstructured":"Rivain, M., Dottax, E., Prouff, E.: Block ciphers implementations provably secure against second order side channel analysis. In: Nyberg, K. (ed.) FSE. LNCS, vol. 5086, pp. 127\u2013143. Springer, Berlin (2008)"},{"issue":"3","key":"89_CR45","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1515\/JMC.2008.013","volume":"2","author":"W Schindler","year":"2008","unstructured":"Schindler, W.: Advanced stochastic methods in side channel analysis on block ciphers in the presence of masking. J. Math. Cryptol. 2(3), 291\u2013310 (2008)","journal-title":"J. Math. Cryptol."},{"key":"89_CR46","series-title":"LNCS","first-page":"30","volume-title":"CHES","author":"W Schindler","year":"2005","unstructured":"Schindler, W., Lemke, K., Paar, C.: A stochastic model for differential side channel cryptanalysis. In: Rao, J.R., Sunar, B. (eds.) CHES. LNCS, vol. 3659, pp. 30\u201346. Springer, Berlin (2005)"},{"key":"89_CR47","series-title":"LNCS","first-page":"411","volume-title":"CHES","author":"F-X Standaert","year":"2008","unstructured":"Standaert, F.-X., Archambeau, C.: Using subspace-based template attacks to compare and combine power and electromagnetic information leakages. In: Oswald, E., Rohatgi, P. (eds.) CHES. LNCS, vol. 5154, pp. 411\u2013425. Springer, Berlin (2008)"},{"key":"89_CR48","series-title":"LNCS","first-page":"112","volume-title":"ASIACRYPT","author":"F-X Standaert","year":"2010","unstructured":"Standaert, F.-X., Veyrat-Charvillon, N., Oswald, E., Gierlichs, B., Medwed, M., Kasper, M., Mangard, S.: The world is not enough: another look on second-order DPA. In: Abe, M. (ed.) ASIACRYPT. LNCS, vol. 6477, pp. 112\u2013129. Springer, Berlin (2010)"},{"issue":"15","key":"89_CR49","doi-asserted-by":"crossref","first-page":"1139","DOI":"10.1587\/elex.7.1139","volume":"7","author":"T Sugawara","year":"2010","unstructured":"Sugawara, T., Homma, N., Aoki, T., Satoh, A.: Profiling attack using multivariate regression analysis. IEICE Electron. Express 7(15), 1139\u20131144 (2010)","journal-title":"IEICE Electron. Express"},{"key":"89_CR50","series-title":"LNCS","first-page":"44","volume-title":"IMA International Conference","author":"M Willich von","year":"2001","unstructured":"von Willich, M.: A technique with an information-theoretic basis for protecting secret data from differential power attacks. In: Honary, B. (ed.) IMA International Conference. LNCS, vol. 2260, pp. 44\u201362. Springer, Berlin (2001)"},{"key":"89_CR51","series-title":"LNCS","first-page":"37","volume-title":"CHES","author":"C Whitnall","year":"2013","unstructured":"Whitnall, C., Oswald, E.: Profiling DPA: efficacy and efficiency trade-offs. In: Bertoni, G., Coron, J.-S. (eds.) CHES. LNCS, vol. 8086, pp. 37\u201354. Springer, Berlin (2013)"},{"key":"89_CR52","series-title":"LNCS","first-page":"234","volume-title":"CARDIS","author":"C Whitnall","year":"2011","unstructured":"Whitnall, C., Oswald, E., Mather, L.: An exploration of the Kolmogorov\u2013Smirnov test as a competitor to mutual information analysis. In: Prouff, E. (ed.) CARDIS. LNCS, vol. 7079, pp. 234\u2013251. Springer, Berlin (2011)"}],"container-title":["Journal of Cryptographic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-014-0089-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13389-014-0089-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-014-0089-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,16]],"date-time":"2019-08-16T23:40:31Z","timestamp":1565998831000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13389-014-0089-3"}},"subtitle":["Reaching the limit of side-channel attacks with a learning model"],"short-title":[],"issued":{"date-parts":[[2014,11,4]]},"references-count":52,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,6]]}},"alternative-id":["89"],"URL":"https:\/\/doi.org\/10.1007\/s13389-014-0089-3","relation":{},"ISSN":["2190-8508","2190-8516"],"issn-type":[{"value":"2190-8508","type":"print"},{"value":"2190-8516","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,11,4]]}}}