{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:31:33Z","timestamp":1761676293218},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2015,6,27]],"date-time":"2015-06-27T00:00:00Z","timestamp":1435363200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptogr Eng"],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1007\/s13389-015-0106-1","type":"journal-article","created":{"date-parts":[[2015,6,26]],"date-time":"2015-06-26T09:59:24Z","timestamp":1435312764000},"page":"255-267","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["The bias\u2013variance decomposition in profiled attacks"],"prefix":"10.1007","volume":"5","author":[{"given":"Liran","family":"Lerman","sequence":"first","affiliation":[]},{"given":"Gianluca","family":"Bontempi","sequence":"additional","affiliation":[]},{"given":"Olivier","family":"Markowitch","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,27]]},"reference":[{"key":"106_CR1","doi-asserted-by":"crossref","unstructured":"Bartkewitz, T., Lemke-Rust, K.: Efficient template attacks based on probabilistic multi-class support vector machines. In: Mangard, S. (ed.) CARDIS, LNCS, vol. 7771, pp. 263\u2013276. Springer (2012)","DOI":"10.1007\/978-3-642-37288-9_18"},{"key":"106_CR2","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-9314-6","volume-title":"Differential Cryptanalysis of the Data Encryption Standard","author":"E Biham","year":"1993","unstructured":"Biham, E., Shamir, A.: Differential Cryptanalysis of the Data Encryption Standard. Springer, New York (1993)"},{"key":"106_CR3","unstructured":"Breiman, L.: Bagging predictors. Technical report, Department of Statistics, University of California (1995)"},{"key":"106_CR4","unstructured":"Breiman, L.: Arcing classifiers. Technical report, Department of Statistics, University of California (1996)"},{"issue":"3","key":"106_CR5","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1023\/A:1007682208299","volume":"40","author":"L Breiman","year":"2000","unstructured":"Breiman, L.: Randomizing outputs to increase prediction accuracy. Mach. Learn. 40(3), 229\u2013242 (2000)","journal-title":"Mach. Learn."},{"key":"106_CR6","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45, 5\u201332 (2001)","journal-title":"Mach. Learn."},{"key":"106_CR7","doi-asserted-by":"crossref","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (ed.) CHES, LNCS, vol. 2523, pp. 13\u201328. Springer (2002)","DOI":"10.1007\/3-540-36400-5_3"},{"issue":"3","key":"106_CR8","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273\u2013297 (1995)","journal-title":"Mach. Learn."},{"key":"106_CR9","unstructured":"Dietterich, T.G., Kong, E.B.: Machine learning bias, statistical bias, and statistical variance of decision tree algorithms. Technical report, Department of Computer Science, Oregon State University (1995)"},{"issue":"2","key":"106_CR10","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/s13389-011-0010-2","volume":"1","author":"J Doget","year":"2011","unstructured":"Doget, J., Prouff, E., Rivain, M., Standaert, F.-X.: Univariate side channel attacks and leakage modeling. J. Cryptogr. Eng. 1(2), 123\u2013144 (2011)","journal-title":"J. Cryptogr. Eng."},{"key":"106_CR11","first-page":"231","volume-title":"ICML","author":"P Domingos","year":"2000","unstructured":"Domingos, P.: A unified bias-variance decomposition and its applications. In: Langley, P. (ed.) ICML, pp. 231\u2013238. Morgan Kaufmann, San Francisco (2000)"},{"key":"106_CR12","first-page":"564","volume-title":"AAAI\/IAAI","author":"P Domingos","year":"2000","unstructured":"Domingos, P.: A unified bias-variance decomposition for zero-one and squared loss. In: Kautz, H.A., Porter, B.W. (eds.) AAAI\/IAAI, pp. 564\u2013569. AAAI Press\/The MIT Press, New York (2000)"},{"key":"106_CR13","doi-asserted-by":"crossref","unstructured":"Durvaux, F., Standaert, F.-X., Veyrat-Charvillon, N.: How to certify the leakage of a chip? In: EUROCRYPT, LNCS, vol. 8441, pp. 459\u2013475. Springer (2014) (to appear)","DOI":"10.1007\/978-3-642-55220-5_26"},{"issue":"1","key":"106_CR14","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/s13389-012-0030-6","volume":"2","author":"MA Elaabid","year":"2012","unstructured":"Elaabid, M.A., Guilley, S.: Portability of templates. J. Cryptogr. Eng. 2(1), 63\u201374 (2012)","journal-title":"J. Cryptogr. Eng."},{"key":"106_CR15","unstructured":"Fei, Y., Ding, A.A., Lao, J., Zhang, L.: A statistics-based fundamental model for side-channel attack analysis. Cryptology ePrint Archive, Report 2014\/152 (2014). http:\/\/eprint.iacr.org\/ . Accessed 1 July 2014"},{"issue":"1","key":"106_CR16","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1006\/jcss.1997.1504","volume":"55","author":"Y Freund","year":"1997","unstructured":"Freund, Y., Schapire, R.E.: A decision-theoretic generalization of on-line learning and an application to boosting. J. Comput. Syst. Sci. 55(1), 119\u2013139 (1997)","journal-title":"J. Comput. Syst. Sci."},{"issue":"1","key":"106_CR17","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1023\/A:1009778005914","volume":"1","author":"JH Friedman","year":"1997","unstructured":"Friedman, J.H.: On bias, variance, 0\/1-loss, and the curse-of-dimensionality. Data Min. Knowl. Discov. 1(1), 55\u201377 (1997)","journal-title":"Data Min. Knowl. Discov."},{"key":"106_CR18","doi-asserted-by":"crossref","unstructured":"Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: concrete results. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (ed.) CHES, LNCS, vol. 2162, pp. 251\u2013261. Springer (2001)","DOI":"10.1007\/3-540-44709-1_21"},{"issue":"1","key":"106_CR19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1162\/neco.1992.4.1.1","volume":"4","author":"S Geman","year":"1992","unstructured":"Geman, S., Bienenstock, E., Doursat, R.: Neural networks and the bias\/variance dilemma. Neural Comput. 4(1), 1\u201358 (1992)","journal-title":"Neural Comput."},{"key":"106_CR20","doi-asserted-by":"crossref","unstructured":"Gierlichs, B., Lemke-Rust, K., Paar, C.: Templates vs. stochastic methods. In: Goubin, L., Matsui, M. (ed.) Cryptographic Hardware and Embedded Systems\u2014CHES 2006, 8th International Workshop, Yokohama, Japan, 10\u201313 October 2006, Proceedings, LNCS, vol. 4249, pp. 15\u201329. Springer (2006)","DOI":"10.1007\/11894063_2"},{"key":"106_CR21","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-84858-7","volume-title":"The Elements of Statistical Learning: Data Mining, Inference and Prediction","author":"T Hastie","year":"2009","unstructured":"Hastie, T., Tibshirani, R., Friedman, J.: The Elements of Statistical Learning: Data Mining, Inference and Prediction, 2nd edn. Springer, New York (2009)","edition":"2"},{"issue":"6","key":"106_CR22","doi-asserted-by":"crossref","first-page":"1425","DOI":"10.1162\/089976698300017232","volume":"10","author":"T Heskes","year":"1998","unstructured":"Heskes, T.: Bias\/variance decompositions for likelihood-based estimators. Neural Comput. 10(6), 1425\u20131433 (1998)","journal-title":"Neural Comput."},{"key":"106_CR23","doi-asserted-by":"crossref","unstructured":"Heuser, A., Rioul, O., Guilley, S.: A theoretical study of kolmogorov-smirnov distinguishers\u2014side-channel analysis vs. differential cryptanalysis. In: Prouff, E. (ed.) Constructive Side-Channel Analysis and Secure Design\u20145th International Workshop, COSADE 2014, Paris, France, 13\u201315 April 2014. Revised Selected Papers, LNCS, vol. 8622, pp. 9\u201328. Springer (2014)","DOI":"10.1007\/978-3-319-10175-0_2"},{"key":"106_CR24","doi-asserted-by":"crossref","unstructured":"Heuser, A., Zohner, M.: Intelligent machine homicide - breaking cryptographic devices using support vector machines. In: Proceedings of the Third international conference on Constructive Side-Channel Analysis and Secure Design, LNCS, vol. 7275, pp. 249\u2013264. Springer, Berlin, Heidelberg (2012)","DOI":"10.1007\/978-3-642-29912-4_18"},{"issue":"4","key":"106_CR25","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/s13389-011-0023-x","volume":"1","author":"G Hospodar","year":"2011","unstructured":"Hospodar, G., Gierlichs, B., Mulder, E.D., Verbauwhede, I., Vandewalle, J.: Machine learning in side-channel analysis: a first study. J. Cryptogr. Eng. 1(4), 293\u2013302 (2011)","journal-title":"J. Cryptogr. Eng."},{"key":"106_CR26","unstructured":"Hospodar, G., Mulder, E.D., Gierlichs, B., Vandewalle, J., Verbauwhede, I.: Least squares support vector machines for side-channel analysis. In: Second International Workshop on Constructive Side Channel Analysis and Secure Design, pp. 99\u2013104. Center for Advanced Security Research Darmstadt (2011)"},{"key":"106_CR27","unstructured":"James, G., Hastie, T.: Generalizations of the bias\/variance decomposition for prediction error. Technical report, Department of Statistics, Standford University (1996)"},{"key":"106_CR28","doi-asserted-by":"crossref","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie\u2013Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO, LNCS, vol. 1109, pp. 104\u2013113. Springer (1996)","DOI":"10.1007\/3-540-68697-5_9"},{"key":"106_CR29","doi-asserted-by":"crossref","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: CRYPTO, LNCS, pp. 388\u2013397. Springer (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"key":"106_CR30","first-page":"275","volume-title":"ICML","author":"R Kohavi","year":"1996","unstructured":"Kohavi, R., Wolpert, D.: Bias plus variance decomposition for zero-one loss functions. In: Saitta, L. (ed.) ICML, pp. 275\u2013283. Morgan Kaufmann, San Francisco (1996)"},{"key":"106_CR31","unstructured":"Lerman, L., Bontempi, G., Markowitch, O.: Side channel attack: an approach based on machine learning. In: Second International Workshop on Constructive Side Channel Analysis and Secure Design, pp. 29\u201341. Center for Advanced Security Research Darmstadt (2011)"},{"issue":"2","key":"106_CR32","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1504\/IJACT.2014.062722","volume":"3","author":"L Lerman","year":"2014","unstructured":"Lerman, L., Bontempi, G., Markowitch, O.: Power analysis attack: an approach based on machine learning. Int. J. Appl. Cryptogr. 3(2), 97\u2013115 (2014)","journal-title":"Int. J. Appl. Cryptogr."},{"issue":"2","key":"106_CR33","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/s13389-014-0089-3","volume":"5","author":"L Lerman","year":"2015","unstructured":"Lerman, L., Bontempi, G., Markowitch, O.: A machine learning approach against a masked aes. J. Cryptogr. Eng. 5(2), 123\u2013139 (2015)","journal-title":"J. Cryptogr. Eng."},{"key":"106_CR34","doi-asserted-by":"crossref","unstructured":"Lerman, L., Bontempi, G., Ben Taieb, S., Markowitch, O.: A time series approach for profiling attack. In: Gierlichs, B., Guilley, S., Mukhopadhyay, D. (ed.) SPACE, LNCS, vol. 8204, pp. 75\u201394. Springer (2013)","DOI":"10.1007\/978-3-642-41224-0_7"},{"key":"106_CR35","doi-asserted-by":"crossref","unstructured":"Lerman, L., Fernandes Medeiros, S., Bontempi, G., Markowitch, O.: A machine learning approach against a masked AES. In: Francillon, A., Rohatgi, P. (ed.) Smart Card Research and Advanced Applications\u201412th International Conference, CARDIS 2013, Berlin, Germany, 27\u201329 November 2013. Revised Selected Papers, LNCS, vol. 8419, pp. 61\u201375. Springer (2013)","DOI":"10.1007\/978-3-319-08302-5_5"},{"key":"106_CR36","volume-title":"Power Analysis Attacks\u2014Revealing the Secrets of Smart Cards","author":"S Mangard","year":"2007","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks\u2014Revealing the Secrets of Smart Cards. Springer, New York (2007)"},{"key":"106_CR37","doi-asserted-by":"crossref","unstructured":"Matsui, M.: Linear cryptoanalysis method for des cipher. In: Helleseth, T. (ed.) EUROCRYPT, LNCS, vol. 765, pp. 386\u2013397. Springer (1993)","DOI":"10.1007\/3-540-48285-7_33"},{"key":"106_CR38","doi-asserted-by":"crossref","unstructured":"Meier, W., Staffelbach, O.: Nonlinearity criteria for cryptographic functions. In: Quisquater, J-J., Vandewalle, J. (ed.) EUROCRYPT, LNCS, vol. 434, pp. 549\u2013562. Springer (1989)","DOI":"10.1007\/3-540-46885-4_53"},{"issue":"2","key":"106_CR39","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/s13389-012-0038-y","volume":"3","author":"DP Montminy","year":"2013","unstructured":"Montminy, D.P., Baldwin, R.O., Temple, M.A., Laspe, E.D.: Improving cross-device attacks using zero-mean unit-variance normalization. J. Cryptogr. Eng. 3(2), 99\u2013110 (2013)","journal-title":"J. Cryptogr. Eng."},{"key":"106_CR40","first-page":"245","volume-title":"ICML","author":"AY Ng","year":"1997","unstructured":"Ng, A.Y.: Preventing \u201coverfitting\u201d of cross-validation data. In: Fisher, D.H. (ed.) ICML, pp. 245\u2013253. Morgan Kaufmann, San Francisco (1997)"},{"key":"106_CR41","doi-asserted-by":"crossref","unstructured":"Prouff, E.: DPA attacks and S-boxes. In: Gilbert, H., Handschuh, H. (ed.) Fast Software Encryption, LNCS, vol. 3557. pp. 424\u2013441. Springer, Berlin, Heidelberg (2005)","DOI":"10.1007\/11502760_29"},{"key":"106_CR42","doi-asserted-by":"crossref","unstructured":"Rivain, M., Dottax, E., Prouff, E.: Block ciphers implementations provably secure against second order side channel analysis. In: Nyberg, K. (ed.) FSE, LNCS, vol. 5086, pp. 127\u2013143. Springer (2008)","DOI":"10.1007\/978-3-540-71039-4_8"},{"key":"106_CR43","unstructured":"Schapire, R. E.: The boosting approach to machine learning: an overview. In: MSRI Workshop on Nonlinear Estimation and Classification, Berkeley, CA, USA (2001)"},{"key":"106_CR44","doi-asserted-by":"crossref","unstructured":"Schindler, W., Lemke, K., Paar, C.: A stochastic model for differential side channel cryptanalysis. In: Rao, J.R., Sunar, B. (ed.) CHES, LNCS, vol. 3659, pp. 30\u201346. Springer (2005)","DOI":"10.1007\/11545262_3"},{"key":"106_CR45","doi-asserted-by":"crossref","unstructured":"Standaert, F-X., Malkin, T., Yung, M.: A unified framework for the analysis of side-channel key recovery attacks. In: Joux, A. (ed.) EUROCRYPT, LNCS, vol. 5479, pp. 443\u2013461. Springer (2009)","DOI":"10.1007\/978-3-642-01001-9_26"},{"issue":"15","key":"106_CR46","doi-asserted-by":"crossref","first-page":"1139","DOI":"10.1587\/elex.7.1139","volume":"7","author":"T Sugawara","year":"2010","unstructured":"Sugawara, T., Homma, N., Aoki, T., Satoh, A.: Profiling attack using multivariate regression analysis. IEICE Electron. Express 7(15), 1139\u20131144 (2010)","journal-title":"IEICE Electron. Express"},{"key":"106_CR47","unstructured":"Tibshirani, R.: Bias, variance, and prediction error for classification rules. Technical report, Statistics Department, University of Toronto, Toronto (1996)"},{"key":"106_CR48","doi-asserted-by":"crossref","DOI":"10.1002\/0471704091","volume-title":"Applied Linear Regression","author":"S Weisberg","year":"2005","unstructured":"Weisberg, S.: Applied Linear Regression. Wiley Series in Probability and Statistics, Wiley, New York (2005)"},{"key":"106_CR49","doi-asserted-by":"crossref","unstructured":"Whitnall, C., Oswald, E.: Profiling DPA: efficacy and efficiency trade-offs. In: Bertoni, G., Coron, J-S. (ed.) CHES, LNCS, vol. 8086, pp. 37\u201354. Springer (2013)","DOI":"10.1007\/978-3-642-40349-1_3"}],"container-title":["Journal of Cryptographic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-015-0106-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13389-015-0106-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-015-0106-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,27]],"date-time":"2019-08-27T15:06:46Z","timestamp":1566918406000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13389-015-0106-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,27]]},"references-count":49,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,11]]}},"alternative-id":["106"],"URL":"https:\/\/doi.org\/10.1007\/s13389-015-0106-1","relation":{},"ISSN":["2190-8508","2190-8516"],"issn-type":[{"value":"2190-8508","type":"print"},{"value":"2190-8516","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,6,27]]}}}