{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T17:12:32Z","timestamp":1760202752859,"version":"3.37.3"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,8,11]],"date-time":"2017-08-11T00:00:00Z","timestamp":1502409600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"SECODE: Security evaluation of Physically Attacked Cryptoprocessors in Embedded Systems"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptogr Eng"],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1007\/s13389-017-0170-9","type":"journal-article","created":{"date-parts":[[2017,8,11]],"date-time":"2017-08-11T06:23:58Z","timestamp":1502432638000},"page":"331-341","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Optimal side-channel attacks for multivariate leakages and multiple models"],"prefix":"10.1007","volume":"7","author":[{"given":"Nicolas","family":"Bruneau","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5044-3534","authenticated-orcid":false,"given":"Sylvain","family":"Guilley","sequence":"additional","affiliation":[]},{"given":"Annelie","family":"Heuser","sequence":"additional","affiliation":[]},{"given":"Damien","family":"Marion","sequence":"additional","affiliation":[]},{"given":"Olivier","family":"Rioul","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,11]]},"reference":[{"key":"170_CR1","doi-asserted-by":"publisher","unstructured":"Brier, \u00c9., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J. (eds.) Cryptographic Hardware and Embedded Systems\u2014CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11\u201313, 2004. Proceedings. Lecture Notes in Computer Science, vol. 3156, pp. 16\u201329. Springer (2004). doi:\n                        10.1007\/978-3-540-28632-5_2","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"170_CR2","doi-asserted-by":"publisher","unstructured":"Bruneau, N., Danger, J., Guilley, S., Heuser, A., Teglia, Y.: Boosting higher-order correlation attacks by dimensionality reduction. In: Chakraborty, R.S., Matyas, V., Schaumont, P. (eds.) Security, Privacy, and Applied Cryptography Engineering\u20144th International Conference, SPACE 2014, Pune, India, October 18\u201322, 2014. Proceedings. Lecture Notes in Computer Science, vol. 8804, pp. 183\u2013200. Springer (2014). doi:\n                        10.1007\/978-3-319-12060-7_13","DOI":"10.1007\/978-3-319-12060-7_13"},{"key":"170_CR3","doi-asserted-by":"publisher","unstructured":"Bruneau, N., Guilley, S., Heuser, A., Marion, D., Rioul, O.: Less is more\u2014dimensionality reduction from a theoretical perspective. In: G\u00fcneysu, T., Handschuh, H. (eds.) Cryptographic Hardware and Embedded Systems\u2014CHES 2015\u201417th International Workshop, Saint-Malo, France, September 13\u201316, 2015, Proceedings. Lecture Notes in Computer Science, vol. 9293, pp. 22\u201341. Springer (2015). doi:\n                        10.1007\/978-3-662-48324-4_2","DOI":"10.1007\/978-3-662-48324-4_2"},{"key":"170_CR4","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: CHES. LNCS, vol. 2523, pp. 13\u201328. Springer (2002). San Francisco Bay (Redwood City), USA"},{"key":"170_CR5","doi-asserted-by":"publisher","unstructured":"Choudary, O., Kuhn, M.G.: Efficient template attacks. In: Francillon, A., Rohatgi, P. (eds.) Smart Card Research and Advanced Applications\u201412th International Conference, CARDIS 2013, Berlin, Germany, November 27\u201329, 2013. Revised Selected Papers. LNCS, vol. 8419, pp. 253\u2013270. Springer (2013). doi:\n                        10.1007\/978-3-319-08302-5_17","DOI":"10.1007\/978-3-319-08302-5_17"},{"issue":"8","key":"170_CR6","doi-asserted-by":"crossref","first-page":"1629","DOI":"10.1109\/TC.2012.112","volume":"62","author":"G Dabosville","year":"2013","unstructured":"Dabosville, G., Doget, J., Prouff, E.: A new second-order side channel attack based on linear regression. IEEE Trans. Comput. 62(8), 1629\u20131640 (2013)","journal-title":"IEEE Trans. Comput."},{"issue":"2","key":"170_CR7","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/s13389-011-0010-2","volume":"1","author":"J Doget","year":"2011","unstructured":"Doget, J., Prouff, E., Rivain, M., Standaert, F.X.: Univariate side channel attacks and leakage modeling. J. Cryptogr. Eng. 1(2), 123\u2013144 (2011)","journal-title":"J. Cryptogr. Eng."},{"key":"170_CR8","doi-asserted-by":"crossref","unstructured":"Gierlichs, B., Lemke-Rust, K., Paar, C.: Templates vs. stochastic methods. In: CHES. LNCS, vol. 4249, pp. 15\u201329. Springer (2006). Yokohama, Japan","DOI":"10.1007\/11894063_2"},{"key":"170_CR9","doi-asserted-by":"publisher","unstructured":"Glowacz, C., Grosso, V., Poussier, R., Sch\u00fcth, J., Standaert, F.: Simpler and more efficient rank estimation for side-channel security assessment. In: Leander, G. (ed.) Fast Software Encryption\u201422nd International Workshop, FSE 2015, Istanbul, Turkey, March 8\u201311, 2015, Revised Selected Papers. Lecture Notes in Computer Science, vol. 9054, pp. 117\u2013129. Springer (2015). doi:\n                        10.1007\/978-3-662-48116-5_6","DOI":"10.1007\/978-3-662-48116-5_6"},{"key":"170_CR10","doi-asserted-by":"publisher","unstructured":"Heuser, A., Rioul, O., Guilley, S.: Good is not good enough\u2014deriving optimal distinguishers from communication theory. In: Batina, L., Robshaw, M. (eds.) Cryptographic Hardware and Embedded Systems\u2014CHES 2014\u201416th International Workshop, Busan, South Korea, September 23\u201326, 2014. Proceedings. Lecture Notes in Computer Science, vol. 8731, pp. 55\u201374. Springer (2014). doi:\n                        10.1007\/978-3-662-44709-3_4","DOI":"10.1007\/978-3-662-44709-3_4"},{"key":"170_CR11","doi-asserted-by":"crossref","unstructured":"Lomn\u00e9, V., Prouff, E., Roche, T.: Behind the scene of side channel attacks. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT (1). Lecture Notes in Computer Science, vol. 8269, pp. 506\u2013525. Springer (2013)","DOI":"10.1007\/978-3-642-42033-7_26"},{"key":"170_CR12","unstructured":"Mahalanobis, P.C.: On the generalised distance in statistics. In: Proceedings of the National Institute of Sciences of India, vol. 2, no. (1), pp. 49\u201455 (1936). \n                        http:\/\/ir.isical.ac.in\/dspace\/handle\/1\/1268"},{"key":"170_CR13","doi-asserted-by":"publisher","unstructured":"Mather, L., Oswald, E., Whitnall, C.: Multi-target DPA attacks: pushing DPA beyond the limits of a desktop computer. In: Sarkar and Iwata [14], pp. 243\u2013261. doi:\n                        10.1007\/978-3-662-45611-8_13","DOI":"10.1007\/978-3-662-45611-8_13"},{"key":"170_CR14","doi-asserted-by":"crossref","unstructured":"Schindler, W., Lemke, K., Paar, C.: A stochastic model for differential side channel cryptanalysis. In: LNCS (ed.) CHES. LNCS, vol. 3659, pp. 30\u201346. Springer (2005). Edinburgh, Scotland, UK","DOI":"10.1007\/11545262_3"},{"key":"170_CR15","doi-asserted-by":"publisher","unstructured":"Sugawara, T., Homma, N., Aoki, T., Satoh, A.: Profiling attack using multivariate regression analysis. IEICE Electron. Express 7(15), 1139\u20131144 (2010). doi:\n                        10.1587\/elex.7.1139","DOI":"10.1587\/elex.7.1139"},{"key":"170_CR16","unstructured":"TELECOM ParisTech SEN Research Group: DPA Contest (4th edition) (2013\u20132014). \n                        http:\/\/www.DPAcontest.org\/v4\/"},{"key":"170_CR17","doi-asserted-by":"crossref","unstructured":"Veyrat-Charvillon, N., G\u00e9rard, B., Renauld, M., Standaert, F.X.: An optimal key enumeration algorithm and its application to side-channel attacks. In: Knudsen, L.R., Wu, H. (eds.) Selected Areas in Cryptography. Lecture Notes in Computer Science, vol. 7707, pp. 390\u2013406. Springer (2012)","DOI":"10.1007\/978-3-642-35999-6_25"},{"key":"170_CR18","doi-asserted-by":"publisher","unstructured":"Veyrat-Charvillon, N., G\u00e9rard, B., Standaert, F.: Soft analytical side-channel attacks. In: Sarkar and Iwata [14], pp. 282\u2013296. doi:\n                        10.1007\/978-3-662-45611-8_15","DOI":"10.1007\/978-3-662-45611-8_15"}],"container-title":["Journal of Cryptographic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13389-017-0170-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-017-0170-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-017-0170-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,5]],"date-time":"2017-10-05T14:55:57Z","timestamp":1507215357000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13389-017-0170-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,11]]},"references-count":18,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,11]]}},"alternative-id":["170"],"URL":"https:\/\/doi.org\/10.1007\/s13389-017-0170-9","relation":{},"ISSN":["2190-8508","2190-8516"],"issn-type":[{"type":"print","value":"2190-8508"},{"type":"electronic","value":"2190-8516"}],"subject":[],"published":{"date-parts":[[2017,8,11]]}}}