{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T12:08:08Z","timestamp":1777723688775,"version":"3.51.4"},"reference-count":65,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,11,30]],"date-time":"2019-11-30T00:00:00Z","timestamp":1575072000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,11,30]],"date-time":"2019-11-30T00:00:00Z","timestamp":1575072000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptogr Eng"],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1007\/s13389-019-00220-8","type":"journal-article","created":{"date-parts":[[2019,12,2]],"date-time":"2019-12-02T12:04:44Z","timestamp":1575288284000},"page":"163-188","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":247,"title":["Deep learning for side-channel analysis and introduction to ASCAD database"],"prefix":"10.1007","volume":"10","author":[{"given":"Ryad","family":"Benadjila","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3998-0478","authenticated-orcid":false,"given":"Emmanuel","family":"Prouff","sequence":"additional","affiliation":[]},{"given":"R\u00e9mi","family":"Strullu","sequence":"additional","affiliation":[]},{"given":"Eleonora","family":"Cagli","sequence":"additional","affiliation":[]},{"given":"C\u00e9cile","family":"Dumas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,30]]},"reference":[{"key":"220_CR1","unstructured":"Abadi, M., Agarwal, A., Barham, P., Brevdo, E., Chen, Z., Citro, C., Corrado, G.S., Davis, A., Dean, J., Devin, M., Ghemawat, S., Goodfellow, I., Harp, A., Irving, G., Isard, M., Jia, Y., Jozefowicz, R., Kaiser, L., Kudlur, M., Levenberg, J., Man\u00e9, D., Monga, R., Moore, S., Murray, D., Olah, C., Schuster, M., Shlens, J., Steiner, B., Sutskever, I., Talwar, K., Tucker, P., Vanhoucke, V., Vasudevan, V., Vi\u00e9gas, F., Vinyals, O., Warden, P., Wattenberg, M., Wicke, M., Yu, Y., Zheng, X.: TensorFlow: Large-scale machine learning on heterogeneous systems (2015). https:\/\/www.tensorflow.org\/. Software available from tensorflow.org"},{"key":"220_CR2","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/3-540-44709-1_26","volume-title":"Cryptographic Hardware and Embedded Systems\u2013CHES 2001. Lecture Notes in Computer Science","author":"ML Akkar","year":"2001","unstructured":"Akkar, M.L., Giraud, C.: An Implementation of DES and AES, Secure against Some Attacks. In: \u00c7.\u00a0Ko\u00e7, D., Naccache, D., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems\u2013CHES 2001. Lecture Notes in Computer Science, vol. 2162, pp. 309\u2013318. Springer, Berlin (2001)"},{"key":"220_CR3","unstructured":"ANSSI: Ascad database (2018). https:\/\/github.com\/ANSSI-FR\/ASCAD"},{"key":"220_CR4","unstructured":"ANSSI: secaes-atmega8515 (2018). https:\/\/github.com\/ANSSI-FR\/secAES-ATmega8515"},{"key":"220_CR5","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/978-3-642-37288-9_18","volume-title":"Smart Card Research and Advanced Applications CARDIS. Lecture Notes in Computer Science","author":"T Bartkewitz","year":"2013","unstructured":"Bartkewitz, T., Lemke-Rust, K.: Efficient template attacks based on probabilistic multi-class support vector machines. In: Mangard, S. (ed.) Smart Card Research and Advanced Applications CARDIS. Lecture Notes in Computer Science, vol. 7771, pp. 263\u2013276. Springer, Berlin (2013). https:\/\/doi.org\/10.1007\/978-3-642-37288-9_18"},{"key":"220_CR6","doi-asserted-by":"crossref","unstructured":"Bengio, Y., Grandvalet, Y.: Bias in estimating the variance of k-fold cross-validation. In: Duchesne, P., R\u00e9millard, B. (eds.) Statistical modeling and analysis for complex data problems, pp. 75\u201395. Springer, Berlin (2005)","DOI":"10.1007\/0-387-24555-3_5"},{"issue":"(Feb)","key":"220_CR7","first-page":"281","volume":"13","author":"J Bergstra","year":"2012","unstructured":"Bergstra, J., Bengio, Y.: Random search for hyper-parameter optimization. J. Mach. Learn. Res. 13((Feb)), 281\u2013305 (2012)","journal-title":"J. Mach. Learn. Res."},{"key":"220_CR8","doi-asserted-by":"crossref","unstructured":"Bergstra, J., Yamins, D., Cox, D.D.: Hyperopt: a python library for optimizing the hyperparameters of machine learning algorithms. In: Proceedings of the 12th Python in Science Conference, pp. 13\u201320 (2013)","DOI":"10.25080\/Majora-8b375195-003"},{"key":"220_CR9","volume-title":"Pattern Recognition and Machine Learning","author":"CM Bishop","year":"2006","unstructured":"Bishop, C.M.: Pattern Recognition and Machine Learning. Springer, Berlin (2006)"},{"issue":"6","key":"220_CR10","doi-asserted-by":"publisher","first-page":"2350","DOI":"10.1214\/aos\/1032181158","volume":"24","author":"L Breiman","year":"1996","unstructured":"Breiman, L., et al.: Heuristics of instability and stabilization in model selection. Ann. Stat. 24(6), 2350\u20132383 (1996)","journal-title":"Ann. Stat."},{"key":"220_CR11","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","volume-title":"Cryptographic Hardware and Embedded Systems\u2013CHES 2004. Lecture Notes in Computer Science","author":"E Brier","year":"2004","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.J. (eds.) Cryptographic Hardware and Embedded Systems\u2013CHES 2004. Lecture Notes in Computer Science, vol. 3156, pp. 16\u201329. Springer, Berlin (2004)"},{"key":"220_CR12","doi-asserted-by":"publisher","unstructured":"Cagli, E., Dumas, C., Prouff, E.: Kernel discriminant analysis for information extraction in the presence of masking. In: K.\u00a0Lemke-Rust, M.\u00a0Tunstall (eds.) Smart Card Research and Advanced Applications-15th International Conference, CARDIS 2016, Cannes, France, 7\u20139 November 2016, Revised Selected Papers, Lecture Notes in Computer Science, vol. 10146, pp. 1\u201322. Springer, Berlin (2016). https:\/\/doi.org\/10.1007\/978-3-319-54669-8_1","DOI":"10.1007\/978-3-319-54669-8_1"},{"key":"220_CR13","doi-asserted-by":"publisher","unstructured":"Cagli, E., Dumas, C., Prouff, E.: Convolutional neural networks with data augmentation against jitter-based countermeasures - profiling attacks without pre-processing. In: W.\u00a0Fischer, N.\u00a0Homma (eds.) Cryptographic Hardware and Embedded Systems-CHES 2017-19th International Conference, Taipei, Taiwan, September 25\u201328 2017, Proceedings, Lecture Notes in Computer Science, vol. 10529, pp. 45\u201368. Springer, Berlin (2017). https:\/\/doi.org\/10.1007\/978-3-319-66787-4_3","DOI":"10.1007\/978-3-319-66787-4_3"},{"key":"220_CR14","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-36400-5_3","volume-title":"Cryptographic Hardware and Embedded Systems-CHES 2002. Lecture Notes in Computer Science","author":"S Chari","year":"2002","unstructured":"Chari, S., Rao, J., Rohatgi, P.: Template attacks. In: Kaliski Jr., B., Ko\u00e7, \u00c7., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems-CHES 2002. Lecture Notes in Computer Science, vol. 2523, pp. 13\u201329. Springer, Berlin (2002)"},{"key":"220_CR15","unstructured":"Chollet, F., et\u00a0al.: Keras (2015). https:\/\/github.com\/fchollet\/keras"},{"issue":"3","key":"220_CR16","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/BF00994018","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273\u2013297 (1995). https:\/\/doi.org\/10.1007\/BF00994018","journal-title":"Mach. Learn."},{"issue":"2","key":"220_CR17","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/s13389-011-0010-2","volume":"1","author":"J Doget","year":"2011","unstructured":"Doget, J., Prouff, E., Rivain, M., Standaert, F.X.: Univariate side channel attacks and leakage modeling. J. Cryptogr. Eng. 1(2), 123\u2013144 (2011)","journal-title":"J. Cryptogr. Eng."},{"key":"220_CR18","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1098\/rsta.1922.0009","volume":"222","author":"RA Fisher","year":"1922","unstructured":"Fisher, R.A.: On the mathematical foundations of theoretical statistics. Philos. Trans. R. Soc. Lond. Ser. A. 222, 309\u2013368 (1922). https:\/\/doi.org\/10.1098\/rsta.1922.0009","journal-title":"Philos. Trans. R. Soc. Lond. Ser. A."},{"issue":"7","key":"220_CR19","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1111\/j.1469-1809.1936.tb02137.x","volume":"7","author":"RA Fisher","year":"1936","unstructured":"Fisher, R.A.: The use of multiple measurements in taxonomic problems. Ann. Eugen. 7(7), 179\u2013188 (1936)","journal-title":"Ann. Eugen."},{"key":"220_CR20","volume-title":"The Elements of Statistical Learning. Springer Series in Statistics","author":"J Friedman","year":"2001","unstructured":"Friedman, J., Hastie, T., Tibshirani, R.: The Elements of Statistical Learning. Springer Series in Statistics, vol. 1. Springer, New York (2001)"},{"key":"220_CR21","doi-asserted-by":"publisher","unstructured":"Gilmore, R., Hanley, N., O\u2019Neill, M.: Neural network based attack on a masked implementation of AES. In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5\u20137 May 2015, pp. 106\u2013111. IEEE Computer Society (2015). https:\/\/doi.org\/10.1109\/HST.2015.7140247","DOI":"10.1109\/HST.2015.7140247"},{"key":"220_CR22","unstructured":"Glorot, X., Bengio, Y.: Understanding the difficulty of training deep feedforward neural networks. In: Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, pp. 249\u2013256 (2010)"},{"key":"220_CR23","unstructured":"Glorot, X., Bordes, A., Bengio, Y.: Deep sparse rectifier neural networks. In: Proceedings of the Fourteenth International Conference on Artificial Intelligence and Statistics, pp. 315\u2013323 (2011)"},{"key":"220_CR24","volume-title":"Deep Learning","author":"I Goodfellow","year":"2016","unstructured":"Goodfellow, I., Bengio, Y., Courville, A.: Deep Learning. MIT Press, Cambridge (2016)"},{"key":"220_CR25","volume-title":"Deep Learning. Adaptive Computation and Machine Learning","author":"IJ Goodfellow","year":"2016","unstructured":"Goodfellow, I.J., Bengio, Y., Courville, A.C.: Deep Learning. Adaptive Computation and Machine Learning. MIT Press, Cambridge (2016)"},{"key":"220_CR26","unstructured":"Group, H.: The hdf group. https:\/\/www.hdfgroup.org\/"},{"key":"220_CR27","unstructured":"Group, H.: HDF5 For Python. http:\/\/www.h5py.org\/"},{"key":"220_CR28","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"220_CR29","doi-asserted-by":"publisher","unstructured":"Heuser, A., Zohner, M.: Intelligent machine homicide-breaking cryptographic devices using support vector machines. In: W.\u00a0Schindler, S.A. Huss (eds.) Constructive Side-Channel Analysis and Secure Design-Third International Workshop, COSADE 2012, Darmstadt, Germany, 3\u20134 May 2012. Proceedings, Lecture Notes in Computer Science, vol. 7275, pp. 249\u2013264. Springer, Berlin (2012). https:\/\/doi.org\/10.1007\/978-3-642-29912-4_18","DOI":"10.1007\/978-3-642-29912-4_18"},{"issue":"4","key":"220_CR30","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/s13389-011-0023-x","volume":"1","author":"G Hospodar","year":"2011","unstructured":"Hospodar, G., Gierlichs, B., Mulder, E.D., Verbauwhede, I., Vandewalle, J.: Machine learning in side-channel analysis: a first study. J. Cryptogr. Eng. 1(4), 293\u2013302 (2011). https:\/\/doi.org\/10.1007\/s13389-011-0023-x","journal-title":"J. Cryptogr. Eng."},{"key":"220_CR31","unstructured":"Ioffe, S., Szegedy, C.: Batch normalization: accelerating deep network training by reducing internal covariate shift. CoRR (2015). arXiv:1502.03167"},{"key":"220_CR32","doi-asserted-by":"crossref","unstructured":"Jarrett, K., Kavukcuoglu, K., LeCun, Y., et\u00a0al.: What is the best multi-stage architecture for object recognition? In: 2009 IEEE 12th International Conference on Computer Vision, pp. 2146\u20132153. IEEE (2009)","DOI":"10.1109\/ICCV.2009.5459469"},{"key":"220_CR33","unstructured":"Klambauer, G., Unterthiner, T., Mayr, A., Hochreiter, S.: Self-normalizing neural networks (2017). arXiv preprint arXiv:1706.02515"},{"key":"220_CR34","first-page":"388","volume-title":"Advances in Cryptology-CRYPTO\u201999. Lecture Notes in Computer Science","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) Advances in Cryptology-CRYPTO\u201999. Lecture Notes in Computer Science, vol. 1666, pp. 388\u2013397. Springer, Berlin (1999)"},{"key":"220_CR35","doi-asserted-by":"publisher","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. Commun. ACM 60(6), 84\u201390 (2017). https:\/\/doi.org\/10.1145\/3065386","DOI":"10.1145\/3065386"},{"issue":"10","key":"220_CR36","first-page":"1995","volume":"3361","author":"Y LeCun","year":"1995","unstructured":"LeCun, Y., Bengio, Y., et al.: Convolutional networks for images, speech, and time series. The Handbook of Brain Theory and Neural Networks 3361(10), 1995 (1995)","journal-title":"The Handbook of Brain Theory and Neural Networks"},{"issue":"4","key":"220_CR37","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1162\/neco.1989.1.4.541","volume":"1","author":"Y LeCun","year":"1989","unstructured":"LeCun, Y., Boser, B., Denker, J.S., Henderson, D., Howard, R.E., Hubbard, W., Jackel, L.D.: Backpropagation applied to handwritten zip code recognition. Neural Comput. 1(4), 541\u2013551 (1989)","journal-title":"Neural Comput."},{"issue":"11","key":"220_CR38","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y LeCun","year":"1998","unstructured":"LeCun, Y., Bottou, L., Bengio, Y., Haffner, P.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278\u20132324 (1998)","journal-title":"Proc. IEEE"},{"key":"220_CR39","unstructured":"LeCun, Y., Cortes, C., Burges, C.J.: The MNIST database of handwritten digits. http:\/\/yann.lecun.com\/exdb\/mnist\/"},{"key":"220_CR40","unstructured":"LeCun, Y., Huang, F.J.: Loss functions for discriminative training of energy-based models. In: R.G. Cowell, Z.\u00a0Ghahramani (eds.) Proceedings of the Tenth International Workshop on Artificial Intelligence and Statistics, AISTATS 2005, Bridgetown, Barbados, 6\u20138 January 2005. Society for Artificial Intelligence and Statistics (2005). http:\/\/www.gatsby.ucl.ac.uk\/aistats\/fullpapers\/207.pdf"},{"issue":"2","key":"220_CR41","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1504\/IJACT.2014.062722","volume":"3","author":"L Lerman","year":"2014","unstructured":"Lerman, L., Bontempi, G., Markowitch, O.: Power analysis attack: an approach based on machine learning. IJACT 3(2), 97\u2013115 (2014). https:\/\/doi.org\/10.1504\/IJACT.2014.062722","journal-title":"IJACT"},{"key":"220_CR42","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-319-08302-5_5","volume-title":"The Elements of Statistical Learning. Springer Series in Statistics","author":"L Lerman","year":"2014","unstructured":"Lerman, L., Medeiros, S.F., Bontempi, G., Markowitch, O.: A machine learning approach against a masked AES. In: Friedman, J., Hastie, T., Tibshirani, R. (eds.) The Elements of Statistical Learning. Springer Series in Statistics, vol. 1, pp. 61\u201375. Springer, New York (2014). https:\/\/doi.org\/10.1007\/978-3-319-08302-5_5"},{"key":"220_CR43","doi-asserted-by":"publisher","unstructured":"Lerman, L., Poussier, R., Bontempi, G., Markowitch, O., Standaert, F.: Template attacks vs. machine learning revisited (and the curse of dimensionality in side-channel analysis). In: S.\u00a0Mangard, A.Y. Poschmann (eds.) Constructive Side-Channel Analysis and Secure Design-6th International Workshop, COSADE 2015, Berlin, Germany, 13\u201314 April 2015. Revised Selected Papers, Lecture Notes in Computer Science, vol. 9064, pp. 20\u201333. Springer, Berlin (2015). https:\/\/doi.org\/10.1007\/978-3-319-21476-4_2","DOI":"10.1007\/978-3-319-21476-4_2"},{"key":"220_CR44","doi-asserted-by":"publisher","unstructured":"Maghrebi, H., Portigliatti, T., Prouff, E.: Breaking cryptographic implementations using deep learning techniques. In: C.\u00a0Carlet, M.A. Hasan, V.\u00a0Saraswat (eds.) Security, Privacy, and Applied Cryptography Engineering-6th International Conference, SPACE 2016, Hyderabad, India, 14\u201318 December 2016. Proceedings, Lecture Notes in Computer Science, vol. 10076, pp. 3\u201326. Springer, Berlin (2016). https:\/\/doi.org\/10.1007\/978-3-319-49445-6_1","DOI":"10.1007\/978-3-319-49445-6_1"},{"key":"220_CR45","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/11545262_12","volume-title":"Cryptographic Hardware and Embedded Systems-CHES 2005. Lecture Notes in Computer Science","author":"S Mangard","year":"2005","unstructured":"Mangard, S., Pramstaller, N., Oswald, E.: Successfully attacking masked AES hardware implementations. In: Rao, J., Sunar, B. (eds.) Cryptographic Hardware and Embedded Systems-CHES 2005. Lecture Notes in Computer Science, vol. 3659, pp. 157\u2013171. Springer, Berlin (2005)"},{"key":"220_CR46","doi-asserted-by":"publisher","unstructured":"Martinasek, Z., Dzurenda, P., Malina, L.: Profiling power analysis attack based on MLP in DPA contest V4.2. In: 39th International Conference on Telecommunications and Signal Processing, TSP 2016, Vienna, Austria, 27\u201329 June 2016, pp. 223\u2013226. IEEE (2016). https:\/\/doi.org\/10.1109\/TSP.2016.7760865","DOI":"10.1109\/TSP.2016.7760865"},{"key":"220_CR47","doi-asserted-by":"publisher","unstructured":"Martinasek, Z., Hajny, J., Malina, L.: Optimization of power analysis using neural network. In: Francillon, A., Rohatgi, P. (eds.) Smart Card Research and Advanced Applications-12th International Conference, CARDIS 2013, Berlin, Germany, 27\u201329 November 2013. Revised Selected Papers, Lecture Notes in Computer Science, vol. 8419, pp. 94\u2013107. Springer, Berlin. https:\/\/doi.org\/10.1007\/978-3-319-08302-5_7","DOI":"10.1007\/978-3-319-08302-5_7"},{"key":"220_CR48","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/978-3-319-15765-8_18","volume":"343","author":"Z Martinasek","year":"2015","unstructured":"Martinasek, Z., Malina, L., Trasy, K.: Profiling power analysis attack based on multi-layer perceptron network. Comput. Probl. Sci. Eng. 343, 317 (2015)","journal-title":"Comput. Probl. Sci. Eng."},{"key":"220_CR49","unstructured":"McAllester, D.A., Hazan, T., Keshet, J.: Direct loss minimization for structured prediction. In: J.D. Lafferty, C.K.I. Williams, J.\u00a0Shawe-Taylor, R.S. Zemel, A.\u00a0Culotta (eds.) Advances in Neural Information Processing Systems 23: 24th Annual Conference on Neural Information Processing Systems 2010. Proceedings of a Meeting Held 6\u20139 December 2010, Vancouver, British Columbia, Canada, pp. 1594\u20131602. Curran Associates, Inc., Red Hook (2010). http:\/\/papers.nips.cc\/paper\/4069-direct-loss-minimization-for-structured-prediction"},{"key":"220_CR50","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/3-540-44499-8_19","volume-title":"Cryptographic Hardware and Embedded Systems-CHES 2000. Lecture Notes in Computer Science","author":"T Messerges","year":"2000","unstructured":"Messerges, T.: Using second-order power analysis to attack DPA resistant software. In: Ko\u00e7, \u00c7., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems-CHES 2000. Lecture Notes in Computer Science, vol. 1965, pp. 238\u2013251. Springer, Berlin (2000)"},{"key":"220_CR51","first-page":"807","volume-title":"Proceedings of the 27th International Conference on Machine Learning (ICML-10), 21\u201324 June 2010, Haifa, Israel","author":"V Nair","year":"2010","unstructured":"Nair, V., Hinton, G.E.: Rectified linear units improve restricted Boltzmann machines. In: F\u00fcrnkranz, J., Joachims, T. (eds.) Proceedings of the 27th International Conference on Machine Learning (ICML-10), 21\u201324 June 2010, Haifa, Israel, pp. 807\u2013814. Omnipress, Madison (2010)"},{"key":"220_CR52","doi-asserted-by":"publisher","unstructured":"O\u2019Flynn, C., Chen, Z.D.: Chipwhisperer: An open-source platform for hardware embedded security research. In: E.\u00a0Prouff (ed.) Constructive Side-Channel Analysis and Secure Design-5th International Workshop, COSADE 2014, Paris, France, 13\u201315 April 2014. Revised Selected Papers, Lecture Notes in Computer Science, vol. 8622, pp. 243\u2013260. Springer, Berlin (2014). https:\/\/doi.org\/10.1007\/978-3-319-10175-0_17","DOI":"10.1007\/978-3-319-10175-0_17"},{"issue":"11","key":"220_CR53","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1080\/14786440109462720","volume":"2","author":"K Pearson","year":"1901","unstructured":"Pearson, K.: On lines and planes of closest fit to systems of points in space. Philos. Mag. 2(11), 559\u2013572 (1901)","journal-title":"Philos. Mag."},{"key":"220_CR54","unstructured":"Picek, S., Samiotis, I.P., Heuser, A., Kim, J., Bhasin, S., Legay, A.: On the Performance of Deep Learning for Side-channel Analysis. IACR Cryptology. ePrint Archive 2018, 004 (2018). http:\/\/eprint.iacr.org\/2018\/004"},{"key":"220_CR55","first-page":"227","volume-title":"WISA. Lecture Notes in Computer Science","author":"E Prouff","year":"2008","unstructured":"Prouff, E., Rivain, M.: A generic method for secure SBox implementation. In: Kim, S., Yung, M., Lee, H.W. (eds.) WISA. Lecture Notes in Computer Science, vol. 4867, pp. 227\u2013244. Springer, Berlin (2008)"},{"key":"220_CR56","volume-title":"Data Mining with Decision Trees: Theroy and Applications","author":"L Rokach","year":"2008","unstructured":"Rokach, L., Maimon, O.: Data Mining with Decision Trees: Theroy and Applications. World Scientific Publishing Co., Inc, River Edge (2008)"},{"issue":"3","key":"220_CR57","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11263-015-0816-y","volume":"115","author":"O Russakovsky","year":"2015","unstructured":"Russakovsky, O., Deng, J., Su, H., Krause, J., Satheesh, S., Ma, S., Huang, Z., Karpathy, A., Khosla, A., Bernstein, M., et al.: Imagenet large scale visual recognition challenge. Int. J. Comput. Vis. 115(3), 211\u2013252 (2015)","journal-title":"Int. J. Comput. Vis."},{"key":"220_CR58","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1515\/JMC.2008.013","volume":"2","author":"W Schindler","year":"2008","unstructured":"Schindler, W.: Advanced stochastic methods in side channel analysis on block ciphers in the presence of masking. J. Math. Cryptol. 2, 291\u2013310 (2008)","journal-title":"J. Math. Cryptol."},{"key":"220_CR59","volume-title":"Cryptographic Hardware and Embedded Systems\u2013CHES 2005. Lecture Notes in Computer Science","author":"W Schindler","year":"2005","unstructured":"Schindler, W., Lemke, K., Paar, C.: A Stochastic model for differential side channel cryptanalysis. In: Rao, J., Sunar, B. (eds.) Cryptographic Hardware and Embedded Systems\u2013CHES 2005. Lecture Notes in Computer Science, vol. 3659. Springer, Berlin (2005)"},{"key":"220_CR60","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition (2014). arXiv preprint arXiv:1409.1556"},{"key":"220_CR61","unstructured":"Song, Y., Schwing, A.G., Zemel, R.S., Urtasun, R.: Direct loss minimization for training deep neural nets. CoRR (2015). arXiv:1511.06411"},{"key":"220_CR62","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Liu, W., Jia, Y., Sermanet, P., Reed, S., Anguelov, D., Erhan, D., Vanhoucke, V., Rabinovich, A.: Going deeper with convolutions. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1\u20139 (2015)","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"220_CR63","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., Wojna, Z.: Rethinking the inception architecture for computer vision. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2818\u20132826 (2016)","DOI":"10.1109\/CVPR.2016.308"},{"key":"220_CR64","unstructured":"Weston, J., Watkins, C.: Multi-class support vector machines. Technical Report CSD-TR-98-04, Royal Holloway, University of London (1998)"},{"key":"220_CR65","doi-asserted-by":"crossref","unstructured":"Zeiler, M.D., Fergus, R.: Visualizing and understanding convolutional networks. In: European Conference on Computer Vision, pp. 818\u2013833. Springer (2014)","DOI":"10.1007\/978-3-319-10590-1_53"}],"container-title":["Journal of Cryptographic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-019-00220-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13389-019-00220-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-019-00220-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,29]],"date-time":"2020-11-29T00:26:26Z","timestamp":1606609586000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13389-019-00220-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,30]]},"references-count":65,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["220"],"URL":"https:\/\/doi.org\/10.1007\/s13389-019-00220-8","relation":{},"ISSN":["2190-8508","2190-8516"],"issn-type":[{"value":"2190-8508","type":"print"},{"value":"2190-8516","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,30]]},"assertion":[{"value":"25 August 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 November 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 November 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}