{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T15:50:32Z","timestamp":1778169032896,"version":"3.51.4"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,5,28]],"date-time":"2023-05-28T00:00:00Z","timestamp":1685232000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,5,28]],"date-time":"2023-05-28T00:00:00Z","timestamp":1685232000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"NWO","award":["NWA.1215.18.014"],"award-info":[{"award-number":["NWA.1215.18.014"]}]},{"name":"NWO","award":["CS.019"],"award-info":[{"award-number":["CS.019"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptogr Eng"],"published-print":{"date-parts":[[2023,9]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Deep learning is a powerful direction for profiling side-channel analysis as it can break targets protected with countermeasures even with a relatively small number of attack traces. Still, it is necessary to conduct hyperparameter tuning to reach strong attack performance, which can be far from trivial. Besides many options stemming from the machine learning domain, recent years also brought neural network elements specially designed for side-channel analysis. The loss function, which calculates the error or loss between the actual and desired output, is one of the most important neural network elements. The resulting loss values guide the weights update associated with the connections between the neurons or filters of the deep learning neural network. Unfortunately, despite being a highly relevant hyperparameter, there are no systematic comparisons among different loss functions regarding their effectiveness in side-channel attacks. This work provides a detailed study of the efficiency of different loss functions in the SCA context. We evaluate five loss functions commonly used in machine learning and three loss functions specifically designed for SCA. Our results show that an SCA-specific loss function (called CER) performs very well and outperforms other loss functions in most evaluated settings. Still, categorical cross-entropy represents a good option, especially considering the variety of neural network architectures.\n<\/jats:p>","DOI":"10.1007\/s13389-023-00320-6","type":"journal-article","created":{"date-parts":[[2023,5,28]],"date-time":"2023-05-28T13:01:31Z","timestamp":1685278891000},"page":"311-324","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["No (good) loss no gain: systematic evaluation of loss functions in deep learning-based side-channel analysis"],"prefix":"10.1007","volume":"13","author":[{"given":"Maikel","family":"Kerkhof","sequence":"first","affiliation":[]},{"given":"Lichao","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Guilherme","family":"Perin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7509-4337","authenticated-orcid":false,"given":"Stjepan","family":"Picek","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,28]]},"reference":[{"key":"320_CR1","doi-asserted-by":"crossref","unstructured":"Acharya, M.S., Armaan, A., Antony, A.S.: A comparison of regression models for prediction of graduate admissions. In: 2019 International Conference on Computational Intelligence in Data Science (ICCIDS), pp. 1\u20135. IEEE (2019)","DOI":"10.1109\/ICCIDS.2019.8862140"},{"key":"320_CR2","doi-asserted-by":"crossref","unstructured":"Barz, B., Denzler, J.: Deep learning on small datasets without pre-training using cosine loss. Tech. rep. (2020)","DOI":"10.1109\/WACV45572.2020.9093286"},{"issue":"2","key":"320_CR3","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s13389-019-00220-8","volume":"10","author":"R Benadjila","year":"2020","unstructured":"Benadjila, R., Prouff, E., Strullu, R., Cagli, E., Dumas, C.: Study of deep learning techniques for side-channel analysis and introduction to ASCAD database-long paper. J. Cryptogr. Eng. 10(2), 163\u2013188 (2020). https:\/\/doi.org\/10.1007\/s13389-019-00220-8","journal-title":"J. Cryptogr. Eng."},{"key":"320_CR4","doi-asserted-by":"publisher","unstructured":"Cagli, E., Dumas, C., Prouff, E.: Convolutional neural networks with data augmentation against jitter-based countermeasures-profiling attacks without pre-processing. In: International Conference on Cryptographic Hardware and Embedded Systems, pp. 45\u201368 (2017). https:\/\/doi.org\/10.1007\/978-3-319-66787-4_3","DOI":"10.1007\/978-3-319-66787-4_3"},{"key":"320_CR5","first-page":"265","volume":"2","author":"K Crammer","year":"2001","unstructured":"Crammer, K., Singer, Y.: On the algorithmic implementation of multiclass kernel-based vector machines. J. Mach. Learn. Res. 2, 265\u2013292 (2001)","journal-title":"J. Mach. Learn. Res."},{"key":"320_CR6","doi-asserted-by":"publisher","unstructured":"Hajiabadi, H., Babaiyan, V., Zabihzadeh, D., Hajiabadi, M.: Combination of loss functions for robust breast cancer prediction. Comput. Electr. Eng. (2020). https:\/\/doi.org\/10.1016\/j.compeleceng.2020.106624","DOI":"10.1016\/j.compeleceng.2020.106624"},{"issue":"4","key":"320_CR7","doi-asserted-by":"publisher","first-page":"751","DOI":"10.1007\/s13042-019-00982-x","volume":"11","author":"H Hajiabadi","year":"2020","unstructured":"Hajiabadi, H., Molla-Aliod, D., Monsefi, R., Yazdi, H.S.: Combination of loss functions for deep text classification. Int. J. Mach. Learn. Cybern. 11(4), 751\u2013761 (2020). https:\/\/doi.org\/10.1007\/s13042-019-00982-x","journal-title":"Int. J. Mach. Learn. Cybern."},{"key":"320_CR8","unstructured":"Kaiming He and Xiangyu Zhang and Shaoqing Ren and Jian Sun, Deep Residual Learning for Image Recognition, CoRR, abs\/1512.03385, (2015). http:\/\/arxiv.org\/abs\/1512.03385, arXiv:5120.3385. https:\/\/dblp.org\/rec\/journals\/corr\/HeZRS15"},{"key":"320_CR9","unstructured":"Ioffe, S., Szegedy, C.: Batch normalization: accelerating deep network training by reducing internal covariate shift (2015). http:\/\/arxiv.org\/abs\/1502.03167"},{"key":"320_CR10","doi-asserted-by":"crossref","unstructured":"Janocha, K., Czarnecki, W.M.: On loss functions for deep neural networks in classification. Tech. rep. (2017). https:\/\/arxiv.org\/abs\/1702.05659","DOI":"10.4467\/20838476SI.16.004.6185"},{"key":"320_CR11","doi-asserted-by":"publisher","unstructured":"Kerkhof, M., Wu, L., Perin, G., Picek, S.: Focus is key to success: a focal loss function for deep learning-based side-channel analysis. In: Balasch, J., O\u2019Flynn , C. (eds.) Constructive Side-Channel Analysis and Secure Design\u201413th International Workshop, COSADE 2022, Leuven, Belgium, April 11\u201312, 2022, Proceedings, Lecture Notes in Computer Science, vol. 13211, pp. 29\u201348. Springer (2022). https:\/\/doi.org\/10.1007\/978-3-030-99766-3_2","DOI":"10.1007\/978-3-030-99766-3_2"},{"key":"320_CR12","doi-asserted-by":"publisher","unstructured":"Kim, J., Picek, S., Heuser, A., Bhasin, S., Hanjalic, A.: Make some noise unleashing the power of convolutional neural networks for profiled side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(3), 148\u2013179 (2019). https:\/\/doi.org\/10.13154\/tches.v2019.i3.148-179. (ISSN 2569-2925)","DOI":"10.13154\/tches.v2019.i3.148-179"},{"key":"320_CR13","doi-asserted-by":"publisher","unstructured":"Kussul, N., Lavreniuk, M., Skakun, S., Shelestov, A.: Deep learning classification of land cover and crop types using remote sensing data. IEEE Geosci. Remote Sens. Lett. (2017). https:\/\/doi.org\/10.1109\/LGRS.2017.2681128","DOI":"10.1109\/LGRS.2017.2681128"},{"key":"320_CR14","doi-asserted-by":"crossref","unstructured":"Lin, T.Y., Goyal, P., Girshick, R.B., He, K., Doll\u00e1r, P.: Focal loss for dense object detection (2017). arXiv:1708.02002","DOI":"10.1109\/ICCV.2017.324"},{"key":"320_CR15","first-page":"578","volume":"2019","author":"H Maghrebi","year":"2019","unstructured":"Maghrebi, H.: Deep learning based side channel attacks in practice. IACR Cryptol. ePrint Arch. 2019, 578 (2019)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"320_CR16","doi-asserted-by":"crossref","unstructured":"Maghrebi, H., Portigliatti, T., Prouff, E.: Breaking cryptographic implementations using deep learning techniques. In: International Conference on Security, Privacy, and Applied Cryptography Engineering, pp. 3\u201326. Springer (2016)","DOI":"10.1007\/978-3-319-49445-6_1"},{"key":"320_CR17","doi-asserted-by":"publisher","unstructured":"Masure, L., Dumas, C., Prouff, E.: A Comprehensive Study of Deep Learning for Side-Channel Analysis (2019). IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020(1):348\u2013375 (2019). https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/8402https:\/\/doi.org\/10.13154\/tches.v2020.i1.348-375","DOI":"10.13154\/tches.v2020.i1.348-375"},{"key":"320_CR18","doi-asserted-by":"publisher","unstructured":"Moos, T., Wegener, F., Moradi, A.: Dl-la: Deep learning leakage assessment: a modern roadmap for SCA evaluations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3), 552\u2013598 (2021). https:\/\/doi.org\/10.46586\/tches.v2021.i3.552-598. https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/8986","DOI":"10.46586\/tches.v2021.i3.552-598"},{"key":"320_CR19","doi-asserted-by":"publisher","unstructured":"Perin, G., Chmielewski, L., Picek, S.: Strength in numbers: improving generalization with ensembles in machine learning-based profiled side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(4), 337\u2013364 (2020). https:\/\/doi.org\/10.13154\/tches.v2020.i4.337-364. https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/8686","DOI":"10.13154\/tches.v2020.i4.337-364"},{"key":"320_CR20","doi-asserted-by":"publisher","unstructured":"Perin, G., Picek, S.: On the influence of optimizers in deep learning-based side-channel analysis. In: Dunkelman, O., Jr., M.J.J., O\u2019Flynn, C. (eds.) Selected Areas in Cryptography\u2014SAC 2020\u201427th International Conference, Halifax, NS, Canada (Virtual Event), October 21\u201323, 2020, Revised Selected Papers, Lecture Notes in Computer Science, vol. 12804, pp. 615\u2013636. Springer (2020). https:\/\/doi.org\/10.1007\/978-3-030-81652-0_24","DOI":"10.1007\/978-3-030-81652-0_24"},{"key":"320_CR21","unstructured":"Philipp, G., Song, D., Carbonell, J.G.: The exploding gradient problem demystified - definition, prevalence, impact, origin, tradeoffs, and solutions (2017). arXiv:1712.05577"},{"key":"320_CR22","doi-asserted-by":"publisher","unstructured":"Picek, S., Heuser, A., Jovic, A., Bhasin, S., Regazzoni, F.: The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(1), 209\u2013237 (2018). https:\/\/doi.org\/10.13154\/tches.v2019.i1.209-237. https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/7339","DOI":"10.13154\/tches.v2019.i1.209-237"},{"key":"320_CR23","doi-asserted-by":"crossref","unstructured":"Picek, S., Samiotis, I.P., Kim, J., Heuser, A., Bhasin, S., Legay, A.: On the performance of convolutional neural networks for side-channel analysis. In: International Conference on Security, Privacy, and Applied Cryptography Engineering, pp. 157\u2013176. Springer (2018)","DOI":"10.1007\/978-3-030-05072-6_10"},{"key":"320_CR24","doi-asserted-by":"publisher","unstructured":"Rijsdijk, J., Wu, L., Perin, G., Picek, S.: Reinforcement learning for hyperparameter tuning in deep learning-based side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3), 677\u2013707 (2021). https:\/\/doi.org\/10.46586\/tches.v2021.i3.677-707","DOI":"10.46586\/tches.v2021.i3.677-707"},{"key":"320_CR25","doi-asserted-by":"crossref","unstructured":"Robissout, D., Zaid, G., Colombier, B., Bossuet, L., Habrard, A.: Online performance evaluation of deep learning networks for profiled side-channel analysis. In: Bertoni, G.M., Regazzoni, F. (eds.) Constructive Side-Channel Analysis and Secure Design, pp. 200\u2013218. Springer, Cham (2021)","DOI":"10.1007\/978-3-030-68773-1_10"},{"key":"320_CR26","doi-asserted-by":"publisher","unstructured":"Sammut, C., Webb, G.I. (eds.): Mean Squared Error, pp. 653\u2013653. Springer, Boston (2010). https:\/\/doi.org\/10.1007\/978-0-387-30164-8_528","DOI":"10.1007\/978-0-387-30164-8_528"},{"key":"320_CR27","doi-asserted-by":"crossref","unstructured":"Standaert, F.X., Malkin, T.G., Yung, M.: A unified framework for the analysis of side-channel key recovery attacks. In: Joux, A. (ed.) Advances in cryptology\u2014EUROCRYPT 2009, pp. 443\u2013461. Springer, Berlin Heidelberg (2009)","DOI":"10.1007\/978-3-642-01001-9_26"},{"key":"320_CR28","doi-asserted-by":"publisher","unstructured":"Timon, B.: Non-profiled deep learning-based side-channel attacks with sensitivity analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(2), 107\u2013131 (2019). https:\/\/doi.org\/10.13154\/tches.v2019.i2.107-131. https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/7387","DOI":"10.13154\/tches.v2019.i2.107-131"},{"key":"320_CR29","unstructured":"van\u00a0der Valk, D., Picek, S.: Bias-variance decomposition in machine learning-based side-channel analysis. Cryptology ePrint Archive, Paper 2019\/570 (2019). https:\/\/eprint.iacr.org\/2019\/570"},{"key":"320_CR30","doi-asserted-by":"publisher","DOI":"10.1007\/s40745-020-00253-5","author":"Q Wang","year":"2020","unstructured":"Wang, Q., Ma, Y., Zhao, K., Tian, Y.: A comprehensive survey of loss functions in machine learning. Ann. Data Sci. (2020). https:\/\/doi.org\/10.1007\/s40745-020-00253-5","journal-title":"Ann. Data Sci."},{"key":"320_CR31","doi-asserted-by":"publisher","unstructured":"Wouters, L., Arribas, V., Gierlichs, B., Preneel, B.: Revisiting a methodology for efficient CNN architectures in profiling attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3), 147\u2013168 (2020). https:\/\/doi.org\/10.13154\/tches.v2020.i3.147-168. https:\/\/github.com\/KULeuven-COSIC\/TCHES20V3_CNN_SCA","DOI":"10.13154\/tches.v2020.i3.147-168"},{"key":"320_CR32","doi-asserted-by":"publisher","unstructured":"Wu, L., Perin, G., Picek, S.: I choose you: Automated hyperparameter tuning for deep learning-based side-channel analysis. IEEE Transactions on Emerging Topics in Computing. Cryptology ePrint Archive (2022) p. 1\u201312, https:\/\/doi.org\/10.1109\/TETC.2022.3218372","DOI":"10.1109\/TETC.2022.3218372"},{"key":"320_CR33","doi-asserted-by":"crossref","unstructured":"Srivastava, Y., Murali, V., Dubey, S.R.: A performance evaluation of loss functions for deep face recognition. In: Venkatesh, B.R., Prasann, M., Namboodiri, V.P. (eds.) Computer Vision, Pattern Recognition, Image Processing, and Graphics, pp. 322\u2013332. Springer, Singapore (2020)","DOI":"10.1007\/978-981-15-8697-2_30"},{"key":"320_CR34","doi-asserted-by":"publisher","first-page":"101740","DOI":"10.1016\/j.cose.2020.101740","volume":"92","author":"B Yuan","year":"2020","unstructured":"Yuan, B., Wang, J., Liu, D., Guo, W., Wu, P., Bao, X.: Byte-level malware classification based on Markov images and deep learning. Comput. Secur. 92, 101740 (2020)","journal-title":"Comput. Secur."},{"key":"320_CR35","doi-asserted-by":"publisher","unstructured":"Zaid, G., Bossuet, L., Dassance, F., Habrard, A., Venelli, A.: Ranking loss: maximizing the success rate in deep learning side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(1), 25\u201355 (2020). https:\/\/doi.org\/10.46586\/tches.v2021.i1.25-55. https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/8726","DOI":"10.46586\/tches.v2021.i1.25-55"},{"key":"320_CR36","doi-asserted-by":"publisher","unstructured":"Zaid, G., Bossuet, L., Habrard, A., Venelli, A.: Methodology for efficient CNN architectures in profiling attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(1), 1\u201336 (2019). https:\/\/doi.org\/10.13154\/tches.v2020.i1.1-36. https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/8391","DOI":"10.13154\/tches.v2020.i1.1-36"},{"key":"320_CR37","doi-asserted-by":"publisher","unstructured":"Zhang, J., Zheng, M., Nan, J., Hu, H., Yu, N.: A novel evaluation metric for deep learning-based side channel analysis and its extended application to imbalanced data. IACR Transactions on Cryptographic Hardware and Embedded Systems 2020(3), 73\u201396 (2020). https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/8583. https:\/\/doi.org\/10.13154\/tches.v2020.i3.73-96","DOI":"10.13154\/tches.v2020.i3.73-96"}],"container-title":["Journal of Cryptographic Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-023-00320-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13389-023-00320-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-023-00320-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,7]],"date-time":"2023-08-07T10:29:58Z","timestamp":1691404198000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13389-023-00320-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,28]]},"references-count":37,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["320"],"URL":"https:\/\/doi.org\/10.1007\/s13389-023-00320-6","relation":{},"ISSN":["2190-8508","2190-8516"],"issn-type":[{"value":"2190-8508","type":"print"},{"value":"2190-8516","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,28]]},"assertion":[{"value":"9 October 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 April 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 May 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}