{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T05:21:20Z","timestamp":1737436880238,"version":"3.33.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,16]],"date-time":"2024-12-16T00:00:00Z","timestamp":1734307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,16]],"date-time":"2024-12-16T00:00:00Z","timestamp":1734307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,16]]},"DOI":"10.1109\/asianhost63913.2024.10838480","type":"proceedings-article","created":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T18:35:25Z","timestamp":1737052525000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Yet Another Physical Leakage Assessment with the Wasserstein Distance"],"prefix":"10.1109","author":[{"given":"Haruka","family":"Hirata","sequence":"first","affiliation":[{"name":"The University of Electro-Communications,Department of Informatics,Tokyo,Japan"}]},{"given":"Yusaku","family":"Harada","sequence":"additional","affiliation":[{"name":"The University of Electro-Communications,Department of Informatics,Tokyo,Japan"}]},{"given":"Yuko","family":"Hara","sequence":"additional","affiliation":[{"name":"Institute of Science Tokyo,Department of Information and Communications Engineering,Tokyo,Japan"}]},{"given":"Kazuo","family":"Sakiyama","sequence":"additional","affiliation":[{"name":"The University of Electro-Communications,Department of Informatics,Tokyo,Japan"}]},{"given":"Yang","family":"Li","sequence":"additional","affiliation":[{"name":"The University of Electro-Communications,Department of Informatics,Tokyo,Japan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_9"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45418-7_17"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_27"},{"key":"ref6","article-title":"Test vector leakage assessment (TVLA) methodology in practice","volume-title":"International Cryptographic Module Conference","author":"Becker","year":"2013"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i1.209-237"},{"key":"ref8","article-title":"Leakage detection with kolmogorov-smirnov test","author":"Zhou","year":"2019","journal-title":"Cryptology ePrint Archive, Paper 2019\/1478"},{"key":"ref9","first-page":"214","article-title":"Wasserstein generative adver-sarial networks","volume-title":"Proceedings of the 34th International Conference on Machine Learning","volume":"70","author":"Arjovsky"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_25"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2996366.2996369"},{"key":"ref12","article-title":"Profiling good leakage models for masked implementations","author":"Ou","year":"2017","journal-title":"Cryptology ePrint Archive, Paper 2017\/660"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.1998.710701"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-statistics-030718-104938"},{"key":"ref15","first-page":"721","article-title":"Robust doc-ument distance with wasserstein-fisher-rao metric","volume-title":"Asian Conference on Machine Learning","author":"Wang"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-022-10784-y"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2023.i1.301-325"},{"key":"ref18","article-title":"Fusion channel attack with POI learning encoder","author":"Li","year":"2024","journal-title":"Cryptology ePrint Archive, Paper 2024\/1092"},{"volume-title":"Power Analysis Attacks: Revealing the Secrets of Smart Cards","year":"2010","author":"Mangard","key":"ref19"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53140-2_2"},{"journal-title":"The keccak reference","year":"2011","author":"Bertoni","key":"ref21"},{"key":"ref22","first-page":"387","article-title":"Fast leakage assess-ment","volume-title":"Cryptographic Hardware and Embedded Systems","volume":"10529","author":"Reparaz","year":"2017"}],"event":{"name":"2024 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)","start":{"date-parts":[[2024,12,16]]},"location":"Kobe, Japan","end":{"date-parts":[[2024,12,18]]}},"container-title":["2024 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10838388\/10838389\/10838480.pdf?arnumber=10838480","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T18:40:21Z","timestamp":1737398421000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10838480\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,16]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/asianhost63913.2024.10838480","relation":{},"subject":[],"published":{"date-parts":[[2024,12,16]]}}}