{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T20:10:10Z","timestamp":1770063010475,"version":"3.49.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/hst.2016.7495589","type":"proceedings-article","created":{"date-parts":[[2016,6,25]],"date-time":"2016-06-25T11:39:11Z","timestamp":1466854751000},"page":"242-247","source":"Crossref","is-referenced-by-count":7,"title":["Template attacks using classification algorithms"],"prefix":"10.1109","author":[{"given":"Elif","family":"Ozgen","sequence":"first","affiliation":[]},{"given":"Louiza","family":"Papachristodoulou","sequence":"additional","affiliation":[]},{"given":"Lejla","family":"Batina","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-011-0135-4"},{"key":"ref11","first-page":"79","article-title":"Clustering algorithms for non-profiled single-execution attacks on exponentiations","author":"heyszl","year":"2013","journal-title":"Smart Card Research and Advanced Applications - 12th International Conference CARDIS 2013 Berlin Germany November 27&#x2013;29 2013 Revised Selected Papers"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13039-2_2"},{"key":"ref13","article-title":"Dismantling real-world ecc with horizontal and vertical template attacks","author":"dugardin","year":"2015","journal-title":"Cryptology ePrint Archive Report 2005\/146"},{"key":"ref14","first-page":"417","article-title":"Use of elliptic curves in cryptography","volume":"218","author":"miller","year":"1985","journal-title":"Advances in Cryptology - CRYPTO &#x2019;85 Santa Barbara California USA August 18&#x2013;22 1985 Proceedings ser Lecture Notes in Computer Science H C Williams"},{"key":"ref15","first-page":"203","volume":"48","author":"koblitz","year":"1987","journal-title":"Elliptic Curve Cryptosystems"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107360211"},{"key":"ref17","article-title":"RFC 5639 - Elliptic Curve Cryptography (ECC) Brainpool Standard Curves and Curve Generation","year":"2010","journal-title":"Bundesamt f&#x00FC;r Sicherheit in der Informationstechnik Tech Rep"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48059-5_25"},{"key":"ref19","first-page":"17","volume":"4","author":"joye","year":"2003","journal-title":"Elliptic curve cryptosystems and Side Channel Analysis ST J Syst Res"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-57332-1_36"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/EURCON.2005.1630348"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10175-0_11"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_9"},{"key":"ref8","author":"theodoridis","year":"2006","journal-title":"Pattern Recognition Third Edition"},{"key":"ref7","first-page":"82","article-title":"Semi-supervised template attack","volume":"2012","author":"lerman","year":"2012","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31815-6_35"},{"key":"ref1","first-page":"13","article-title":"Template attacks","author":"chari","year":"2002","journal-title":"Cryptographic Hardware and Embedded Systems - CHES 2002 4th International Workshop Redwood Shores CA USA August 13&#x2013;15 2002 Revised Papers"},{"key":"ref9","article-title":"Side channel attacks on cryptographic devices as a classification problem","author":"karsmakers","year":"2009","journal-title":"K U Leuven Tech Rep"},{"key":"ref20","article-title":"Polarssl version 1.3.7","author":"mbed","year":"0"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-4884-5_3"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49649-1_6"},{"key":"ref23","article-title":"Chapter 13, Kernel Machines","author":"alpaydin","year":"0","journal-title":"Introduction to Machine Learning"}],"event":{"name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","location":"McLean, VA, USA","start":{"date-parts":[[2016,5,3]]},"end":{"date-parts":[[2016,5,5]]}},"container-title":["2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7489989\/7495545\/07495589.pdf?arnumber=7495589","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T13:03:30Z","timestamp":1475154210000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7495589\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/hst.2016.7495589","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}