{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T11:11:44Z","timestamp":1747739504178},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/sips.2014.6986091","type":"proceedings-article","created":{"date-parts":[[2014,12,30]],"date-time":"2014-12-30T19:59:15Z","timestamp":1419969555000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["Empirical evaluation of multi-device profiling side-channel attacks"],"prefix":"10.1109","author":[{"given":"Neil","family":"Hanley","sequence":"first","affiliation":[]},{"given":"Maire","family":"O'Neill","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Tunstall","sequence":"additional","affiliation":[]},{"given":"William P.","family":"Marnane","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1007\/11545262_3","article-title":"A stochastic model for differential side channel cryptanalysis","author":"schindler","year":"2005","journal-title":"Cryptographic Hardware and Embedded Systems - CHES 2005"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-011-0023-x"},{"key":"18","first-page":"29","article-title":"Side channel attack: An approach based on machine learning","author":"lerman","year":"2011","journal-title":"Constructive Side-Channel Analysis and Secure Design - COSADE 2011"},{"key":"33","article-title":"NICV: Normalized inter-class variance for detection of side-channel leakage","author":"bhasin","year":"2013","journal-title":"Cryptology ePrint Archive"},{"key":"15","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/3-540-48059-5_16","article-title":"IPA: A new class of power attacks","author":"fahn","year":"1999","journal-title":"Cryptographic Hardware and Embedded Systems?CHES 1999"},{"key":"16","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/3-540-36400-5_3","article-title":"Template attacks","author":"chari","year":"2003","journal-title":"Cryptographic Hardware and Embedded Systems - CHES 2002"},{"key":"13","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1007\/3-540-44499-8_20","article-title":"Differential power analysis in the presence of hardware countermeasures","author":"clavier","year":"2000","journal-title":"Cryptographic Hardware and Embedded Systems - CHES 2000"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2004.1268856"},{"key":"11","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1007\/3-540-48059-5_15","article-title":"DES and differential power analysis (the \"duplication\" method)","author":"goubin","year":"1999","journal-title":"Cryptographic Hardware and Embedded Systems?CHES 1999"},{"key":"12","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1007\/3-540-44709-1_26","article-title":"An implementation of des and aes, secure against some attacks","author":"akkar","year":"2001","journal-title":"Cryptographic Hardware and Embedded Systems - CHES 2001"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40026-1_12"},{"key":"20","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/11545262_2","article-title":"Templates as master keys","author":"agrawal","year":"2005","journal-title":"Cryptographic Hardware and Embedded Systems - CHES 2005"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-011-0135-4"},{"key":"23","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/978-3-642-20465-4_8","article-title":"A formal study of power variability issues and side- channel attacks for nanoscale devices","author":"renauld","year":"2011","journal-title":"Advances in Cryptology - EUROCRYPT 2011"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-012-0030-6"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-012-0038-y"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-42033-7_26"},{"key":"27","first-page":"243","article-title":"Template attacks on masking - resistance is futile","author":"oswald","year":"2007","journal-title":"Topics in Cryptology - CT-RSA 2007"},{"journal-title":"The Elements of Statistical Learning Data Mining Inference and Prediction","year":"2009","author":"hastie","key":"28"},{"key":"29","article-title":"Efficient template attacks","author":"choudary","year":"2013","journal-title":"Cryptology ePrint Archive"},{"key":"3","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/3-540-44709-1_21","article-title":"Electromagnetic analysis: Concrete results","author":"gandolfi","year":"2001","journal-title":"Cryptographic Hardware and Embedded Systems - CHES 2001"},{"key":"2","first-page":"388","article-title":"Differential power analysis","author":"kocher","year":"1999","journal-title":"Proc Advances in Cryptology - CRYPTO 1999"},{"key":"10","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1007\/978-3-642-23951-9_14","article-title":"Breaking mifare DESFire MF3ICD40: Power analysis and templates in the real world","author":"oswald","year":"2011","journal-title":"Cryptographic Hardware and Embedded Systems - CHES 2011"},{"key":"1","first-page":"104","article-title":"Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems","author":"kocher","year":"1996","journal-title":"Advances in Cryptology - CRYPTO 1996"},{"journal-title":"FIPS-197 Advanced Encryption Standard (AES)","year":"2001","author":"nist","key":"30"},{"journal-title":"Power Analysis Attacks Revealing the Secrets of Smart Cards","year":"2007","author":"mangard","key":"7"},{"key":"6","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1007\/978-3-540-85053-3_27","article-title":"Mutual information analysis","author":"gierlichs","year":"2008","journal-title":"Cryptographic Hardware and Embedded Systems - CHES 2008"},{"key":"32","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1007\/978-3-540-85053-3_26","article-title":"Using subspace-based template attacks to compare and combine power and electromagnetic information leakages","author":"standaert","year":"2008","journal-title":"Cryptographic Hardware and Embedded Systems - CHES 2008"},{"key":"5","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","article-title":"Correlation power analysis with a leakage model","author":"brier","year":"2004","journal-title":"Cryptographic Hardware and Embedded Systems - CHES 2004"},{"key":"31","first-page":"424","article-title":"Dpa attacks and s-boxes","author":"prouff","year":"2005","journal-title":"Fast Software Encryption - FSE 2005"},{"key":"4","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1007\/3-540-45418-7_17","article-title":"Electromagnetic analysis (EMA): Measures and counter-measures for smart cards","author":"quisquater","year":"2001","journal-title":"Smart Card Programming and Security - E-Smart 2001"},{"key":"9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-642-27954-6_1","article-title":"Black-box side-channel attacks highlight the importance of countermeasures - An analysis of the xilinx virtex-4 and virtex-5 bitstream encryption mechanism","author":"moradi","year":"2012","journal-title":"Topics in Cryptology - CT-RSA 2012"},{"key":"8","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/978-3-540-85174-5_12","article-title":"On the power of power analysis in the real world: A complete break of the keeloqcode hopping scheme","author":"eisenbarth","year":"2008","journal-title":"Advances in Cryptology - CRYPTO 2008"}],"event":{"name":"2014 IEEE Workshop on Signal Processing Systems (SiPS)","start":{"date-parts":[[2014,10,20]]},"location":"Belfast, United Kingdom","end":{"date-parts":[[2014,10,22]]}},"container-title":["2014 IEEE Workshop on Signal Processing Systems (SiPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6973465\/6986048\/06986091.pdf?arnumber=6986091","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T22:54:04Z","timestamp":1498172044000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6986091\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/sips.2014.6986091","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}