{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T14:25:59Z","timestamp":1774448759235,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T00:00:00Z","timestamp":1604880000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Vetenskapsr\u00e5det","award":["2018-04482"],"award-info":[{"award-number":["2018-04482"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,13]]},"DOI":"10.1145\/3411504.3421214","type":"proceedings-article","created":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T23:43:32Z","timestamp":1604619812000},"page":"35-44","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":53,"title":["Far Field EM Side-Channel Attack on AES Using Deep Learning"],"prefix":"10.1145","author":[{"given":"Ruize","family":"Wang","sequence":"first","affiliation":[{"name":"Royal Institute of Technology (KTH), Stockholm, Sweden"}]},{"given":"Huanyu","family":"Wang","sequence":"additional","affiliation":[{"name":"Royal Institute of Technology (KTH), Stockholm, Sweden"}]},{"given":"Elena","family":"Dubrova","sequence":"additional","affiliation":[{"name":"Royal Institute of Technology (KTH), Stockholm, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2020,11,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2013. Small portable AES128\/192\/256 in C. Github. https:\/\/github.com\/kokke\/tiny-AES-c\/.  2013. Small portable AES128\/192\/256 in C. Github. https:\/\/github.com\/kokke\/tiny-AES-c\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Dakshi Agrawal Bruce Archambeault Josyula R. Rao and Pankaj Rohatgi. 2003. The EM Side-Channel(s). In Crypt. Hardware and Embedded Systems. 29--45.  Dakshi Agrawal Bruce Archambeault Josyula R. Rao and Pankaj Rohatgi. 2003. The EM Side-Channel(s). In Crypt. Hardware and Embedded Systems. 29--45.","DOI":"10.1007\/3-540-36400-5_4"},{"key":"e_1_3_2_1_3_1","first-page":"2018","article-title":"Study of deep learning techniques for side-channel analysis and introduction to ASCAD database","volume":"22","author":"Benadjila Ryad","year":"2018","journal-title":"ANSSI"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24390"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","volume-title":"Correlation Power Analysis with a Leakage Model","author":"Brier Eric","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"e_1_3_2_1_6_1","unstructured":"Martin Brisfors and Sebastian Forsmark. 2019. Deep-Learning Side-Channel Attacks on AES. Master's thesis. KTH School of EECS.  Martin Brisfors and Sebastian Forsmark. 2019. Deep-Learning Side-Channel Attacks on AES. Master's thesis. KTH School of EECS."},{"key":"e_1_3_2_1_8_1","volume-title":"Geert Van der Plas, and Yves Rolain","author":"Bronckers Stephane","year":"2010"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_3"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2020.i3.358-401"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243802"},{"key":"e_1_3_2_1_12_1","volume-title":"The Design of Rijndael: AES - The Advanced Encryption Standard","author":"Daemen Joan"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317934"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/648254.752700"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2015.7140247"},{"key":"e_1_3_2_1_16_1","volume-title":"Deep Learning","author":"Goodfellow Ian"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Saulius Japertas. 2011. The research of IEEE 802.11 signal LOS propagation features for complex geometry indoors. (2011).  Saulius Japertas. 2011. The research of IEEE 802.11 signal LOS propagation features for complex geometry indoors. (2011).","DOI":"10.1109\/ICDIPC.2012.6257267"},{"key":"e_1_3_2_1_18_1","volume-title":"Proc. Ann. Conf. Adv. School Comput. Imaging. 25--30","author":"Juszczak P.","year":"2002"},{"key":"e_1_3_2_1_19_1","first-page":"3","article-title":"Make Some Noise. Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis","volume":"2019","author":"Kim Jaehun","year":"2019","journal-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems"},{"key":"e_1_3_2_1_20_1","volume-title":"Advances in Cryptology ? CRYPTO? 99","author":"Kocher Paul"},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. of Design Automation Conference (DAC '04)","author":"Kocher Paul","year":"2004"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/646761.706156"},{"key":"e_1_3_2_1_23_1","volume-title":"Deep Learning SideChannel Attack Against Hardware Implementations of AES. In 2019 22nd Euromicro Conference on Digital System Design (DSD). 261--268","author":"Kubota T."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","volume-title":"Breaking Cryptographic Implementations Using Deep Learning Techniques","author":"Maghrebi Houssem","DOI":"10.1007\/978-3-319-49445-6_1"},{"key":"e_1_3_2_1_26_1","volume-title":"Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)","author":"Mangard Stefan"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2016.7760865"},{"key":"e_1_3_2_1_28_1","volume-title":"Computational Problems in Science and Engineering","author":"Martinasek Zdenek"},{"key":"e_1_3_2_1_29_1","volume-title":"A comprehensive study of deep learning for side-channel analysis. IACR Transactions on Cryptographic Hardware and Embedded Systems","author":"Masure Lo\u00efc","year":"2020"},{"key":"e_1_3_2_1_30_1","volume-title":"2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC). 661--666","author":"Pahlevanzadeh H."},{"key":"e_1_3_2_1_31_1","unstructured":"Guilherme Perin Baris Ege and Jasper van Woudenberg. 2018. Lowering the Bar: Deep Learning for Side-Channel Analysis (White Paper). BlackHat?2018.  Guilherme Perin Baris Ege and Jasper van Woudenberg. 2018. Lowering the Bar: Deep Learning for Side-Channel Analysis (White Paper). BlackHat?2018."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05072-6_10"},{"key":"e_1_3_2_1_34_1","volume-title":"Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database. IACR Cryptology ePrint Archive","author":"Prouff Emmanuel","year":"2018"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45418-7_17"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177729586"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/NORCHIP.2019.8906945"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISMVL49045.2020.00-29"}],"event":{"name":"CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event USA","acronym":"CCS '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411504.3421214","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411504.3421214","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:42Z","timestamp":1750195902000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411504.3421214"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,9]]},"references-count":35,"alternative-id":["10.1145\/3411504.3421214","10.1145\/3411504"],"URL":"https:\/\/doi.org\/10.1145\/3411504.3421214","relation":{},"subject":[],"published":{"date-parts":[[2020,11,9]]},"assertion":[{"value":"2020-11-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}