{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T14:14:00Z","timestamp":1769350440759,"version":"3.49.0"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,10,29]],"date-time":"2018-10-29T00:00:00Z","timestamp":1540771200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Brain Inf."],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1186\/s40708-018-0090-1","type":"journal-article","created":{"date-parts":[[2018,10,29]],"date-time":"2018-10-29T02:08:21Z","timestamp":1540778901000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Side-channel attacks against the human brain: the PIN code case study (extended version)"],"prefix":"10.1186","volume":"5","author":[{"given":"Joseph","family":"Lange","sequence":"first","affiliation":[]},{"given":"Cl\u00e9ment","family":"Massart","sequence":"additional","affiliation":[]},{"given":"Andr\u00e9","family":"Mouraux","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7444-0285","authenticated-orcid":false,"given":"Fran\u00e7ois-Xavier","family":"Standaert","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,29]]},"reference":[{"issue":"6","key":"90_CR1","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1002\/ana.410120605","volume":"12","author":"J Engel","year":"1982","unstructured":"Engel J, Kuhl DE, Phelps ME, Crandall paul H (1982) Comparative localization of foci in partial epilepsy by PCT and EEG. Ann Neurol 12(6):529\u2013537","journal-title":"Ann Neurol"},{"issue":"3","key":"90_CR2","doi-asserted-by":"publisher","first-page":"991","DOI":"10.1016\/S0896-6273(00)00169-0","volume":"28","author":"CM Portas","year":"2000","unstructured":"Portas CM, Krakow K, Allen P, Josephs O, Armony JL, Frith CD (2000) Auditory processing across the sleep-wake cycle: simultaneous EEG and FMRI monitoring in humans. Neuron 28(3):991\u2013999","journal-title":"Neuron"},{"issue":"12","key":"90_CR3","first-page":"2726","volume":"52\u2013I","author":"C Lin","year":"2005","unstructured":"Lin C, Wu R, Liang S, Chao W, Chen Y, Jung T (2005) Eeg-based drowsiness estimation for safety driving using independent component analysis. IEEE Trans Circuits Syst 52\u2013I(12):2726\u20132738","journal-title":"IEEE Trans Circuits Syst"},{"issue":"2","key":"90_CR4","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1109\/TCIAIG.2013.2264736","volume":"5","author":"D Coyle","year":"2013","unstructured":"Coyle D, Pr\u00edncipe JC, Lotte F, Nijholt A (2013) Guest editorial: brain\/neuronal\u2014computer game interfaces and interaction. IEEE Trans Comput Intell AI Games 5(2):77\u201381","journal-title":"IEEE Trans Comput Intell AI Games"},{"issue":"2","key":"90_CR5","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MTS.2015.2425551","volume":"34","author":"T Bonaci","year":"2015","unstructured":"Bonaci T, Calo R, Chizeck HJ (2015) App stores for the brain: privacy and security in brain\u2013computer interfaces. IEEE Technol Soc Mag 34(2):32\u201339","journal-title":"IEEE Technol Soc Mag"},{"issue":"2","key":"90_CR6","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/s10676-016-9398-9","volume":"18","author":"M Ienca","year":"2016","unstructured":"Ienca M (2016) Hacking the brain: brain\u2013computer interfacing technology and the ethics of neurosecurity. Ethics Inf Technol 18(2):117\u2013129","journal-title":"Ethics Inf Technol"},{"key":"90_CR7","unstructured":"Martinovic I, Davies D, Frank M, Perito D, Ros T, Song D (2012) On the feasibility of side-channel attacks with brain-computer interfaces. In: Kohno T (ed) USENIX security symposium. Proceedings. USENIX Association, pp 143\u2013158"},{"issue":"5","key":"90_CR8","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1111\/j.1469-8986.1991.tb01990.x","volume":"28","author":"LA Farwell","year":"1991","unstructured":"Farwell LA, Donchin E (1991) The truth will out: interrogative polygraphy (lie detection) with event-related brain potentials. Psychophysiology 28(5):531\u2013547","journal-title":"Psychophysiology"},{"issue":"3","key":"90_CR9","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1111\/j.1467-9280.2009.02305.x","volume":"20","author":"M Inzlicht","year":"2009","unstructured":"Inzlicht M, McGregor I, Hirsh JB, Nash K (2009) Neural markers of religious conviction. Psychol Sci 20(3):385\u2013392","journal-title":"Psychol Sci"},{"issue":"5","key":"90_CR10","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1016\/0168-5597(95)00116-A","volume":"96","author":"I Berlad","year":"1995","unstructured":"Berlad I, Pratt H (1995) P300 in response to the subject\u2019s own name. Electroencephalogr Clin Neurophysiol 96(5):472\u2013474","journal-title":"Electroencephalogr Clin Neurophysiol"},{"key":"90_CR11","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1126\/science.7350657","volume":"207","author":"M Kutas","year":"1980","unstructured":"Kutas M, Hillyard SA (1980) Reading senseless sentences: brain potentials reflect semantic incongruity. Science 207:203\u2013205","journal-title":"Science"},{"key":"90_CR12","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1038\/307161a0","volume":"307","author":"M Kutas","year":"1984","unstructured":"Kutas M, Hillyard SA (1984) Brain potentials during reading reflect word expectancy and semantic association. Nature 307:161\u2013163","journal-title":"Nature"},{"key":"90_CR13","unstructured":"http:\/\/emotiv.com\/ . Last retrieved July 2016"},{"key":"90_CR14","unstructured":"http:\/\/neurosky.com\/ . Last retrieved July 2016"},{"key":"90_CR15","volume-title":"Power analysis attacks\u2014revealing the secrets of smart cards","author":"S Mangard","year":"2007","unstructured":"Mangard S, Oswald E, Popp T (2007) Power analysis attacks\u2014revealing the secrets of smart cards. Springer, Berlin"},{"key":"90_CR16","unstructured":"http:\/\/www.chesworkshop.org\/ . Last retrieved July 2016"},{"key":"90_CR17","doi-asserted-by":"crossref","unstructured":"Standaert F, Malkin T, Yung M (2009) A unified framework for the analysis of side-channel key recovery attacks. In: Joux A (ed) EUROCRYPT. Proceedings, volume 5479 of LNCS. Springer, pp 443\u2013461","DOI":"10.1007\/978-3-642-01001-9_26"},{"key":"90_CR18","unstructured":"Veyrat-Charvillon N, G\u00e9rard B, Renauld M, Standaert F (2012) An optimal key enumeration algorithm and its application to side-channel attacks. In: KnudsenLR, Wu H (eds) SAC. Proceedings, volume 7707 of LNCS. Springer, pp 390\u2013406"},{"key":"90_CR19","doi-asserted-by":"crossref","unstructured":"Archambeau C, Peeters E, Standaert F, Quisquater J (2006) Template attacks in principal subspaces. In: Goubin L, Matsui M (eds) CHES 2006. Proceedings, volume 4249 of LNCS. Springer, pp 1\u201314","DOI":"10.1007\/11894063_1"},{"key":"90_CR20","unstructured":"Chari S, Rao JR, Rohatgi P (2002) Template attacks. In: Kaliski Jr BS, Ko\u00e7 \u00c7K, Paar C (eds) CHES. Proceedings. volume 2523 of LNCS. Springer, pp 13\u201328"},{"issue":"2","key":"90_CR21","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/s00145-010-9084-8","volume":"24","author":"L Batina","year":"2011","unstructured":"Batina L, Gierlichs B, Prouff E, Rivain M, Standaert F, Veyrat-Charvillon N (2011) Mutual information analysis: a comprehensive study. J Cryptol 24(2):269\u2013291","journal-title":"J Cryptol"},{"key":"90_CR22","unstructured":"Durvaux F, Standaert F, Veyrat-Charvillon N (2014) How to certify the leakage of a chip? In: Nguyen PQ, Oswald E (eds) EUROCRYPT. Proceedings, volume 8441 of LNCS. Springer, pp 459\u2013476"},{"key":"90_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-3324-9","volume-title":"Density estimation for statistics and data analysis","author":"BW Silverman","year":"1986","unstructured":"Silverman BW (1986) Density estimation for statistics and data analysis. Chapman & Hall, London"},{"key":"#cr-split#-90_CR24.1","doi-asserted-by":"crossref","unstructured":"Renauld M, Standaert F, Veyrat-Charvillon N, Kamel D, Flandre D (2011) A formal study of power variability issues and side-channel attacks for nanoscale devices. In: Paterson KG","DOI":"10.1007\/978-3-642-20465-4_8"},{"key":"#cr-split#-90_CR24.2","unstructured":"(ed) EUROCRYPT 2011. Proceedings, volume 6632 of LNCS. Springer, pp 109-128"},{"key":"90_CR25","unstructured":"Duc A, Faust S, Standaert F (2015) Making masking security proofs concrete\u2014or how to evaluate the security of any leaking device. In: Oswald E, Fischlin M (eds) EUROCRYPT 2015. Proceedings, Part I, volume 9056 of LNCS. Springer, pp 401\u2013429"},{"key":"90_CR26","doi-asserted-by":"crossref","DOI":"10.1201\/9780429246593","volume-title":"An introduction to the bootstrap","author":"B Efron","year":"1994","unstructured":"Efron B, Tibshirani RJ (1994) An introduction to the bootstrap. CRC Press, Boca Raton"},{"key":"90_CR27","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1007\/978-3-642-01957-9_30","volume-title":"Applied Cryptography and Network Security","author":"Fran\u00e7ois-Xavier Standaert","year":"2009","unstructured":"Standaert F, Koeune F, Schindler W (2009) How to compare profiled side-channel attacks? In: Abdalla M, Pointcheval D, Fouque P, Vergnaud D (eds) ACNS. Proceedings, volume 5536 of LNCS, pp 485\u2013498"},{"issue":"4","key":"90_CR28","doi-asserted-by":"publisher","first-page":"743","DOI":"10.1109\/TPAMI.2007.1012","volume":"29","author":"S Marcel","year":"2007","unstructured":"Marcel S, Mill\u00e1n JR (2007) Person authentication using brainwaves (EEG) and maximum A posteriori model adaptation. IEEE Trans Pattern Anal Mach Intell 29(4):743\u2013752","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"90_CR29","doi-asserted-by":"crossref","unstructured":"Paranjape RB, Mahovsky J, Benedicenti L, Koles Z (2001) The electroencephalogram as a biometric. In: Electrical and Computer Engineering, vol 2. IEEE, pp 1363\u20131366","DOI":"10.1109\/CCECE.2001.933649"},{"key":"90_CR30","doi-asserted-by":"crossref","unstructured":"Veyrat-Charvillon N, G\u00e9rard B, Standaert F (2013) Security evaluations beyond computing power. In: Johansson T, Nguyen PQ (eds) EUROCRYPT. Proceedings, volume 7881 of LNCS. Springer, pp 126\u2013141","DOI":"10.1007\/978-3-642-38348-9_8"},{"key":"90_CR31","unstructured":"Smart NP (2016) Computing on encrypted data. Kayaks and Dreadnoughts in a sea of crypto (September 2016)"}],"container-title":["Brain Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s40708-018-0090-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s40708-018-0090-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s40708-018-0090-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,14]],"date-time":"2020-11-14T05:43:27Z","timestamp":1605332607000},"score":1,"resource":{"primary":{"URL":"https:\/\/braininformatics.springeropen.com\/articles\/10.1186\/s40708-018-0090-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,29]]},"references-count":32,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["90"],"URL":"https:\/\/doi.org\/10.1186\/s40708-018-0090-1","relation":{},"ISSN":["2198-4018","2198-4026"],"issn-type":[{"value":"2198-4018","type":"print"},{"value":"2198-4026","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10,29]]},"assertion":[{"value":"13 April 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 October 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 October 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"12"}}