{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T09:49:10Z","timestamp":1745488150730,"version":"3.38.0"},"reference-count":29,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Fundamentals"],"published-print":{"date-parts":[[2025,3,1]]},"DOI":"10.1587\/transfun.2024cip0014","type":"journal-article","created":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T22:11:38Z","timestamp":1726006298000},"page":"227-241","source":"Crossref","is-referenced-by-count":1,"title":["CA-SCA: Non-Profiled Deep Learning-Based Side-Channel Attacks by Using Cluster Analysis"],"prefix":"10.1587","volume":"E108.A","author":[{"given":"Yuta","family":"FUKUDA","sequence":"first","affiliation":[{"name":"Graduate School of Science and Technology, Ritsumeikan University"}]},{"given":"Kota","family":"YOSHIDA","sequence":"additional","affiliation":[{"name":"Department of Science and Engineering, Ritsumeikan University"}]},{"given":"Takeshi","family":"FUJINO","sequence":"additional","affiliation":[{"name":"Department of Science and Engineering, Ritsumeikan University"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] S. Chari, J.R. Rao, and P. Rohatgi, \u201cTemplate attacks,\u201d International Workshop on Cryptographic Hardware and Embedded Systems, pp.13-28, Springer, 2002. 10.1007\/3-540-36400-5_3","DOI":"10.1007\/3-540-36400-5_3"},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] P. Kocher, J. Jaffe, and B. Jun, \u201cDifferential power analysis,\u201d Annual International Cryptology Conference, pp.388-397, Springer, 1999. 10.1007\/3-540-48405-1_25","DOI":"10.1007\/3-540-48405-1_25"},{"key":"3","doi-asserted-by":"publisher","unstructured":"[3] E. Brier, C. Clavier, and F. Olivier, \u201cCorrelation power analysis with a leakage model,\u201d Cryptographic Hardware and Embedded Systems - CHES 2004, M. Joye and J.J. Quisquater, eds., Berlin, Heidelberg, pp.16-29, Springer Berlin Heidelberg, 2004. 10.1007\/978-3-540-28632-5_2","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] H. Maghrebi, T. Portigliatti, and E. Prouff, \u201cBreaking cryptographic implementations using deep learning techniques,\u201d Security, Privacy, and Applied Cryptography Engineering - 6th International Conference, SPACE 2016, Hyderabad, India, Dec. 2016, Proceedings, C. Carlet, M.A. Hasan, and V. Saraswat, eds., Lecture Notes in Computer Science, vol.10076, pp.3-26, Springer, 2016. 10.1007\/978-3-319-49445-6_1","DOI":"10.1007\/978-3-319-49445-6_1"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] E. Cagli, C. Dumas, and E. Prouff, \u201cConvolutional neural networks with data augmentation against jitter-based countermeasures\u2006\u2014\u2006Profiling attacks without pre-processing,\u201d Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, Sept. 2017, Proceedings, W. Fischer and N. Homma, eds., Lecture Notes in Computer Science, vol.10529, pp.45-68, Springer, 2017. 10.1007\/978-3-319-66787-4_3","DOI":"10.1007\/978-3-319-66787-4_3"},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] S. Picek, A. Heuser, A. Jovic, S. Bhasin, and F. Regazzoni, \u201cThe curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations,\u201d IACR Trans. Cryptogr. Hardw. Embed. Syst., vol.2019, no.1, pp.209-237, 2019. 10.46586\/tches.v2019.i1.209-237","DOI":"10.46586\/tches.v2019.i1.209-237"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] T. Kubota, K. Yoshida, M. Shiozaki, and T. Fujino, \u201cDeep learning side-channel attack against hardware implementations of AES,\u201d 2019 22nd Euromicro Conference on Digital System Design (DSD), pp.261-268, 2019. 10.1109\/dsd.2019.00046","DOI":"10.1109\/DSD.2019.00046"},{"key":"8","doi-asserted-by":"publisher","unstructured":"[8] A. Ito, R. Ueno, and N. Homma, \u201cPerceived information revisited new metrics to evaluate success rate of side-channel attacks,\u201d IACR Trans. Cryptogr. Hardw. Embed. Syst., vol.2022, no.4, pp.228-254, 2022. 10.46586\/tches.v2022.i4.228-254","DOI":"10.46586\/tches.v2022.i4.228-254"},{"key":"9","doi-asserted-by":"publisher","unstructured":"[9] B. Timon, \u201cNon-profiled deep learning-based side-channel attacks with sensitivity analysis,\u201d IACR Trans. Cryptogr. Hardw. Embed. Syst., vol.2019, no.2, p.107-131, Feb. 2019. 10.46586\/tches.v2019.i2.107-131","DOI":"10.46586\/tches.v2019.i2.107-131"},{"key":"10","unstructured":"[10] E. Prouff, R. Strullu, R. Benadjila, E. Cagli, and C. Dumas, \u201cStudy of deep learning techniques for side-channel analysis and introduction to ASCAD database,\u201d IACR Cryptol. ePrint Arch., p.53, 2018."},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] K. Kuroda, Y. Fukuda, K. Yoshida, and T. Fujino, \u201cPractical aspects on non-profiled deep-learning side-channel attacks against AES software implementation with two types of masking countermeasures including RSM,\u201d Proc. 5th Workshop on Attacks and Solutions in Hardware Security, ASHES\u201921, New York, NY, USA, p.29-40, Association for Computing Machinery, 2021. 10.1145\/3474376.3487285","DOI":"10.1145\/3474376.3487285"},{"key":"12","doi-asserted-by":"publisher","unstructured":"[12] K. Kuroda, Y. Fukuda, K. Yoshida, and T. Fujino, \u201cPractical aspects on non-profiled deep-learning side-channel attacks against AES software implementation with two types of masking countermeasures including RSM,\u201d J. Cryptogr. Eng., vol.13, pp.427-442, 2023. 10.1007\/s13389-023-00312-6","DOI":"10.1007\/s13389-023-00312-6"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] A. Alipour, A. Papadimitriou, V. Beroulle, E. Aerabi, and D. H\u00e9ly, \u201cOn the performance of non-profiled differential deep learning attacks against an AES encryption algorithm protected using a correlated noise generation based hiding countermeasure,\u201d 2020 Design, Automation &amp; Test in Europe Conference &amp; Exhibition, DATE 2020, Grenoble, France, March 2020, pp.614-617, IEEE, 2020. 10.23919\/date48585.2020.9116387","DOI":"10.23919\/DATE48585.2020.9116387"},{"key":"14","doi-asserted-by":"publisher","unstructured":"[14] D. Kwon, S. Hong, and H. Kim, \u201cOptimizing implementations of non-profiled deep learning-based side-channel attacks,\u201d IEEE Access, vol.10, pp.5957-5967, 2022. 10.1109\/access.2022.3140446","DOI":"10.1109\/ACCESS.2022.3140446"},{"key":"15","doi-asserted-by":"publisher","unstructured":"[15] V.P. Hoang, N.T. Do, and V.S. Doan, \u201cEfficient non-profiled side channel attack using multi-output classification neural network,\u201d IEEE Embedded Syst. Lett., vol.15, no.3, pp.145-148, 2023. 10.1109\/les.2022.3213443","DOI":"10.1109\/LES.2022.3213443"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] N.T. Do, P.C. Le, V.P. Hoang, V.S. Doan, H.G. Nguyen, and C.K. Pham, \u201cMO-DLSCA: Deep learning based non-profiled side channel analysis using multi-output neural networks,\u201d 2022 International Conference on Advanced Technologies for Communications (ATC), pp.245-250, 2022. 10.1109\/atc55345.2022.9943024","DOI":"10.1109\/ATC55345.2022.9943024"},{"key":"17","doi-asserted-by":"publisher","unstructured":"[17] N.T. Do, V.P. Hoang, V.S. Doan, and C.K. Pham, \u201cOn the performance of non-profiled side channel attacks based on deep learning techniques,\u201d IET Information Security, vol.17, no.3, pp.377-393, 2023. 10.1049\/ise2.12102","DOI":"10.1049\/ise2.12102"},{"key":"18","unstructured":"[18] L. Wu, G. Perin, and S. Picek, \u201cHiding in plain sight: Non-profiling deep learning-based side-channel analysis with plaintext\/ciphertext,\u201d Cryptology ePrint Archive, Paper 2023\/209, 2023. https:\/\/eprint.iacr.org\/2023\/209"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] Y. Fukuda, K. Yoshida, and T. Fujino, \u201cIncorporating cluster analysis of feature vectors for non-profiled deep-learning-based side-channel attacks,\u201d Applied Cryptography and Network Security Workshops, M. Andreoni, ed., Cham, pp.84-101, Springer Nature Switzerland, 2024. 10.1007\/978-3-031-61486-6_6","DOI":"10.1007\/978-3-031-61486-6_6"},{"key":"20","doi-asserted-by":"publisher","unstructured":"[20] T. Cali\u0144ski and J. Harabasz, \u201cA dendrite method for cluster analysis,\u201d Communications in Statistics-theory and Methods, vol.3, no.1, pp.1-27, 1974. 10.1080\/03610927408827101","DOI":"10.1080\/03610927408827101"},{"key":"21","doi-asserted-by":"publisher","unstructured":"[21] G.E. Hinton and R.R. Salakhutdinov, \u201cReducing the dimensionality of data with neural networks,\u201d Science, vol.313, no.5786, pp.504-507, 2006. 10.1126\/science.1127647","DOI":"10.1126\/science.1127647"},{"key":"22","doi-asserted-by":"publisher","unstructured":"[22] K. Imafuku, S. Kawamura, H. Nozaki, J. Sakamoto, and S. Osuka, \u201cNon-profiled deep learning-based side-channel analysis with only one network training,\u201d IEEE Access, vol.11, pp.83221-83231, 2023. 10.1109\/access.2023.3301178","DOI":"10.1109\/ACCESS.2023.3301178"},{"key":"23","doi-asserted-by":"publisher","unstructured":"[23] T.S. Messerges, \u201cUsing second-order power analysis to attack DPA resistant software,\u201d Cryptographic Hardware and Embedded Systems - CHES 2000, Second International Workshop, Worcester, MA, USA, Aug. 2000, Proceedings, \u00c7.K. Ko\u00e7 and C. Paar, eds., Lecture Notes in Computer Science, vol.1965, pp.238-251, Springer, 2000. 10.1007\/3-540-44499-8_19","DOI":"10.1007\/3-540-44499-8_19"},{"key":"24","doi-asserted-by":"publisher","unstructured":"[24] R. Caruana, \u201cMultitask learning,\u201d Mach. Learn., vol.28, no.1, pp.41-75, 1997. 10.1023\/a:1007379606734","DOI":"10.1023\/A:1007379606734"},{"key":"25","doi-asserted-by":"crossref","unstructured":"[25] J. Waddle and D. Wagner, \u201cTowards efficient second-order power analysis,\u201d Cryptographic Hardware and Embedded Systems - CHES 2004, M. Joye and J.J. Quisquater, eds., Berlin, Heidelberg, pp.1-15, Springer Berlin Heidelberg, 2004. 10.1007\/978-3-540-28632-5_1","DOI":"10.1007\/978-3-540-28632-5_1"},{"key":"26","doi-asserted-by":"publisher","unstructured":"[26] A. Moradi, S. Guilley, and A. Heuser, \u201cDetecting hidden leakages,\u201d Applied Cryptography and Network Security - 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 2014. Proceedings, I. Boureanu, P. Owesarski, and S. Vaudenay, eds., Lecture Notes in Computer Science, vol.8479, pp.324-342, Springer, 2014. 10.1007\/978-3-319-07536-5_20","DOI":"10.1007\/978-3-319-07536-5_20"},{"key":"27","doi-asserted-by":"publisher","unstructured":"[27] Y. Fukuda, K. Yoshida, H. Hashimoto, K. Kuroda, and T. Fujino, \u201cProfiling deep learning side-channel attacks using multi-label against AES circuits with RSM countermeasure,\u201d IEICE Trans. Fundamentals, vol.E106-A, no.3, pp.294-305, March 2023. 10.1587\/transfun.2022CIP0015","DOI":"10.1587\/transfun.2022CIP0015"},{"key":"28","doi-asserted-by":"publisher","unstructured":"[28] N. Veshchikov and S. Guilley, \u201cImplementation flaws in the masking scheme of DPA contest v4,\u201d IET Inf. Secur., vol.11, no.6, pp.356-362, 2017. 10.1049\/iet-ifs.2016.0475","DOI":"10.1049\/iet-ifs.2016.0475"},{"key":"29","doi-asserted-by":"crossref","unstructured":"[29] T. Schneider and A. Moradi, \u201cLeakage assessment methodology\u2006\u2014\u2006A clear roadmap for side-channel evaluations,\u201d Cryptographic Hardware and Embedded Systems - CHES 2015 - 17th International Workshop, Saint-Malo, France, Sept. 2015, Proceedings, T. G\u00fcneysu and H. Handschuh, eds., Lecture Notes in Computer Science, vol.9293, pp.495-513, Springer, 2015. 10.1007\/978-3-662-48324-4_25","DOI":"10.1007\/978-3-662-48324-4_25"}],"container-title":["IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E108.A\/3\/E108.A_2024CIP0014\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T03:30:12Z","timestamp":1740799812000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E108.A\/3\/E108.A_2024CIP0014\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,1]]},"references-count":29,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.1587\/transfun.2024cip0014","relation":{},"ISSN":["0916-8508","1745-1337"],"issn-type":[{"type":"print","value":"0916-8508"},{"type":"electronic","value":"1745-1337"}],"subject":[],"published":{"date-parts":[[2025,3,1]]},"article-number":"2024CIP0014"}}