{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T17:04:58Z","timestamp":1753895098750,"version":"3.41.2"},"reference-count":75,"publisher":"International Association for Cryptologic Research","issue":"1","license":[{"start":{"date-parts":[[2025,1,13]],"date-time":"2025-01-13T00:00:00Z","timestamp":1736726400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IACR CiC"],"accepted":{"date-parts":[[2025,3,11]]},"abstract":"<jats:p>  In order to protect against side-channel attacks, masking countermeasure is widely considered. Its application on asymmetric cryptographic algorithms, such as RSA implementations, rendered multiple traces aggregation inefficient and led to the development of single trace horizontal attacks. Among these horizontal attacks proposed in the literature, many are based on the use of clustering techniques or statistical distinguishers to identify operand collisions. These attacks can be difficult to implement in practice, as they often require advanced trace pre-processing, including the selection of points of interest, a step that is particularly complex to perform in a non-profiling context. In recent years, numerous studies have shown the effectiveness of deep learning in security evaluation for conducting side-channel attacks. However, few attentions have been given to its application in asymmetric cryptography and horizontal attack scenarios. Additionally, the majority of deep learning attacks tend to focus on profiling attacks, which involve a supervised learning phase. In this paper, we propose a new non-profiling horizontal attack using an unsupervised deep learning method called Deep Canonical Correlation Analysis. In this approach, we propose to use a siamese neural network to maximize the correlation between pairs of modular operation traces through canonical correlation analysis, projecting them into a highly correlated latent space that is more suitable for identifying operand collisions. Several experimental results, on simulated traces and a protected RSA implementation with up-to-date countermeasures, show how our proposal outperformed state-of-the-art attacks despite being simpler to implement. This suggests that the use of deep learning can be impactful for security evaluators, even in a non-profiling context and in a fully unsupervised way. <\/jats:p>","DOI":"10.62056\/ah5w7ta5v","type":"journal-article","created":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T21:23:17Z","timestamp":1744147397000},"update-policy":"https:\/\/doi.org\/10.62056\/adfjwm02dj","source":"Crossref","is-referenced-by-count":0,"title":["Unsupervised Horizontal Attacks against Public-Key Primitives with DCCA"],"prefix":"10.62056","volume":"2","author":[{"given":"Dorian","family":"Llavata","sequence":"first","affiliation":[{"name":"Univ. Grenoble Alpes, F-38000, Grenoble, France, CEA, LETI, MINATEC Campus, F-38054 Grenoble","place":["France."]},{"name":"Univ. Jean Monnet Saint-Etienne, CNRS, Institut d Optique Graduate School, Lab. Hubert Curien UMR 5516, F-42023, SAINT-ETIENNE","place":["France."]}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Eleonora","family":"Cagli","sequence":"additional","affiliation":[{"name":"Univ. Grenoble Alpes, F-38000, Grenoble, France, CEA, LETI, MINATEC Campus, F-38054 Grenoble","place":["France."]}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"R\u00e9mi","family":"Eyraud","sequence":"additional","affiliation":[{"name":"Univ. Jean Monnet Saint-Etienne, CNRS, Institut d Optique Graduate School, Lab. Hubert Curien UMR 5516, F-42023, SAINT-ETIENNE","place":["France."]}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vincent","family":"Grosso","sequence":"additional","affiliation":[{"name":"Univ. Jean Monnet Saint-Etienne, CNRS, Institut d Optique Graduate School, Lab. Hubert Curien UMR 5516, F-42023, SAINT-ETIENNE","place":["France."]}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lilian","family":"Bossuet","sequence":"additional","affiliation":[{"name":"Univ. Jean Monnet Saint-Etienne, CNRS, Institut d Optique Graduate School, Lab. Hubert Curien UMR 5516, F-42023, SAINT-ETIENNE","place":["France."]}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"48349","published-online":{"date-parts":[[2025,4,8]]},"reference":[{"key":"ref1:C:KocJafJun99","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","article-title":"Differential Power Analysis","volume":"1666","author":"Paul C. Kocher","year":"1999"},{"key":"ref2:CHES:GanMouOli01","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-44709-1_21","article-title":"Electromagnetic Analysis: Concrete Results","volume":"2162","author":"Karine Gandolfi","year":"2001"},{"key":"ref3:CHES:ChaRaoRoh02","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-36400-5_3","article-title":"Template Attacks","volume":"2523","author":"Suresh Chari","year":"2003"},{"key":"ref4:RSA:BJPW13","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-36095-4_1","article-title":"Horizontal and Vertical Side-Channel Attacks against Secure\n  RSA Implementations","volume":"7779","author":"Aur\u00e9lie Bauer","year":"2013"},{"key":"ref5:CHES:BriClaOli04","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","article-title":"Correlation Power Analysis with a Leakage Model","volume":"3156","author":"Eric Brier","year":"2004"},{"key":"ref6:CHES:Walter01","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/3-540-44709-1_24","article-title":"Sliding Windows Succumbs to Big Mac Attack","volume":"2162","author":"Colin D. Walter","year":"2001"},{"key":"ref7:ICICS:CFGR10","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/978-3-642-17650-0_5","article-title":"Horizontal Correlation Analysis on Exponentiation","volume":"6476","author":"Christophe Clavier","year":"2010"},{"key":"ref8:INDOCRYPT:CFGGRV12","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-642-34931-7_9","article-title":"ROSETTA for Single Trace Analysis","volume":"7668","author":"Christophe Clavier","year":"2012"},{"key":"ref9:DBLP:conf\/cardis\/HeyszlIMSS13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-319-08302-5_6","article-title":"Clustering Algorithms for Non-profiled Single-Execution\n  Attacks on Exponentiations","volume":"8419","author":"Johann Heyszl","year":"2013"},{"key":"ref10:COSADE:SHKS15","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-21476-4_1","article-title":"Improving Non-profiled Attacks on Exponentiations Based on\n  Clustering and Extracting Leakage from Multi-channel High-Resolution EM\n  Measurements","volume":"9064","author":"Robert Specht","year":"2015"},{"key":"ref11:DBLP:conf\/cardis\/PerinC15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-319-31271-2_3","article-title":"A Semi-Parametric Approach for Side-Channel Attacks on\n  Protected RSA Implementations","volume":"9514","author":"Guilherme Perin","year":"2015"},{"key":"ref12:DBLP:conf\/space\/MaghrebiPP16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-49445-6_1","article-title":"Breaking Cryptographic Implementations Using Deep Learning\n  Techniques","volume":"10076","author":"Houssem Maghrebi","year":"2016"},{"key":"ref13:CHES:CagDumPro17","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-319-66787-4_3","article-title":"Convolutional Neural Networks with Data Augmentation Against\n  Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing","volume":"10529","author":"Eleonora Cagli","year":"2017"},{"key":"ref14:JCEng:BPSCD20","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s13389-019-00220-8","article-title":"Deep learning for side-channel analysis and introduction to\n  ASCAD database","volume":"10","author":"Ryad Benadjila","year":"2020","journal-title":"Journal of Cryptographic Engineering"},{"key":"ref15:TCHES:ZBHV19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.13154\/tches.v2020.i1.1-36","article-title":"Methodology for Efficient CNN Architectures in Profiling\n  Attacks","volume":"2020","author":"Gabriel Zaid","year":"2019","journal-title":"IACR TCHES","ISSN":"https:\/\/id.crossref.org\/issn\/2569-2925","issn-type":"electronic"},{"key":"ref16:TCHES:CCCDD19","doi-asserted-by":"publisher","first-page":"132","DOI":"10.13154\/tches.v2019.i2.132-161","article-title":"Deep Learning to Evaluate Secure RSA Implementations","volume":"2019","author":"Mathieu Carbone","year":"2019","journal-title":"IACR TCHES","ISSN":"https:\/\/id.crossref.org\/issn\/2569-2925","issn-type":"electronic"},{"key":"ref17:TCHES:ZBHV21","doi-asserted-by":"publisher","first-page":"60","DOI":"10.46586\/tches.v2021.i3.60-96","article-title":"Efficiency through Diversity in Ensemble Models applied to\n  Side-Channel Attacks","volume":"2021","author":"Gabriel Zaid","year":"2021","journal-title":"IACR TCHES","ISSN":"https:\/\/id.crossref.org\/issn\/2569-2925","issn-type":"electronic"},{"key":"ref18:DBLP:conf\/atait\/ShimadaKFYF22","series-title":"CEUR Workshop Proceedings","first-page":"75","article-title":"Deep Learning-Based Side-Channel Attacks against\n  Software-Implemented RSA using Binary Exponentiation with Dummy\n  Multiplication","volume":"3198","author":"Seiya Shimada","year":"2022"},{"key":"ref19:DBLP:journals\/istr\/BarenghiCMPPS22","doi-asserted-by":"publisher","first-page":"103122","DOI":"10.1016\/J.JISA.2022.103122","article-title":"Profiled side channel attacks against the RSA cryptosystem\n  using neural networks","volume":"66","author":"Alessandro Barenghi","year":"2022","journal-title":"J. Inf. Secur. Appl."},{"key":"ref20:TCHES:Timon19","doi-asserted-by":"publisher","first-page":"107","DOI":"10.13154\/tches.v2019.i2.107-131","article-title":"Non-Profiled Deep Learning-based Side-Channel attacks with\n  Sensitivity Analysis","volume":"2019","author":"Benjamin Timon","year":"2019","journal-title":"IACR TCHES","ISSN":"https:\/\/id.crossref.org\/issn\/2569-2925","issn-type":"electronic"},{"key":"ref21:do2022mo","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1109\/atc55345.2022.9943024","article-title":"Mo-dlsca: Deep learning based non-profiled side channel\n  analysis using multi-output neural networks","author":"Ngoc-Tuan Do","year":"2022"},{"key":"ref22:DBLP:journals\/tches\/Staib023","doi-asserted-by":"publisher","first-page":"422","DOI":"10.46586\/TCHES.V2023.I3.422-444","article-title":"Deep Learning Side-Channel Collision Attack","volume":"2023","author":"Marvin Staib","year":"2023","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"ref23:TCHES:PCBP21","doi-asserted-by":"publisher","first-page":"343","DOI":"10.46586\/tches.v2021.i1.343-372","article-title":"Keep it Unsupervised: Horizontal Attacks Meet Deep\n  Learning","volume":"2021","author":"Guilherme Perin","year":"2021","journal-title":"IACR TCHES","ISSN":"https:\/\/id.crossref.org\/issn\/2569-2925","issn-type":"electronic"},{"key":"ref24:DBLP:journals\/access\/LeeHK22","doi-asserted-by":"publisher","first-page":"60778","DOI":"10.1109\/ACCESS.2022.3180742","article-title":"Single-Trace Attack Using One-Shot Learning With Siamese\n  Network in Non-Profiled Setting","volume":"10","author":"Nayeon Lee","year":"2022","journal-title":"IEEE Access"},{"key":"ref25:DBLP:journals\/ibmsj\/Comba90","doi-asserted-by":"publisher","first-page":"526","DOI":"10.1147\/SJ.294.0526","article-title":"Exponentiation Cryptosystems on the IBM PC","volume":"29","author":"Paul G. Comba","year":"1990","journal-title":"IBM Syst. J."},{"key":"ref26:karatsuba1963multiplication","first-page":"595","article-title":"Multiplication of multidigit numbers on automata","volume":"7","author":"Anatolii Karatsuba","year":"1963"},{"key":"ref27:montgomery1985modular","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1090\/S0025-5718-1985-0777282-X","article-title":"Modular multiplication without trial division","volume":"44","author":"Peter L Montgomery","year":"1985","journal-title":"Mathematics of computation"},{"key":"ref28:DBLP:journals\/tc\/RaffertyMH17","doi-asserted-by":"publisher","first-page":"1369","DOI":"10.1109\/TC.2017.2677426","article-title":"Evaluation of Large Integer Multiplication Methods on\n  Hardware","volume":"66","author":"Ciara Rafferty","year":"2017","journal-title":"IEEE Trans. Computers"},{"key":"ref29:CHES:Coron99","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/3-540-48059-5_25","article-title":"Resistance against Differential Power Analysis for Elliptic\n  Curve Cryptosystems","volume":"1717","author":"Jean-S\u00e9bastien Coron","year":"1999"},{"key":"ref30:CHES:JoyYen02","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/3-540-36400-5_22","article-title":"The Montgomery Powering Ladder","volume":"2523","author":"Marc Joye","year":"2003"},{"key":"ref31:DBLP:journals\/tc\/Chevallier-MamesCJ04","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1109\/TC.2004.13","article-title":"Low-Cost Solutions for Preventing Simple Side-Channel\n  Analysis: Side-Channel Atomicity","volume":"53","author":"Beno\u00eet Chevallier-Mames","year":"2004","journal-title":"IEEE Trans. Computers"},{"key":"ref32:DBLP:conf\/ches\/FouqueV03","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/978-3-540-45238-6_22","article-title":"The Doubling Attack - Why Upwards Is Better than\n  Downwards","volume":"2779","author":"Pierre-Alain Fouque","year":"2003"},{"key":"ref33:DBLP:conf\/ches\/HommaMASS08","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-3-540-85053-3_2","article-title":"Collision-Based Power Analysis of Modular Exponentiation\n  Using Chosen-Message Pairs","volume":"5154","author":"Naofumi Homma","year":"2008"},{"key":"ref34:CHES:PouZhoSta17","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1007\/978-3-319-66787-4_26","article-title":"A Systematic Approach to the Side-Channel Analysis of ECC\n  Implementations with Worst-Case Horizontal Attacks","volume":"10529","author":"Romain Poussier","year":"2017"},{"key":"ref35:COSADE:PITM14","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-319-10175-0_11","article-title":"Attacking Randomized Exponentiations Using Unsupervised\n  Learning","volume":"8622","author":"Guilherme Perin","year":"2014"},{"key":"ref36:RSA:WitVanMen11","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-642-19074-2_6","article-title":"Defeating RSA Multiply-Always and Message Blinding\n  Countermeasures","volume":"6558","author":"Marc F. Witteman","year":"2011"},{"key":"ref37:RSA:HanKimTun15","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/978-3-319-16715-2_23","article-title":"Exploiting Collisions in Addition Chain-Based Exponentiation\n  Algorithms Using a Single Trace","volume":"9048","author":"Neil Hanley","year":"2015"},{"key":"ref38:COSADE:SugSuzSae15","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/978-3-319-21476-4_5","article-title":"Two Operands of Multipliers in Side-Channel Attack","volume":"9064","author":"Takeshi Sugawara","year":"2015"},{"key":"ref39:DBLP:books\/daglib\/0040158","series-title":"Adaptive computation and machine learning","isbn-type":"print","volume-title":"Deep Learning","author":"Ian J. Goodfellow","year":"2016","ISBN":"https:\/\/id.crossref.org\/isbn\/9780262035613"},{"key":"ref40:DBLP:journals\/neco\/BaldiC93","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1162\/NECO.1993.5.3.402","article-title":"Neural Networks for Fingerprint Recognition","volume":"5","author":"Pierre Baldi","year":"1993","journal-title":"Neural Comput."},{"key":"ref41:DBLP:conf\/cvpr\/ChopraHL05","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1109\/CVPR.2005.202","article-title":"Learning a Similarity Metric Discriminatively, with\n  Application to Face Verification","author":"Sumit Chopra","year":"2005"},{"key":"ref42:DBLP:conf\/ctrsa\/MukhtarBPK22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/978-3-030-95312-6_13","article-title":"Fake It Till You Make It: Data Augmentation Using Generative\n  Adversarial Networks for All the Crypto You Need on Small Devices","volume":"13161","author":"Naila Mukhtar","year":"2022"},{"key":"ref43:DBLP:journals\/tjs\/LiLO24","doi-asserted-by":"publisher","first-page":"4423","DOI":"10.1007\/S11227-023-05631-3","article-title":"Side-channel analysis based on Siamese neural network","volume":"80","author":"Di Li","year":"2024","journal-title":"J. Supercomput."},{"key":"ref44:liew2016gender","doi-asserted-by":"publisher","first-page":"1248","DOI":"10.3906\/elk-1311-58","article-title":"Gender classification: a convolutional neural network\n  approach","volume":"24","author":"Shan Sung Liew","year":"2016","journal-title":"Turkish Journal of Electrical Engineering and Computer\n  Sciences"},{"key":"ref45:kettenring1971canonical","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1093\/biomet\/58.3.433","article-title":"Canonical analysis of several sets of variables","volume":"58","author":"Jon R Kettenring","year":"1971","journal-title":"Biometrika"},{"key":"ref46:DBLP:conf\/aaai\/SunSSL20","doi-asserted-by":"publisher","first-page":"8992","DOI":"10.1609\/AAAI.V34I05.6431","article-title":"Learning Relationships between Text, Audio, and Video via\n  Deep Canonical Correlation for Multimodal Language Analysis","author":"Zhongkai Sun","year":"2020"},{"key":"ref47:martin1979multivariate","article-title":"Multivariate analysis","author":"Nick Martin","year":"1979","journal-title":"London, UK: Academic"},{"key":"ref48:DBLP:journals\/ijns\/LaiF00","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1142\/S012906570000034X","article-title":"Kernel and Nonlinear Canonical Correlation Analysis","volume":"10","author":"Pei Ling Lai","year":"2000","journal-title":"Int. J. Neural Syst."},{"key":"ref49:DBLP:conf\/icml\/AndrewABL13","series-title":"JMLR Workshop and Conference Proceedings","first-page":"1247","article-title":"Deep Canonical Correlation Analysis","volume":"28","author":"Galen Andrew","year":"2013"},{"key":"ref50:shen2023extraordinarily","doi-asserted-by":"publisher","DOI":"10.1109\/tnnls.2023.3282785","article-title":"Extraordinarily Time-and Memory-Efficient Large-Scale\n  Canonical Correlation Analysis in Fourier Domain: From Shallow to Deep","author":"Xiang-Jun Shen","year":"2023","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"ref51:DBLP:conf\/cvpr\/YanM15","doi-asserted-by":"publisher","first-page":"3441","DOI":"10.1109\/CVPR.2015.7298966","article-title":"Deep correlation for matching images and text","author":"Fei Yan","year":"2015"},{"key":"ref52:DBLP:conf\/aaai\/GaoLWS20","doi-asserted-by":"publisher","first-page":"3938","DOI":"10.1609\/AAAI.V34I04.5808","article-title":"Cross-Modal Subspace Clustering via Deep Canonical\n  Correlation Analysis","author":"Quanxue Gao","year":"2020"},{"key":"ref53:DBLP:conf\/cccv\/JiYP17","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-981-10-7305-2_19","article-title":"Zero-Shot Learning with Deep Canonical Correlation\n  Analysis","volume":"773","author":"Zhong Ji","year":"2017"},{"key":"ref54:DBLP:conf\/iconip\/QiuLL18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/978-3-030-04221-9_20","article-title":"Multi-view Emotion Recognition Using Deep Canonical\n  Correlation Analysis","volume":"11305","author":"Jie-Lin Qiu","year":"2018"},{"key":"ref55:de2003regularization","first-page":"785","article-title":"On the regularization of canonical correlation analysis","author":"Tijl De Bie","year":"2003","journal-title":"Int. Sympos. ICA and BSS"},{"key":"ref56:neuenschwander1995common","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1093\/biomet\/82.3.553","article-title":"Common canonical variates","volume":"82","author":"Beat E Neuenschwander","year":"1995","journal-title":"Biometrika"},{"key":"ref57:gonzales2006comparison","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1016\/j.jfoodeng.2005.03.007","article-title":"A comparison of seven thresholding techniques with the\n  K-means clustering algorithm for measurement of bread-crumb features by\n  digital image analysis","volume":"74","author":"Ursula Gonzales-Barron","year":"2006","journal-title":"Journal of food engineering"},{"key":"ref58:DBLP:conf\/his\/LiuY09","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1109\/HIS.2009.74","article-title":"Otsu Method and K-means","author":"Dongju Liu","year":"2009"},{"key":"ref59:DBLP:journals\/pr\/ArbelaitzGMPP13","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1016\/J.PATCOG.2012.07.021","article-title":"An extensive comparative study of cluster validity indices","volume":"46","author":"Olatz Arbelaitz","year":"2013","journal-title":"Pattern Recognit."},{"key":"ref60:rousseeuw1987silhouettes","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/0377-0427(87)90125-7","article-title":"Silhouettes: a graphical aid to the interpretation and\n  validation of cluster analysis","volume":"20","author":"Peter J Rousseeuw","year":"1987","journal-title":"Journal of computational and applied mathematics"},{"key":"ref61:DBLP:conf\/nips\/KlambauerUMH17","first-page":"971","article-title":"Self-Normalizing Neural Networks","author":"G\u00fcnter Klambauer","year":"2017"},{"key":"ref62:DBLP:journals\/corr\/abs-1908-05349","article-title":"Multimodal Emotion Recognition Using Deep Canonical\n  Correlation Analysis","volume":"abs\/1908.05349","author":"Wei Liu","year":"2019","journal-title":"CoRR"},{"key":"ref63:DBLP:conf\/icml\/IoffeS15","series-title":"JMLR Workshop and Conference Proceedings","first-page":"448","article-title":"Batch Normalization: Accelerating Deep Network Training by\n  Reducing Internal Covariate Shift","volume":"37","author":"Sergey Ioffe","year":"2015"},{"key":"ref64:CHES:PouStaGro16","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-662-53140-2_4","article-title":"Simple Key Enumeration (and Rank Estimation) Using\n  Histograms: An Integrated Approach","volume":"9813","author":"Romain Poussier","year":"2016"},{"key":"ref65:DBLP:journals\/tches\/SaitoIUH22","doi-asserted-by":"publisher","first-page":"490","DOI":"10.46586\/TCHES.V2022.I4.490-526","article-title":"One Truth Prevails: A Deep-learning Based Single-Trace\n  Power Analysis on RSA-CRT with Windowed Exponentiation","volume":"2022","author":"Kotaro Saito","year":"2022","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"ref66:DBLP:journals\/air\/NarkhedeBS22","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/S10462-021-10033-Z","article-title":"A review on weight initialization strategies for neural\n  networks","volume":"55","author":"Meenal V. Narkhede","year":"2022","journal-title":"Artif. Intell. Rev."},{"key":"ref67:DBLP:conf\/nips\/JaderbergSZK15","first-page":"2017","article-title":"Spatial Transformer Networks","author":"Max Jaderberg","year":"2015"},{"key":"ref68:DBLP:conf\/sacair\/MoutonMD20","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/978-3-030-66151-9_17","article-title":"Stride and Translation Invariance in CNNs","volume":"1342","author":"Coenraad Mouton","year":"2020"},{"key":"ref69:DBLP:conf\/cvpr\/HeZRS16","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1109\/CVPR.2016.90","article-title":"Deep Residual Learning for Image Recognition","author":"Kaiming He","year":"2016"},{"key":"ref70:DBLP:journals\/corr\/abs-1801-01450","article-title":"Quantifying Translation-Invariance in Convolutional Neural\n  Networks","volume":"abs\/1801.01450","author":"Eric Kauderer-Abrams","year":"2018","journal-title":"CoRR"},{"key":"ref71:DBLP:conf\/cosade\/GrossoCCD23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/978-3-031-29497-6_9","article-title":"Punctured Syndrome Decoding Problem - Efficient Side-Channel\n  Attacks Against Classic McEliece","volume":"13979","author":"Vincent Grosso","year":"2023"},{"key":"ref72:bitzer2025lose","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10623-025-01603-1","article-title":"How to lose some weight: a practical template syndrome\n  decoding attack","author":"Sebastian Bitzer","year":"2025","journal-title":"Designs, Codes and Cryptography"},{"key":"ref73:C:IshSahWag03","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1007\/978-3-540-45146-4_27","article-title":"Private Circuits: Securing Hardware against Probing\n  Attacks","volume":"2729","author":"Yuval Ishai","year":"2003"},{"key":"ref74:ACNS:HerOswMan06","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/11767480_16","article-title":"An AES Smart Card Implementation Resistant to Power\n  Analysis Attacks","volume":"3989","author":"Christoph Herbst","year":"2006"},{"key":"ref75:DBLP:journals\/ccds\/BauerJPRW15","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/S12095-014-0111-8","article-title":"Horizontal collision correlation attack on elliptic curves -\n  - Extended Version -","volume":"7","author":"Aur\u00e9lie Bauer","year":"2015","journal-title":"Cryptogr. Commun."}],"container-title":["IACR Communications in Cryptology"],"original-title":[],"language":"en","deposited":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T21:25:14Z","timestamp":1744147514000},"score":1,"resource":{"primary":{"URL":"https:\/\/cic.iacr.org\/p\/2\/1\/32"}},"subtitle":["- From Deep Canonical Correlation Analysis   to Deep Collision Correlation Attacks -"],"short-title":[],"issued":{"date-parts":[[2025,4,8]]},"references-count":75,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,4,8]]}},"URL":"https:\/\/doi.org\/10.62056\/ah5w7ta5v","archive":["Internet Archive","Internet Archive"],"relation":{},"ISSN":["3006-5496"],"issn-type":[{"type":"electronic","value":"3006-5496"}],"subject":[],"published":{"date-parts":[[2025,4,8]]},"assertion":[{"value":"2025-01-13","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-11","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"cc2-1-55"}}