Differential Power Analysis, Proceedings of CRYPTO'99, pp.388-397, 1999. ,
DOI : 10.1007/3-540-48405-1_25
Electromagnetic Analysis: Concrete Results, Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems. CHES '01, pp.251-261, 2001. ,
DOI : 10.1007/3-540-44709-1_21
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.5990
Machine learning in side-channel analysis: a first study, Journal of Cryptographic Engineering, vol.51, issue.4, pp.293-302, 2011. ,
DOI : 10.1007/s13389-011-0023-x
A machine learning approach against a masked AES, Journal of Cryptographic Engineering, vol.7, issue.15, pp.123-139, 2015. ,
DOI : 10.1007/s13389-014-0089-3
The Design of Rijndael: AES -The Advanced Encryption Standard, 2002. ,
DOI : 10.1007/978-3-662-04722-4
KLEIN: A New Family of Lightweight Block Ciphers, pp.1-18, 2012. ,
DOI : 10.1007/978-3-642-25286-0_1
PRESENT: An Ultra-Lightweight Block Cipher, LNCS, vol.4727, pp.450-466, 2007. ,
DOI : 10.1007/978-3-540-74735-2_31
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.122.2536
RECTANGLE: ?????????????????????????????????????????????????????????, Science China Information Sciences, vol.41, issue.12, pp.1-15, 2015. ,
DOI : 10.1007/s11432-015-5459-7
Improving the security and efficiency of block ciphers based on LS-designs, Designs, Codes and Cryptography, vol.82, issue.1-2, pp.1-15, 2016. ,
DOI : 10.1007/s10623-016-0193-8
URL : https://hal.archives-ouvertes.fr/hal-01276503
Block Ciphers That Are Easier to Mask: How Far Can We Go?, pp.383-399 ,
DOI : 10.1007/978-3-642-40349-1_22
LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations, pp.18-37, 2015. ,
DOI : 10.1007/978-3-662-46706-0_2
URL : https://hal.archives-ouvertes.fr/hal-01093491
A Statistical Model for DPA with Novel Algorithmic Confusion Analysis, LNCS, vol.7428, pp.233-250, 2012. ,
DOI : 10.1007/978-3-642-33027-8_14
Success through Confidence: Evaluating the Effectiveness of a Side-Channel Attack, pp.27-48 ,
DOI : 10.1007/978-3-642-40349-1_2
Correlation Power Analysis with a Leakage Model, LNCS, vol.3156, pp.16-29, 2004. ,
DOI : 10.1007/978-3-540-28632-5_2
Advanced Encryption Standard (AES) FIPS PUB 197, 2001. ,
Finding Optimal Bitsliced Implementations of 4 4-bit S-Boxes, SKEW 2011 Symmetric Key Encryption Workshop, 2011. ,
The Elements of Statistical Learning. Springer Series in Statistics, 2001. ,
A Key to Success -Success Exponents for Side- Channel Distinguishers, Progress in Cryptology - INDOCRYPT 2015 -16th International Conference on Cryptology in India Proceedings. Volume 9462 of Lecture Notes in Computer Science, pp.270-290, 2015. ,
Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes, Progress in Cryptology ? INDOCRYPT 2014: 15th International Conference on Cryptology in India, pp.374-390, 2014. ,
DOI : 10.1007/978-3-319-13039-2_22
Machine Learning. 1 edn, 1997. ,
Template Attacks, In: CHES. LNCS, vol.2523, pp.13-28, 2002. ,
DOI : 10.1007/3-540-36400-5_3
C4.5: Programs for Machine Learning, 1993. ,
Generating Accurate Rule Sets Without Global Optimization, Fifteenth International Conference on Machine Learning, pp.144-151, 1998. ,
Links between perceptrons, MLPs and SVMs, Twenty-first international conference on Machine learning , ICML '04, p.23, 2004. ,
DOI : 10.1145/1015330.1015415
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.7582