TensorFlow: Large-scale machine learning on heterogeneous systems, Oriol Vinyals, 2015. ,
Applying Support Vector Machines to Imbalanced Datasets, Machine Learning: ECML 2004, pp.39-50, 2004. ,
Countering Early Evaluation: An Approach Towards Robust Dual-Rail Precharge Logic, WESS. ACM, vol.3156, pp.16-29, 2004. ,
François-Xavier Standaert, and Nicolas Veyrat-Charvillon. Mutual Information Analysis: a Comprehensive Study, J. Cryptology, vol.24, issue.2, pp.269-291, 2011. ,
Optimal classifier for imbalanced data using Matthews Correlation Coefficient metric, PLOS ONE, vol.12, issue.6, pp.1-17, 2017. ,
A Study of the Behavior of Several Methods for Balancing Machine Learning Training Data, SIGKDD Explor. Newsl, vol.6, issue.1, pp.20-29, 2004. ,
Random Forests, Machine Learning, vol.45, pp.5-32, 2001. ,
Smote: Synthetic minority over-sampling technique, J. Artif. Int. Res, vol.16, issue.1, pp.321-357, 2002. ,
Convolutional Neural Networks with Data Augmentation Against Jitter-Based CountermeasuresProfiling Attacks Without Pre-processing, Cryptographic Hardware and Embedded Systems-CHES 2017-19th International Conference, pp.45-68, 2017. ,
, International Cryptographic Module Conference (ICMC), 2013.
An Efficient Method for Random Delay Generation in Embedded Software, Cryptographic Hardware and Embedded Systems-CHES 2009, 11th International Workshop, pp.156-170, 2009. ,
Efficient template attacks, Smart Card Research and Advanced Applications-12th International Conference, CARDIS 2013, vol.8419, pp.253-270, 2013. ,
A Coefficient of Agreement for Nominal Scales, Educational and Psychological Measurement, vol.20, issue.1, pp.37-46, 1960. ,
Template Attacks, CHES, volume 2523 of LNCS, pp.13-28, 2002. ,
The Effect of Data Sampling When Using Random Forest on Imbalanced Bioinformatics Data, 2015 IEEE International Conference on Information Reuse and Integration, pp.457-463, 2015. ,
Univariate side channel attacks and leakage modeling, J. Cryptographic Engineering, vol.1, issue.2, pp.123-144, 2011. ,
From improved leakage detection to the detection of points of interests in leakage traces, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.240-262, 2016. ,
Active Learning for Class Imbalance Problem, Proceedings of the 30th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR '07, pp.823-824, 2007. ,
Working Set Selection Using Second Order Information for Training Support Vector Machines, J. Mach. Learn. Res, vol.6, pp.1889-1918, 2005. ,
Do we Need Hundreds of Classifiers to Solve Real World Classification Problems, Journal of Machine Learning Research, vol.15, pp.3133-3181, 2014. ,
Neural network based attack on a masked implementation of AES, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp.106-111, 2015. ,
Learning from Imbalanced Data, IEEE Trans. on Knowl. and Data Eng, vol.21, issue.9, pp.1263-1284, 2009. ,
Machine learning in side-channel analysis: a first study, Journal of Cryptographic Engineering, vol.1, pp.293-302, 2011. ,
, Shivam Bhasin and Francesco Regazzoni, vol.231
Lightweight ciphers and their side-channel resilience, IEEE Transactions on Computers, issue.99, pp.1-1, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01629886
Intelligent Machine Homicide-Breaking Cryptographic Devices Using Support Vector Machines, LNCS, vol.7275, pp.249-264, 2012. ,
Facing Imbalanced Data-Recommendations for the Use of Performance Metrics, Proceedings of the 2013 Humaine Association Conference on Affective Computing and Intelligent Interaction, ACII '13, pp.245-251, 2013. ,
An Introduction to Statistical Learning. Springer Texts in Statistics, 2001. ,
Learning from imbalanced data: open challenges and future directions, The handbook of brain theory and neural networks, vol.5, pp.221-232, 1995. ,
A machine learning approach against a masked AES-Reaching the limit of side-channel attacks with a learning model, J. Cryptographic Engineering, vol.5, issue.2, pp.123-139, 2015. ,
Class Imbalance Problem in Data Mining Review, CoRR, abs/1305.1707, 2013. ,
, CARDIS, 2013.
Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis), COSADE 2015, pp.20-33, 2015. ,
Comparison of the predicted and observed secondary structure of T4 phage lysozyme, Biochimica et Biophysica Acta (BBA)Protein Structure, vol.405, issue.2, pp.442-451, 1975. ,
Power Analysis Attacks: Revealing the Secrets of Smart Cards, 2006. ,
Breaking cryptographic implementations using deep learning techniques, Security, Privacy, and Applied Cryptography Engineering-6th International Conference, SPACE 2016, pp.3-26, 2016. ,
Automatic differentiation in pytorch, 2017. ,
Template attack versus Bayes classifier, Journal of Cryptographic Engineering, vol.7, issue.4, pp.343-351, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01629884
Side-channel analysis and machine learning: A practical perspective, 2017 International Joint Conference on Neural Networks, pp.4095-4102, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01628681
On the performance of convolutional neural networks for side-channel analysis, Cryptology ePrint Archive, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-02010591
Scikit-learn: Machine learning in Python, Journal of Machine Learning Research, vol.12, pp.2825-2830, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00650905
A Stochastic Model for Differential Side Channel Cryptanalysis, LNCS, vol.3659, pp.30-46, 2005. ,
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, EUROCRYPT, vol.5479, pp.443-461, 2009. ,
On the masking countermeasure and higher-order power analysis attacks, International Conference on Information Technology: Coding and Computing (ITCC'05, vol.II, pp.562-567, 2005. ,
, , pp.2013-2014
Asymptotic Properties of Nearest Neighbor Rules Using Edited Data, IEEE Transactions on Systems, Man, and Cybernetics, SMC, vol.2, issue.3, pp.408-421, 1972. ,