A. Hd, accuracy (b) AES HD, value model, accuracy

A. Hd-;-choudary, O. Kuhn, and M. G. , accuracy (e) AES HD, value model, guessing entropy References 1, Smart Card Research and Advanced Applications-12th International Conference, CARDIS 2013, vol.8419, pp.253-270, 2013.

S. Chari, J. R. Rao, and P. Rohatgi, Template Attacks, LNCS, vol.2523, pp.13-28, 2002.
DOI : 10.1007/3-540-36400-5_3

URL : https://link.springer.com/content/pdf/10.1007%2F3-540-36400-5_3.pdf

A. Heuser and M. Zohner, Intelligent Machine Homicide-Breaking Cryptographic Devices Using Support Vector Machines, LNCS, vol.7275, pp.249-264, 2012.

E. Cagli, C. Dumas, and E. Prouff, Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures-Profiling Attacks Without Preprocessing, Cryptographic Hardware and Embedded Systems-CHES 201719th International Conference, pp.45-68, 2017.
DOI : 10.1007/978-3-319-66787-4_3

URL : https://hal.archives-ouvertes.fr/hal-01661212/file/740.pdf

S. Picek, A. Heuser, A. Jovic, S. A. Ludwig, S. Guilley et al., Side-channel analysis and machine learning: A practical perspective, 2017 International Joint Conference on Neural Networks, pp.4095-4102, 2017.
DOI : 10.1109/ijcnn.2017.7966373

URL : https://hal.archives-ouvertes.fr/hal-01628681

S. Picek, A. Heuser, A. Jovic, S. Bhasin, and F. Regazzoni, The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations, IACR Transactions on Cryptographic Hardware and Embedded Systems, vol.2019, pp.209-237, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01935318

D. H. Wolpert, The Lack of a Priori Distinctions Between Learning Algorithms, Neural Comput, vol.8, issue.7, pp.1341-1390, 1996.

L. Valiant, Probably Approximately Correct: Nature's Algorithms for Learning and Prospering in a Complex World, 2013.

P. C. Kocher, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, Proceedings of CRYPTO'96, vol.1109, pp.104-113, 1996.

P. C. Kocher, J. Jaffe, and B. Jun, Differential power analysis, Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology. CRYPTO '99, pp.388-397, 1999.

J. J. Quisquater and D. Samyde, Electromagnetic analysis (ema): Measures and counter-measures for smart cards, Smart Card Programming and Security, pp.200-210, 2001.

D. Genkin, A. Shamir, and E. Tromer, Acoustic cryptanalysis, Journal of Cryptology, vol.30, issue.2, pp.392-443, 2017.

A. Heuser, O. Rioul, and S. Guilley, Good is Not Good Enough-Deriving Optimal Distinguishers from Communication Theory, Lecture Notes in Computer Science, vol.8731, 2014.

L. Lerman, R. Poussier, G. Bontempi, O. Markowitch, and F. Standaert, Template attacks vs. machine learning revisited (and the curse of dimensionality in side-channel analysis), Constructive SideChannel Analysis and Secure Design-6th International Workshop, COSADE 2015, vol.9064, pp.20-33, 2015.

W. Schindler, K. Lemke, and C. Paar, A Stochastic Model for Differential Side Channel Cryptanalysis, LNCS, vol.3659, pp.30-46, 2005.

G. Hospodar, B. Gierlichs, E. De-mulder, I. Verbauwhede, and J. Vandewalle, Machine learning in side-channel analysis: a first study, Journal of Cryptographic Engineering, vol.1, pp.293-302, 2011.

L. Lerman, G. Bontempi, and O. Markowitch, Power analysis attack: An approach based on machine learning, Int. J. Appl. Cryptol, vol.3, issue.2, pp.97-115, 2014.

L. Lerman, G. Bontempi, and O. Markowitch, A machine learning approach against a masked AES-Reaching the limit of side-channel attacks with a learning model, J. Cryptographic Engineering, vol.5, issue.2, pp.123-139, 2015.

L. Lerman, S. F. Medeiros, G. Bontempi, and O. Markowitch, A Machine Learning Approach Against a Masked AES, CARDIS. Lecture Notes in Computer Science, 2013.

S. Picek, A. Heuser, and S. Guilley, Template attack versus Bayes classifier, Journal of Cryptographic Engineering, vol.7, issue.4, pp.343-351, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01629884

R. Gilmore, N. Hanley, and M. O'neill, Neural network based attack on a masked implementation of AES, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp.106-111, 2015.

A. Heuser, S. Picek, S. Guilley, and N. Mentens, Lightweight ciphers and their sidechannel resilience, IEEE Transactions on Computers, issue.99, pp.1-1, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01629886

H. Maghrebi, T. Portigliatti, and E. Prouff, Breaking cryptographic implementations using deep learning techniques, Security, Privacy, and Applied Cryptography Engineering-6th International Conference, pp.3-26, 2016.

C. Alippi, Intelligence for Embedded Systems: A Methodological Approach, 2014.

W. Rudin, Real and Complex Analysis, 1987.

H. Chernoff, A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations, Ann. Math. Statist, vol.23, issue.4, pp.493-507, 1952.

W. Hoeffding, Probability inequalities for sums of bounded random variables, Journal of the American Statistical Association, vol.58, issue.301, pp.13-30, 1963.

T. Paristech and S. Research, DPA Contest, pp.2013-2014

J. Coron and I. Kizhvatov, An Efficient Method for Random Delay Generation in Embedded Software, Cryptographic Hardware and Embedded Systems-CHES 2009, 11th International Workshop, pp.156-170, 2009.

G. James, D. Witten, T. Hastie, and R. Tibsihrani, An Introduction to Statistical Learning. Springer Texts in Statistics, 2001.

M. Fernández-delgado, E. Cernadas, S. Barro, and D. Amorim, Do we Need Hundreds of Classifiers to Solve Real World Classification Problems, Journal of Machine Learning Research, vol.15, pp.3133-3181, 2014.

N. Friedman, D. Geiger, and M. Goldszmidt, Bayesian Network Classifiers, Machine Learning, vol.29, issue.2, pp.131-163, 1997.

R. E. Fan, P. H. Chen, and C. J. Lin, Working Set Selection Using Second Order Information for Training Support Vector Machines, J. Mach. Learn. Res, vol.6, pp.1889-1918, 2005.

L. Breiman, Random Forests, Machine Learning, vol.45, issue.1, pp.5-32, 2001.

I. Goodfellow, Y. Bengio, and A. Courville, (a) DPAv4, HW model, success rate (b) DPAv4, value model, success rate (c) AES HD, HW model, success rate (d) AES HD, value model, success rate (e) Random Delay, HW model, success rate (f) Random Delay, value model, success rate (a) DPAv4, HW model, accuracy, SVM and SVM with optimized hyperparameters for this scenario (b) DPAv4, HW model, guessing entropy, 2016.