Good is Not Good Enough-Deriving Optimal Distinguishers from Communication Theory, Lecture Notes in Computer Science, vol.8731, 2014. ,
Template attacks vs. machine learning revisited (and the curse of dimensionality in sidechannel analysis), COSADE 2015, pp.20-33, 2015. ,
Intelligent Machine Homicide-Breaking Cryptographic Devices Using Support Vector Machines, LNCS, vol.7275, pp.249-264, 2012. ,
Template attack versus bayes classifier, Journal of Cryptographic Engineering, vol.7, issue.4, pp.343-351, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01629884
Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures-Profiling Attacks Without Preprocessing, CHES 2017, vol.10529, pp.45-68, 2017. ,
Clustering Algorithms for Non-Profiled Single-Execution Attacks on Exponentiations, CARDIS. Lecture Notes in Computer Science, 2013. ,
Breaking Cryptographic Implementations Using Deep Learning Techniques, SPACE 2016, vol.10076, pp.3-26, 2016. ,
On the performance of convolutional neural networks for side-channel analysis, Security, Privacy, and Applied Cryptography Engineering, pp.157-176, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-02010591
The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations, IACR Transactions on Cryptographic Hardware and Embedded Systems, vol.2019, pp.209-237, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01935318
Semi-supervised template attack, COSADE 2013, pp.184-199, 2013. ,
Pattern classification and clustering: A review of partially supervised learning approaches, Pattern Recognition Letters, vol.37, pp.4-14, 2014. ,
Semi-Supervised Learning. 1st edn, 2010. ,
Efficient Non-Parametric Function Induction in Semi-Supervised Learning, 2004. ,
Scikit-learn: Machine Learning in Python, Journal of Machine Learning Research, vol.12, pp.2825-2830, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00650905
Template Attacks, LNCS, vol.2523, pp.13-28, 2002. ,
Efficient template attacks, Smart Card Research and Advanced Applications-12th International Conference, vol.8419, pp.253-270, 2013. ,
An Algorithm for Finding Best Matches in Logarithmic Expected Time, ACM Trans. Math. Softw, vol.3, issue.3, pp.209-226, 1977. ,
Neural Networks: A Comprehensive Foundation, 1998. ,
Random forests, Machine Learning, vol.45, issue.1, pp.5-32, 2001. ,
, DPA Contest, pp.2013-2014
An Efficient Method for Random Delay Generation in Embedded Software, Cryptographic Hardware and Embedded Systems-CHES 2009, 11th International Workshop, pp.156-170, 2009. ,
A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices, Advances in Cryptology-EUROCRYPT 2011, vol.6632, pp.109-128, 2011. ,
Template Attacks on Different Devices, Constructive Side-Channel Analysis and Secure Design: 5th International Workshop, pp.179-198, 2014. ,