A. Heuser, O. Rioul, and S. Guilley, Good is Not Good Enough-Deriving Optimal Distinguishers from Communication Theory, Lecture Notes in Computer Science, vol.8731, 2014.

L. Lerman, R. Poussier, G. Bontempi, O. Markowitch, and F. Standaert, Template attacks vs. machine learning revisited (and the curse of dimensionality in sidechannel analysis), COSADE 2015, pp.20-33, 2015.

A. Heuser and M. Zohner, Intelligent Machine Homicide-Breaking Cryptographic Devices Using Support Vector Machines, LNCS, vol.7275, pp.249-264, 2012.

S. Picek, A. Heuser, and S. Guilley, Template attack versus bayes classifier, Journal of Cryptographic Engineering, vol.7, issue.4, pp.343-351, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01629884

E. Cagli, C. Dumas, and E. Prouff, Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures-Profiling Attacks Without Preprocessing, CHES 2017, vol.10529, pp.45-68, 2017.

J. Heyszl, A. Ibing, S. Mangard, F. D. Santis, and G. Sigl, Clustering Algorithms for Non-Profiled Single-Execution Attacks on Exponentiations, CARDIS. Lecture Notes in Computer Science, 2013.

H. Maghrebi, T. Portigliatti, and E. Prouff, Breaking Cryptographic Implementations Using Deep Learning Techniques, SPACE 2016, vol.10076, pp.3-26, 2016.

S. Picek, I. P. Samiotis, J. Kim, A. Heuser, S. Bhasin et al., On the performance of convolutional neural networks for side-channel analysis, Security, Privacy, and Applied Cryptography Engineering, pp.157-176, 2018.
URL : https://hal.archives-ouvertes.fr/hal-02010591

S. Picek, A. Heuser, A. Jovic, S. Bhasin, and F. Regazzoni, The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations, IACR Transactions on Cryptographic Hardware and Embedded Systems, vol.2019, pp.209-237, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01935318

L. Lerman, S. F. Medeiros, N. Veshchikov, C. Meuter, G. Bontempi et al., Semi-supervised template attack, COSADE 2013, pp.184-199, 2013.

F. Schwenker and E. Trentin, Pattern classification and clustering: A review of partially supervised learning approaches, Pattern Recognition Letters, vol.37, pp.4-14, 2014.

O. Chapelle, B. Schlkopf, and A. Zien, Semi-Supervised Learning. 1st edn, 2010.

Y. Bengio, O. Delalleau, and N. Le-roux, Efficient Non-Parametric Function Induction in Semi-Supervised Learning, 2004.

F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion et al., Scikit-learn: Machine Learning in Python, Journal of Machine Learning Research, vol.12, pp.2825-2830, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00650905

S. Chari, J. R. Rao, and P. Rohatgi, Template Attacks, LNCS, vol.2523, pp.13-28, 2002.

O. Choudary and M. G. Kuhn, Efficient template attacks, Smart Card Research and Advanced Applications-12th International Conference, vol.8419, pp.253-270, 2013.

J. H. Friedman, J. L. Bentley, and R. A. Finkel, An Algorithm for Finding Best Matches in Logarithmic Expected Time, ACM Trans. Math. Softw, vol.3, issue.3, pp.209-226, 1977.

S. Haykin, Neural Networks: A Comprehensive Foundation, 1998.

L. Breiman, Random forests, Machine Learning, vol.45, issue.1, pp.5-32, 2001.

T. Paristech and S. Research, DPA Contest, pp.2013-2014

J. Coron and I. Kizhvatov, An Efficient Method for Random Delay Generation in Embedded Software, Cryptographic Hardware and Embedded Systems-CHES 2009, 11th International Workshop, pp.156-170, 2009.

M. Renauld, F. Standaert, N. Veyrat-charvillon, D. Kamel, and D. Flandre, A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices, Advances in Cryptology-EUROCRYPT 2011, vol.6632, pp.109-128, 2011.

O. Choudary and M. G. Kuhn, Template Attacks on Different Devices, Constructive Side-Channel Analysis and Secure Design: 5th International Workshop, pp.179-198, 2014.