{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,4]],"date-time":"2024-05-04T00:26:14Z","timestamp":1714782374211},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100007224","name":"National Foundation for Science and Technology Development","doi-asserted-by":"publisher","award":["102.02-2020.14"],"id":[{"id":"10.13039\/100007224","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s11036-023-02128-4","type":"journal-article","created":{"date-parts":[[2023,7,6]],"date-time":"2023-07-06T03:26:12Z","timestamp":1688613972000},"page":"1187-1196","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Performance Analysis of Deep Learning Based Non-profiled Side Channel Attacks Using Significant Hamming Weight Labeling"],"prefix":"10.1007","volume":"28","author":[{"given":"Van-Phuc","family":"Hoang","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9195-658X","authenticated-orcid":false,"given":"Ngoc-Tuan","family":"Do","sequence":"additional","affiliation":[]},{"given":"Van Sang","family":"Doan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,6]]},"reference":[{"key":"2128_CR1","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/s13389-019-00212-8","volume":"10","author":"TGB Hettwer","year":"2020","unstructured":"Hettwer TGB, Gehrer S (2020) Applications of machine learning techniques in side-channel attacks: a survey. J Cryptogr Eng 10:135\u2013162","journal-title":"J Cryptogr Eng"},{"key":"2128_CR2","doi-asserted-by":"publisher","unstructured":"Timon B (2019) Non-Profiled Deep Learning-based Side-Channel attacks with Sensitivity Analysis. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2019(2), 107\u2013131. https:\/\/doi.org\/10.13154\/tches.v2019.i2.107-131","DOI":"10.13154\/tches.v2019.i2.107-131"},{"key":"2128_CR3","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/978-3-030-05072-6_10","volume-title":"Security, Privacy, and Applied Cryptography Engineering","author":"S Picek","year":"2018","unstructured":"Picek S, Samiotis IP, Kim J, Heuser A, Bhasin S, Legay A (2018) On the performance of convolutional neural networks for side-channel analysis. In: Chattopadhyay A, Rebeiro C, Yarom Y (eds) Security, Privacy, and Applied Cryptography Engineering. Springer International Publishing, Cham, pp 157\u2013176"},{"key":"2128_CR4","doi-asserted-by":"crossref","unstructured":"Alipour A, Papadimitriou A, Beroulle V, Aerabi E, H\u00e9ly D (2020) On the performance of non-profiled differential deep learning attacks against an aes encryption algorithm protected using a correlated noise generation based hiding countermeasure. In: 2020 Design, Automation Test in Europe Conference Exhibition (DATE). pp 614\u2013617","DOI":"10.23919\/DATE48585.2020.9116387"},{"key":"2128_CR5","doi-asserted-by":"crossref","unstructured":"Won Y-S, Han D-G, Jap D, Bhasin S, Park J-Y (2021) Non-profiled side-channel attack based on deep learning using picture trace. IEEE Access 9:22 480\u201322 492","DOI":"10.1109\/ACCESS.2021.3055833"},{"key":"2128_CR6","doi-asserted-by":"crossref","unstructured":"Do NT, Hoang VP , Doan VS (2020) Performance analysis of non-profiled side channel attacks based on convolutional neural networks. In: 2020 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS). pp 66\u201369","DOI":"10.1109\/APCCAS50809.2020.9301673"},{"issue":"4","key":"2128_CR7","doi-asserted-by":"publisher","first-page":"897","DOI":"10.53106\/160792642022072304024","volume":"23","author":"DBD Bae","year":"2022","unstructured":"Bae DBD, Bae JHD, Hwang JHJ (2022) Deep learning-based attacks on masked AES implementation. Journal of Internet Technology 23(4):897\u2013902","journal-title":"Journal of Internet Technology"},{"key":"2128_CR8","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/s13389-014-0089-3","volume":"5","author":"L Lerman","year":"2014","unstructured":"Lerman L, Bontempi G, Markowitch O (2014) A machine learning approach against a masked aes. Journal of Cryptographic Engineering 5:123\u2013139","journal-title":"Journal of Cryptographic Engineering"},{"key":"2128_CR9","doi-asserted-by":"crossref","unstructured":"Gilmore R, Hanley N, O\u2019Neill M (2015) Neural network based attack on a masked implementation of aes. In: 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). pp 106\u2013111","DOI":"10.1109\/HST.2015.7140247"},{"key":"2128_CR10","first-page":"53","volume":"2018","author":"E Prouff","year":"2018","unstructured":"Prouff E, Strullu R, Benadjila R, Cagli E, Canovas C (2018) Study of deep learning techniques for side-channel analysis and introduction to ascad database. IACR Cryptol. ePrint Arch 2018:53","journal-title":"IACR Cryptol. ePrint Arch"},{"key":"2128_CR11","doi-asserted-by":"crossref","unstructured":"Picek S, Heuser A, Jovic A, Bhasin S, Regazzoni F (2018) The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations. https:\/\/ia.cr\/2018\/476","DOI":"10.46586\/tches.v2019.i1.209-237"},{"key":"2128_CR12","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-319-66787-4_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2017","author":"E Cagli","year":"2017","unstructured":"Cagli E, Dumas C, Prouff E (2017) Convolutional neural networks with data augmentation against jitter-based countermeasures. In: Fischer W, Homma N (eds) Cryptographic Hardware and Embedded Systems - CHES 2017. Springer International Publishing, Cham, pp 45\u201368"},{"key":"2128_CR13","doi-asserted-by":"crossref","unstructured":"Hu W, Wu L, Wang A, Xie X, Zhu Z, Luo S (2014) Adaptive chosen-plaintext correlation power analysis. In: 2014 Tenth International Conference on Computational Intelligence and Security. pp 494\u2013498","DOI":"10.1109\/CIS.2014.94"},{"key":"2128_CR14","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-030-63083-6_22","volume-title":"Industrial Networks and Intelligent Systems","author":"N-T Do","year":"2020","unstructured":"Do N-T, Hoang V-P (2020) An efficient side channel attack technique with improved correlation power analysis. In: Vo N-S, Hoang V-P (eds) Industrial Networks and Intelligent Systems. Springer International Publishing, Cham, pp 291\u2013300"},{"key":"2128_CR15","unstructured":"Kingma D, Ba J (2014) Adam: A method for stochastic optimization. International Conference on Learning Representations 12"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-023-02128-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-023-02128-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-023-02128-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T14:51:09Z","timestamp":1714747869000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-023-02128-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6]]},"references-count":15,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["2128"],"URL":"https:\/\/doi.org\/10.1007\/s11036-023-02128-4","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6]]},"assertion":[{"value":"27 March 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 July 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}