{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,14]],"date-time":"2024-09-14T14:10:07Z","timestamp":1726323007605},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,3,31]],"date-time":"2023-03-31T00:00:00Z","timestamp":1680220800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,31]],"date-time":"2023-03-31T00:00:00Z","timestamp":1680220800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100007224","name":"National Foundation for Science and Technology Development","doi-asserted-by":"publisher","award":["102.02-2020.14"],"id":[{"id":"10.13039\/100007224","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptogr Eng"],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1007\/s13389-023-00314-4","type":"journal-article","created":{"date-parts":[[2023,4,4]],"date-time":"2023-04-04T11:24:43Z","timestamp":1680607483000},"page":"427-439","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A novel non-profiled side channel attack based on multi-output regression neural network"],"prefix":"10.1007","volume":"14","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-9195-658X","authenticated-orcid":false,"given":"Ngoc-Tuan","family":"Do","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-0944-8701","authenticated-orcid":false,"given":"Van-Phuc","family":"Hoang","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-9048-4341","authenticated-orcid":false,"given":"Van Sang","family":"Doan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,31]]},"reference":[{"key":"314_CR1","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Advances in Cryptology\u2014CRYPTO\u2019 99, pp. 388\u2013397. Springer, Berlin, Heidelberg (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"key":"314_CR2","doi-asserted-by":"crossref","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Lecture Notes in Computer Science, pp. 16\u201329. Springer, Berlin, Heidelberg (2004)","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"314_CR3","doi-asserted-by":"crossref","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski, B.S., Ko\u00e7, \u00e7.K., Paar, C. (eds) Cryptographic Hardware and Embedded Systems-CHES 2002, pp. 13\u201328. Springer, Berlin, Heidelberg (2003)","DOI":"10.1007\/3-540-36400-5_3"},{"key":"314_CR4","unstructured":"Elaabid, M., Guilley, S., Hoogvorst, P.: Template attacks with a power model. In: IACR Cryptology ePrint Archive. 443, 01 (2007)"},{"issue":"4","key":"314_CR5","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/s13389-017-0162-9","volume":"8","author":"L Lerman","year":"2017","unstructured":"Lerman, L., Poussier, R., Markowitch, O., Standaert, F.-X.: Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version. J. Cryptogr. Eng. 8(4), 301\u2013313 (2017)","journal-title":"J. Cryptogr. Eng."},{"issue":"4","key":"314_CR6","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/s13389-011-0023-x","volume":"1","author":"G Hospodar","year":"2011","unstructured":"Hospodar, G., Gierlichs, B., Mulder, E.D., Verbauwhede, I., Vandewalle, J.: Machine learning in side-channel analysis: a first study. J. Cryptogr. Eng. 1(4), 293\u2013302 (2011)","journal-title":"J. Cryptogr. Eng."},{"issue":"11","key":"314_CR7","doi-asserted-by":"publisher","first-page":"1626","DOI":"10.1109\/TC.2020.3013196","volume":"69","author":"K Ramezanpour","year":"2020","unstructured":"Ramezanpour, K., Ampadu, P., Diehl, W.: SCAUL: power side-channel analysis with unsupervised learning. IEEE Trans. Comput. 69(11), 1626\u20131638 (2020)","journal-title":"IEEE Trans. Comput."},{"issue":"6","key":"314_CR8","doi-asserted-by":"publisher","first-page":"1445","DOI":"10.1109\/TIFS.2018.2879295","volume":"14","author":"L Lerman","year":"2019","unstructured":"Lerman, L., Markowitch, O.: Efficient profiled attacks on masking schemes. IEEE Trans. Inf. Forensics Secur. 14(6), 1445\u20131454 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"314_CR9","doi-asserted-by":"crossref","unstructured":"Nassar, M., Souissi, Y., Guilley, S., Danger, J.-L.: Rsm: a small and fast countermeasure for aes, secure against 1st and 2nd-order zero-offset scas. In: Design. Automation Test in Europe Conference Exhibition (DATE) 2012, pp. 1173\u20131178 (2012)","DOI":"10.1109\/DATE.2012.6176671"},{"key":"314_CR10","doi-asserted-by":"crossref","unstructured":"Veyrat-Charvillon, N., Medwed, M., Kerckhof, S., Standaert, F.-X.: Shuffling against side-channel attacks: a comprehensive study with cautionary note. In: Wang X, Sako, K (eds) Advances in Cryptology\u2014ASIACRYPT 2012, pp. 740\u2013757. Springer, Berlin, Heidelberg (2012)","DOI":"10.1007\/978-3-642-34961-4_44"},{"key":"314_CR11","doi-asserted-by":"crossref","unstructured":"Coron , J.-S., Kizhvatov, I.: An efficient method for random delay generation in embedded software. In: Clavier, C., Gaj, K. (eds) Cryptographic Hardware and Embedded Systems-CHES 2009, pp 156\u2013170. Springer, Berlin, Heidelberg (2009)","DOI":"10.1007\/978-3-642-04138-9_12"},{"key":"314_CR12","doi-asserted-by":"publisher","first-page":"151993","DOI":"10.1109\/ACCESS.2021.3126703","volume":"9","author":"B-A Dao","year":"2021","unstructured":"Dao, B.-A., Hoang, T.-T., Le, A.-T., Tsukamoto, A., Suzaki, K., Pham, C.-K.P.: Correlation power analysis attack resisted cryptographic RISC-v SoC with random dynamic frequency scaling countermeasure. IEEE Access 9, 151993\u2013152014 (2021)","journal-title":"IEEE Access"},{"issue":"2","key":"314_CR13","doi-asserted-by":"publisher","first-page":"292","DOI":"10.4218\/etrij.2019-0163","volume":"42","author":"S Jin","year":"2020","unstructured":"Jin, S., Kim, S., Kim, H., Hong, S.: Recent advances in deep learning-based side-channel analysis. ETRI J. 42(2), 292\u2013304 (2020)","journal-title":"ETRI J."},{"key":"314_CR14","doi-asserted-by":"crossref","unstructured":"Xu, D., Shi, Y., Tsang, I.W., Ong, Y.-s., Gong, C., Shen, X.: Survey on Multi-Output Learning, pp. 1\u201321 (2019)","DOI":"10.1109\/TNNLS.2019.2945133"},{"key":"314_CR15","first-page":"2367","volume":"13","author":"T Aho","year":"2012","unstructured":"Aho, T., B\u017eenko, T., D\u017eeroski, S., Elomaa, T.: Multi-target regression with rule ensembles. J. Mach. Learn. Res. 13, 2367\u20132407 (2012)","journal-title":"J. Mach. Learn. Res."},{"key":"314_CR16","unstructured":"Spyromitros-Xioufis, E., Groves, W., Tsoumakas, G., Vlahavas, I.: Multi-label classification methods for multi-target regression 11 (2012)"},{"key":"314_CR17","doi-asserted-by":"crossref","unstructured":"Tsoumakas, G., Spyromitros-Xioufis, E., Vrekou, A., Vlahavas, I.: Multi-target regression via random linear target combinations. In: Machine Learning and Knowledge Discovery in Databases, pp. 225\u2013240. Springer, Berlin, Heidelberg (2014)","DOI":"10.1007\/978-3-662-44845-8_15"},{"issue":"5","key":"314_CR18","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1002\/widm.1157","volume":"5","author":"H Borchani","year":"2015","unstructured":"Borchani, H., Varando, G., Bielza, C., Larra\u00f1aga, P.: A survey on multi-output regression. Wiley Interdiscip. Rev. Data Min. Knowl. Discov. 5(5), 216\u2013233 (2015)","journal-title":"Wiley Interdiscip. Rev. Data Min. Knowl. Discov."},{"key":"314_CR19","doi-asserted-by":"crossref","unstructured":"Reyes, O., Ventura, S.: Performing multi-target regression via a parameter sharing-based deep network. Int. J. Neural Syst. (2019)","DOI":"10.1142\/S012906571950014X"},{"issue":"2","key":"314_CR20","first-page":"07","volume":"2019","author":"B Timon","year":"2019","unstructured":"Timon, B.: Non-profiled deep learning-based side-channel attacks with sensitivity analysis. IACR Trans. Cryptogr. Hardw. Embedd. Syst 2019(2), 07\u2013131 (2019)","journal-title":"IACR Trans. Cryptogr. Hardw. Embedd. Syst"},{"key":"314_CR21","doi-asserted-by":"crossref","unstructured":"Alipour, A., Papadimitriou, A., Beroulle, V., Aerabi, E., Hely, D.: On the performance of non-profiled differential deep learning attacks against an AES encryption algorithm protected using a correlated noise generation based hiding countermeasure. In: Proceedings of the 2020 Design, Automation and Test in Europe Conference and Exhibition, DATE 2020, pp. 614\u2013617 (2020)","DOI":"10.23919\/DATE48585.2020.9116387"},{"key":"314_CR22","doi-asserted-by":"crossref","unstructured":"Kuroda, K., Fukuda, Y., Yoshida, K., Fujino, T.: Practical aspects on non-profiled deep-learning side-channel attacks against AES software implementation with two types of masking countermeasures including RSM, pp. 29\u201340 (2021)","DOI":"10.1145\/3474376.3487285"},{"key":"314_CR23","doi-asserted-by":"publisher","first-page":"22480","DOI":"10.1109\/ACCESS.2021.3055833","volume":"9","author":"YS Won","year":"2021","unstructured":"Won, Y.S., Han, D.G., Jap, D., Bhasin, S., Park, J.Y.: Non-profiled side-channel attack based on deep learning using picture trace. IEEE Access 9, 22480\u201322492 (2021)","journal-title":"IEEE Access"},{"key":"314_CR24","doi-asserted-by":"publisher","first-page":"57692","DOI":"10.1109\/ACCESS.2021.3072653","volume":"9","author":"D Kwon","year":"2021","unstructured":"Kwon, D., Kim, H., Hong, S.: Non-profiled deep learning-based side-channel preprocessing with autoencoders. IEEE Access 9, 57692\u201357703 (2021)","journal-title":"IEEE Access"},{"key":"314_CR25","unstructured":"Maghrebi, H.: Deep learning based side-channel attack: a new profiling methodology based on multi-label classification. Eprint 2020-436, 1, pp. 1\u201334 (2020). https:\/\/eprint.iacr.org\/2020\/436"},{"issue":"6","key":"314_CR26","doi-asserted-by":"publisher","first-page":"1207","DOI":"10.1109\/TCAD.2020.3033495","volume":"40","author":"L Zhang","year":"2021","unstructured":"Zhang, L., Xing, X., Fan, J., Wang, Z., Wang, S.: Multilabel deep learning-based side-channel attack. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(6), 1207\u20131216 (2021)","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"314_CR27","unstructured":"Prouff, E., Strullu, R., Benadjila, R., Cagli, E., Dumas, C.: Study of deep learning techniques for side-channel analysis and introduction to ASCAD database. CoRR, pp. 1\u201346 (2018)"},{"key":"314_CR28","doi-asserted-by":"crossref","unstructured":"Do, N.-T., Hoang, V.-P., Doan, V.-S.: Performance analysis of non-profiled side channel attacks based on convolutional neural networks. In: 2020 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS). IEEE (2020)","DOI":"10.1109\/APCCAS50809.2020.9301673"},{"key":"314_CR29","doi-asserted-by":"crossref","unstructured":"Maghrebi, H., Portigliatti, T., Prouff, E.: Breaking cryptographic implementations using deep learning techniques. In: Security, Privacy, and Applied Cryptography Engineering, pp. 3\u201326. Springer (2016)","DOI":"10.1007\/978-3-319-49445-6_1"},{"key":"314_CR30","doi-asserted-by":"crossref","unstructured":"Picek, S., Heuser, A., Jovic, A., Bhasin, S., Regazzoni, F.: The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations. In: IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 209\u2013237 (2018)","DOI":"10.46586\/tches.v2019.i1.209-237"},{"key":"314_CR31","doi-asserted-by":"crossref","unstructured":"Won, Y.S., Bhasin, S.: On use of deep learning for side channel evaluation of black box hardware AES engine. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST Vol. 379, pp. 185\u2013194 (2021)","DOI":"10.1007\/978-3-030-77424-0_15"},{"key":"314_CR32","doi-asserted-by":"crossref","unstructured":"Groenendijk, R., Karaoglu, S., Gevers, T, Mensink, T.: Multi-loss weighting with coefficient of variations. In: 2021 IEEE Winter Conference on Applications of Computer Vision (WACV). IEEE (2021)","DOI":"10.1109\/WACV48630.2021.00151"}],"container-title":["Journal of Cryptographic Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-023-00314-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13389-023-00314-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-023-00314-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,14]],"date-time":"2024-09-14T13:05:25Z","timestamp":1726319125000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13389-023-00314-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,31]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["314"],"URL":"https:\/\/doi.org\/10.1007\/s13389-023-00314-4","relation":{},"ISSN":["2190-8508","2190-8516"],"issn-type":[{"type":"print","value":"2190-8508"},{"type":"electronic","value":"2190-8516"}],"subject":[],"published":{"date-parts":[[2023,3,31]]},"assertion":[{"value":"25 May 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 March 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}