Template Attacks in Principal Subspaces, LNCS, vol.4249, pp.1-14, 2006. ,
DOI : 10.1007/11894063_1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.155.2172
Getting More from PCA: First Results of Using Principal Component Analysis for Extensive Power Analysis, CT-RSA 2012, pp.383-397, 2012. ,
DOI : 10.1007/978-3-642-19074-2_8
Eigenfaces vs. Fisherfaces: recognition using class specific linear projection, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.19, issue.7, pp.711-720, 1997. ,
DOI : 10.1109/34.598228
Less is More, CHES 2015, pp.22-41, 2015. ,
DOI : 10.1007/978-3-662-48324-4_2
Template Attacks, CHES 2002, pp.13-28, 2003. ,
DOI : 10.1007/3-540-36400-5_3
A new LDA-based face recognition system which can solve the small sample size problem, Pattern Recognition, vol.33, issue.10, pp.331713-1726, 2000. ,
DOI : 10.1016/S0031-3203(99)00139-9
Efficient Stochastic Methods: Profiled Attacks Beyond 8 Bits, IACR Cryptology ePrint Archive, 2014. ,
DOI : 10.1007/978-3-319-16763-3_6
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.691.1441
Efficient template attacks, CARDIS 2014, pp.253-270, 2014. ,
DOI : 10.1007/978-3-319-14123-7_17
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.496.1145
Building a Side Channel Based Disassembler, Transactions on Computational Science X LNCS, vol.6340, pp.78-99, 2010. ,
DOI : 10.1007/978-3-642-17499-5_4
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.471.2852
THE STATISTICAL UTILIZATION OF MULTIPLE MEASUREMENTS, Annals of Eugenics, vol.8, issue.4, pp.376-386, 1938. ,
DOI : 10.1111/j.1469-1809.1938.tb02189.x
Introduction to Statistical Pattern Recognition, 1990. ,
Random-matrix theories in quantum physics: common concepts, Physics Reports, vol.299, issue.4-6, pp.189-425, 1998. ,
DOI : 10.1016/S0370-1573(97)00088-4
Solving the small sample size problem of LDA, Object recognition supported by user interaction for service robots, pp.29-32, 2002. ,
DOI : 10.1109/ICPR.2002.1047787
Side channel attacks on cryptographic devices as a classification problem, 2009. ,
A generalized optimal set of discriminant vectors, Pattern Recognition, vol.25, issue.7, pp.731-739, 1992. ,
DOI : 10.1016/0031-3203(92)90136-7
Guessing and entropy, Proceedings of 1994 IEEE International Symposium on Information Theory, p.204, 1994. ,
DOI : 10.1109/ISIT.1994.394764
PCA, Eigenvector Localization and Clustering for Side-Channel Attacks on Cryptographic Hardware Devices, Machine Learning and Knowledge Discovery in Databases, pp.253-268, 2012. ,
DOI : 10.1007/978-3-642-33460-3_22
Randomness is Linear in Space, Journal of Computer and System Sciences, vol.52, issue.1, pp.43-52, 1996. ,
DOI : 10.1006/jcss.1996.0004
URL : http://doi.org/10.1006/jcss.1996.0004
Chipwhisperer: An open-source platform for hardware embedded security research, COSADE 2014, pp.243-260, 2014. ,
Dpa contest 4 ,
Improving Non-profiled Attacks on Exponentiations Based on Clustering and Extracting Leakage from Multi-channel High-Resolution EM Measurements, COSADE 2015, pp.3-19 ,
DOI : 10.1007/978-3-319-21476-4_1
Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages, LNCS, vol.5154, pp.411-425, 2008. ,
DOI : 10.1007/978-3-540-85053-3_26
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, LNCS, vol.28, issue.2, pp.443-461, 2009. ,
DOI : 10.1007/978-3-540-85053-3_26
A direct LDA algorithm for high-dimensional data ??? with application to face recognition, Pattern Recognition, vol.34, issue.10, pp.2067-2070, 2001. ,
DOI : 10.1016/S0031-3203(00)00162-X