C. Archambeau, E. Peeters, F. Standaert, and J. Quisquater, Template Attacks in Principal Subspaces, LNCS, vol.4249, pp.1-14, 2006.
DOI : 10.1007/11894063_1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.155.2172

L. Batina, J. Hogenboom, and J. G. Van-woudenberg, Getting More from PCA: First Results of Using Principal Component Analysis for Extensive Power Analysis, CT-RSA 2012, pp.383-397, 2012.
DOI : 10.1007/978-3-642-19074-2_8

P. N. Belhumeur, J. P. Hespanha, and D. J. Kriegman, Eigenfaces vs. Fisherfaces: recognition using class specific linear projection, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.19, issue.7, pp.711-720, 1997.
DOI : 10.1109/34.598228

N. Bruneau, S. Guilley, A. Heuser, D. Marion, and O. , Less is More, CHES 2015, pp.22-41, 2015.
DOI : 10.1007/978-3-662-48324-4_2

S. Chari, J. R. Rao, and P. Rohatgi, Template Attacks, CHES 2002, pp.13-28, 2003.
DOI : 10.1007/3-540-36400-5_3

L. Chen, H. M. Liao, M. Ko, J. Lin, and G. Yu, A new LDA-based face recognition system which can solve the small sample size problem, Pattern Recognition, vol.33, issue.10, pp.331713-1726, 2000.
DOI : 10.1016/S0031-3203(99)00139-9

O. Choudary and M. G. Kuhn, Efficient Stochastic Methods: Profiled Attacks Beyond 8 Bits, IACR Cryptology ePrint Archive, 2014.
DOI : 10.1007/978-3-319-16763-3_6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.691.1441

O. Choudary and M. G. Kuhn, Efficient template attacks, CARDIS 2014, pp.253-270, 2014.
DOI : 10.1007/978-3-319-14123-7_17

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.496.1145

T. Eisenbarth, C. Paar, and B. Weghenkel, Building a Side Channel Based Disassembler, Transactions on Computational Science X LNCS, vol.6340, pp.78-99, 2010.
DOI : 10.1007/978-3-642-17499-5_4

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.471.2852

R. A. Fisher, THE STATISTICAL UTILIZATION OF MULTIPLE MEASUREMENTS, Annals of Eugenics, vol.8, issue.4, pp.376-386, 1938.
DOI : 10.1111/j.1469-1809.1938.tb02189.x

K. Fukunaga, Introduction to Statistical Pattern Recognition, 1990.

T. Guhr, A. Müller-groeling, and H. A. Weidenmüller, Random-matrix theories in quantum physics: common concepts, Physics Reports, vol.299, issue.4-6, pp.189-425, 1998.
DOI : 10.1016/S0370-1573(97)00088-4

R. Huang, Q. Liu, H. Lu, and S. Ma, Solving the small sample size problem of LDA, Object recognition supported by user interaction for service robots, pp.29-32, 2002.
DOI : 10.1109/ICPR.2002.1047787

P. Karsmakers, B. Gierlichs, K. Pelckmans, K. De-cock, J. Suykens et al., Side channel attacks on cryptographic devices as a classification problem, 2009.

K. Liu, Y. Cheng, and J. Yang, A generalized optimal set of discriminant vectors, Pattern Recognition, vol.25, issue.7, pp.731-739, 1992.
DOI : 10.1016/0031-3203(92)90136-7

J. L. Massey, Guessing and entropy, Proceedings of 1994 IEEE International Symposium on Information Theory, p.204, 1994.
DOI : 10.1109/ISIT.1994.394764

D. Mavroeidis, L. Batina, T. Van-laarhoven, and E. Marchiori, PCA, Eigenvector Localization and Clustering for Side-Channel Attacks on Cryptographic Hardware Devices, Machine Learning and Knowledge Discovery in Databases, pp.253-268, 2012.
DOI : 10.1007/978-3-642-33460-3_22

N. Nisan and D. Zuckerman, Randomness is Linear in Space, Journal of Computer and System Sciences, vol.52, issue.1, pp.43-52, 1996.
DOI : 10.1006/jcss.1996.0004

URL : http://doi.org/10.1006/jcss.1996.0004

C. O. Flynn and Z. D. Chen, Chipwhisperer: An open-source platform for hardware embedded security research, COSADE 2014, pp.243-260, 2014.

T. Paristech, Dpa contest 4

R. Specht, J. Heyszl, M. Kleinsteuber, and G. Sigl, Improving Non-profiled Attacks on Exponentiations Based on Clustering and Extracting Leakage from Multi-channel High-Resolution EM Measurements, COSADE 2015, pp.3-19
DOI : 10.1007/978-3-319-21476-4_1

F. Standaert and C. Archambeau, Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages, LNCS, vol.5154, pp.411-425, 2008.
DOI : 10.1007/978-3-540-85053-3_26

F. Standaert, T. G. Malkin, and M. Yung, A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, LNCS, vol.28, issue.2, pp.443-461, 2009.
DOI : 10.1007/978-3-540-85053-3_26

H. Yu and J. Yang, A direct LDA algorithm for high-dimensional data ??? with application to face recognition, Pattern Recognition, vol.34, issue.10, pp.2067-2070, 2001.
DOI : 10.1016/S0031-3203(00)00162-X