Improved side-channel analysis of finitefield multiplication, Cryptographic Hardware and Embedded Systems -CHES 2015 -17th International Workshop Proceedings, pp.395-415, 2015. ,
Pattern recognition and machine learning, 2006. ,
Kernel Discriminant Analysis for Information Extraction in the Presence of Masking, International Conference on Smart Card Research and Advanced Applications, pp.1-22, 2016. ,
DOI : 10.1007/978-3-540-85053-3_26
URL : https://hal.archives-ouvertes.fr/hal-01532186
Template Attacks, Cryptographic Hardware and Embedded Systems -CHES 2002, pp.13-28, 2003. ,
DOI : 10.1007/3-540-36400-5_3
Efficient template attacks, Smart Card Research and Advanced Applications, pp.253-270, 2014. ,
DOI : 10.1007/978-3-319-08302-5_17
Differential Power Analysis in the Presence of Hardware Countermeasures, Cryptographic Hardware and Embedded Systems -CHES 2000, Second International Workshop Proceedings, volume 1965 of Lecture Notes in Computer Science, pp.252-263, 2000. ,
DOI : 10.1007/3-540-44499-8_20
An efficient method for random delay generation in embedded software, Cryptographic Hardware and Embedded Systems-CHES 2009, pp.156-170, 2009. ,
Analysis and improvement of the random delay countermeasure of ches, International Workshop on Cryptographic Hardware and Embedded Systems, pp.95-109, 2009. ,
Elements of information theory, 2012. ,
Loic van Oldeneel tot Oldenzeel, and Nicolas Veyrat-Charvillon. Efficient removal of random delays from embedded software implementations using hidden markov models, International Conference on Smart Card Research and Advanced Applications, pp.123-140, 2012. ,
THE USE OF MULTIPLE MEASUREMENTS IN TAXONOMIC PROBLEMS, Annals of Eugenics, vol.59, issue.2, pp.179-188, 1936. ,
DOI : 10.1111/j.1469-1809.1936.tb02137.x
Deep Learning, 2016. ,
Speech recognition with deep recurrent neural networks, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, pp.6645-6649, 2013. ,
DOI : 10.1109/ICASSP.2013.6638947
Improving neural networks by preventing co-adaptation of feature detectors, 1207. ,
Machine learning in side-channel analysis: a first study, Journal of Cryptographic Engineering, vol.51, issue.4, pp.293-302, 2011. ,
DOI : 10.1142/9789812776655
Batch normalization: Accelerating deep network training by reducing internal covariate shift. CoRR, abs/1502, p.3167, 2015. ,
ImageNet classification with deep convolutional neural networks, Advances in Neural Information Processing Systems 25, pp.1097-1105, 2012. ,
DOI : 10.1162/neco.2009.10-08-881
URL : http://dl.acm.org/ft_gateway.cfm?id=3065386&type=pdf
Convolutional networks for images, speech, and time series. The handbook of brain theory and neural networks, p.3361, 1995. ,
Why does deep and cheap learning work so well? arXiv preprint, 2016. ,
Breaking Cryptographic Implementations Using Deep Learning Techniques, International Conference on Security, Privacy, and Applied Cryptography Engineering, pp.3-26, 2016. ,
DOI : 10.1145/1390156.1390294
Hardware Countermeasures against DPA ??? A Statistical Analysis of Their Effectiveness, Topics in Cryptology?CT-RSA 2004, pp.222-235 ,
DOI : 10.1007/978-3-540-24660-2_18
Optimization of power analysis using neural network, International Conference on Smart Card Research and Advanced Applications, pp.94-107, 2013. ,
DOI : 10.1007/978-3-319-08302-5_7
Innovative method of the power analysis, Radioengineering, vol.22, issue.2, pp.586-594, 2013. ,
DPA Using Phase-Based Waveform Matching against Random-Delay Countermeasure, 2007 IEEE International Symposium on Circuits and Systems, pp.1807-1810, 2007. ,
DOI : 10.1109/ISCAS.2007.378024
URL : http://www.aoki.ecei.tohoku.ac.jp/crypto/pdf/ISCAS2007_nagashima.pdf
Rectified linear units improve restricted boltzmann machines, Proceedings of the 27th international conference on machine learning (ICML-10), pp.807-814, 2010. ,
Early Stopping ? But When?, pp.53-67, 2012. ,
DOI : 10.1007/3-540-49430-8_3
A Stochastic Model for Differential Side Channel Cryptanalysis, International Workshop on Cryptographic Hardware and Embedded Systems, pp.30-46, 2005. ,
DOI : 10.1007/11545262_3
URL : http://www.iacr.org/cryptodb/archive/2005/CHES/766/766.pdf
FaceNet: A unified embedding for face recognition and clustering, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp.815-823, 2015. ,
DOI : 10.1109/CVPR.2015.7298682
URL : http://arxiv.org/abs/1503.03832
Best practices for convolutional neural networks applied to visual document analysis, ICDAR, pp.958-962, 2003. ,
Efficient Use of Random Delays in Embedded Software, IFIP International Workshop on Information Security Theory and Practices, pp.27-38, 2007. ,
DOI : 10.1007/978-3-540-30580-4_3
Improving differential power analysis by elastic alignment, Cryptographers Track at the RSA conference, pp.104-119, 2011. ,
Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note, International Conference on the Theory and Application of Cryptology and Information Security, pp.740-757, 2012. ,
DOI : 10.1007/978-3-642-34961-4_44
Understanding data augmentation for classification: when to warp?, Digital Image Computing: Techniques and Applications (DICTA), 2016 International Conference on, pp.1-6, 2016. ,
Back Propagation Neural Network Based Leakage Characterization for Practical Security Analysis of Cryptographic Implementations, International Conference on Information Security and Cryptology, pp.169-185, 2011. ,
DOI : 10.1007/978-3-642-31912-9_12