S. Bela¨?dbela¨?d, P. Jean-sébastien-coron, B. Fouque, J. Gérard, E. Kammerer et al., Improved side-channel analysis of finitefield multiplication, Cryptographic Hardware and Embedded Systems -CHES 2015 -17th International Workshop Proceedings, pp.395-415, 2015.

M. Christopher and . Bishop, Pattern recognition and machine learning, 2006.

E. Cagli, C. Dumas, and E. Prouff, Kernel Discriminant Analysis for Information Extraction in the Presence of Masking, International Conference on Smart Card Research and Advanced Applications, pp.1-22, 2016.
DOI : 10.1007/978-3-540-85053-3_26

URL : https://hal.archives-ouvertes.fr/hal-01532186

S. Chari, J. Rao, and P. Rohatgi, Template Attacks, Cryptographic Hardware and Embedded Systems -CHES 2002, pp.13-28, 2003.
DOI : 10.1007/3-540-36400-5_3

O. Choudary, G. Markus, and . Kuhn, Efficient template attacks, Smart Card Research and Advanced Applications, pp.253-270, 2014.
DOI : 10.1007/978-3-319-08302-5_17

C. Clavier, J. Coron, and N. Dabbous, Differential Power Analysis in the Presence of Hardware Countermeasures, Cryptographic Hardware and Embedded Systems -CHES 2000, Second International Workshop Proceedings, volume 1965 of Lecture Notes in Computer Science, pp.252-263, 2000.
DOI : 10.1007/3-540-44499-8_20

I. Jean-sébastien-coron and . Kizhvatov, An efficient method for random delay generation in embedded software, Cryptographic Hardware and Embedded Systems-CHES 2009, pp.156-170, 2009.

I. Jean-sébastien-coron and . Kizhvatov, Analysis and improvement of the random delay countermeasure of ches, International Workshop on Cryptographic Hardware and Embedded Systems, pp.95-109, 2009.

M. Thomas, . Cover, A. Joy, and . Thomas, Elements of information theory, 2012.

F. Durvaux, M. Renauld, and F. Standaert, Loic van Oldeneel tot Oldenzeel, and Nicolas Veyrat-Charvillon. Efficient removal of random delays from embedded software implementations using hidden markov models, International Conference on Smart Card Research and Advanced Applications, pp.123-140, 2012.

R. A. Fisher, THE USE OF MULTIPLE MEASUREMENTS IN TAXONOMIC PROBLEMS, Annals of Eugenics, vol.59, issue.2, pp.179-188, 1936.
DOI : 10.1111/j.1469-1809.1936.tb02137.x

I. Goodfellow, Y. Bengio, and A. Courville, Deep Learning, 2016.

A. Graves, A. Mohamed, and G. E. Hinton, Speech recognition with deep recurrent neural networks, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, pp.6645-6649, 2013.
DOI : 10.1109/ICASSP.2013.6638947

G. E. Hinton, N. Srivastava, A. Krizhevsky, I. Sutskever, and R. Salakhutdinov, Improving neural networks by preventing co-adaptation of feature detectors, 1207.

G. Hospodar, B. Gierlichs, E. D. Mulder, I. Verbauwhede, and J. Vandewalle, Machine learning in side-channel analysis: a first study, Journal of Cryptographic Engineering, vol.51, issue.4, pp.293-302, 2011.
DOI : 10.1142/9789812776655

S. Ioffe and C. Szegedy, Batch normalization: Accelerating deep network training by reducing internal covariate shift. CoRR, abs/1502, p.3167, 2015.

A. Krizhevsky, I. Sutskever, and G. E. Hinton, ImageNet classification with deep convolutional neural networks, Advances in Neural Information Processing Systems 25, pp.1097-1105, 2012.
DOI : 10.1162/neco.2009.10-08-881

URL : http://dl.acm.org/ft_gateway.cfm?id=3065386&type=pdf

Y. Lecun and Y. Bengio, Convolutional networks for images, speech, and time series. The handbook of brain theory and neural networks, p.3361, 1995.

W. Henry, M. Lin, and . Tegmark, Why does deep and cheap learning work so well? arXiv preprint, 2016.

H. Maghrebi, T. Portigliatti, and E. Prouff, Breaking Cryptographic Implementations Using Deep Learning Techniques, International Conference on Security, Privacy, and Applied Cryptography Engineering, pp.3-26, 2016.
DOI : 10.1145/1390156.1390294

S. Mangard, Hardware Countermeasures against DPA ??? A Statistical Analysis of Their Effectiveness, Topics in Cryptology?CT-RSA 2004, pp.222-235
DOI : 10.1007/978-3-540-24660-2_18

Z. Martinasek, J. Hajny, and L. Malina, Optimization of power analysis using neural network, International Conference on Smart Card Research and Advanced Applications, pp.94-107, 2013.
DOI : 10.1007/978-3-319-08302-5_7

Z. Martinasek and V. Zeman, Innovative method of the power analysis, Radioengineering, vol.22, issue.2, pp.586-594, 2013.

S. Nagashima, N. Homma, Y. Imai, T. Aoki, and A. Satoh, DPA Using Phase-Based Waveform Matching against Random-Delay Countermeasure, 2007 IEEE International Symposium on Circuits and Systems, pp.1807-1810, 2007.
DOI : 10.1109/ISCAS.2007.378024

URL : http://www.aoki.ecei.tohoku.ac.jp/crypto/pdf/ISCAS2007_nagashima.pdf

V. Nair, E. Geoffrey, and . Hinton, Rectified linear units improve restricted boltzmann machines, Proceedings of the 27th international conference on machine learning (ICML-10), pp.807-814, 2010.

L. Prechelt, Early Stopping ? But When?, pp.53-67, 2012.
DOI : 10.1007/3-540-49430-8_3

W. Schindler, K. Lemke, and C. Paar, A Stochastic Model for Differential Side Channel Cryptanalysis, International Workshop on Cryptographic Hardware and Embedded Systems, pp.30-46, 2005.
DOI : 10.1007/11545262_3

URL : http://www.iacr.org/cryptodb/archive/2005/CHES/766/766.pdf

F. Schroff, D. Kalenichenko, and J. Philbin, FaceNet: A unified embedding for face recognition and clustering, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp.815-823, 2015.
DOI : 10.1109/CVPR.2015.7298682

URL : http://arxiv.org/abs/1503.03832

Y. Patrice, D. Simard, . Steinkraus, C. John, and . Platt, Best practices for convolutional neural networks applied to visual document analysis, ICDAR, pp.958-962, 2003.

M. Tunstall and O. Benoit, Efficient Use of Random Delays in Embedded Software, IFIP International Workshop on Information Security Theory and Practices, pp.27-38, 2007.
DOI : 10.1007/978-3-540-30580-4_3

G. Jasper, . Van-woudenberg, F. Marc, B. Witteman, and . Bakker, Improving differential power analysis by elastic alignment, Cryptographers Track at the RSA conference, pp.104-119, 2011.

N. Veyrat-charvillon, M. Medwed, S. Kerckhof, and F. Standaert, Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note, International Conference on the Theory and Application of Cryptology and Information Security, pp.740-757, 2012.
DOI : 10.1007/978-3-642-34961-4_44

C. Sebastien, A. Wong, V. Gatt, . Stamatescu, D. Mark et al., Understanding data augmentation for classification: when to warp?, Digital Image Computing: Techniques and Applications (DICTA), 2016 International Conference on, pp.1-6, 2016.

S. Yang, Y. Zhou, J. Liu, and D. Chen, Back Propagation Neural Network Based Leakage Characterization for Practical Security Analysis of Cryptographic Implementations, International Conference on Information Security and Cryptology, pp.169-185, 2011.
DOI : 10.1007/978-3-642-31912-9_12