, Python implementation of FastICA algorithm

C. Archambeau, ´. E. Peeters, F. Standaert, and J. Quisquater, Template Attacks in Principal Subspaces, CHES, vol.4249, pp.1-14

. Springer, , 2006.

J. Balasch, B. Gierlichs, O. Reparaz, I. Verbauwhede, and . Dpa, Bitslicing and Masking at 1 GHz, pp.599-619, 2015.

L. Batina, B. Gierlichs, E. Prouff, M. Rivain, F. Standaert et al., Mutual Information Analysis: a Comprehensive Study, J. Cryptology, vol.24, issue.2, pp.269-291, 2011.

L. Batina, J. Hogenboom, and J. G. Van-woudenberg, Getting More from PCA: First Results of Using Principal Component Analysis for Extensive Power Analysis, pp.383-397, 2012.

A. J. Bell and T. J. Sejnowski, An information-maximization approach to blind separation and blind deconvolution, Neural Comput, vol.7, issue.6, pp.1129-1159, 1995.

S. Bhasin, J. Danger, S. Guilley, and Z. Najm, NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage, International Symposium on Electromagnetic Compatibility, pp.12-16, 2014.

S. Bhasin, J. Danger, S. Guilley, and Z. Najm, Side-channel Leakage and Trace Compression Using Normalized Inter-class Variance, Proceedings of the Third Workshop on Hardware and Architectural Support for Security and Privacy, HASP '14, vol.7, pp.1-7, 2014.

L. Bohy, M. Neve, D. Samyde, and J. Jacques-quisquater, Principal and independent component analysis for crypto-systems with hardware unmasked units, Proceedings, 2003.

´. E. Brier, C. Clavier, and F. Olivier, Correlation Power Analysis with a Leakage Model, CHES, vol.3156, pp.16-29, 2004.

E. Cagli, C. Dumas, and E. Prouff, Kernel Discriminant Analysis for Information Extraction in the Presence of Masking, pp.1-22, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01532186

J. F. Cardoso, Python and Matlab implementations of JADE algorithm

J. F. Cardoso, Infomax and maximum likelihood for blind source separation, IEEE Signal Processing Letters, vol.4, issue.4, pp.112-114, 1997.

J. F. Cardoso and A. Souloumiac, Blind beamforming for non-gaussian signals, IEE Proceedings F-Radar and Signal Processing, vol.140, pp.362-370, 1993.

O. Choudary and M. G. Kuhn, Efficient Template Attacks, pp.253-270, 2014.

P. Comon, Independent component analysis, Signal Processing, vol.36, issue.3, pp.287-314, 1994.
URL : https://hal.archives-ouvertes.fr/hal-00346684

P. Comon and C. Jutten, Handbook of Blind Source Separation: Independent Component Analysis and Applications, 2010.
URL : https://hal.archives-ouvertes.fr/hal-00460653

C. C. Consortium, Common Criteria (aka CC) for Information Technology Security Evaluation (ISO/IEC 15408), 2013.

T. M. Cover and J. A. Thomas, Elements of Information Theory, Series in Telecommunications and Signal Processing, 2006.

N. Debande, Y. Souissi, M. A. Elaabid, S. Guilley, and J. Danger, Wavelet Transform Based Pre-processing for Side Channel Analysis, HASP, pp.32-38, 2012.

N. Delfosse and P. Loubaton, Adaptive blind separation of independent sources: A deflation approach. Signal Process, vol.45, pp.59-83, 1995.

A. A. Ding, C. Chen, and T. Eisenbarth, Simpler, Faster, and More Robust TTest Based Leakage Detection, pp.163-183, 2016.

F. Durvaux and F. Standaert, From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces, pp.240-262, 2016.

R. A. Fisher, The use of multiple measurements in taxonomic problems, Annals of Eugenics, vol.7, issue.7, pp.179-188, 1936.

J. H. Friedman and J. W. Tukey, A projection pursuit algorithm for exploratory data analysis, IEEE Trans. Comput, vol.23, issue.9, pp.881-890, 1974.

S. Gao, H. Chen, W. Wu, L. Fan, W. Cao et al., My Traces Learn What You Did in the Dark: Recovering Secret Signals Without Key Guesses, pp.363-378, 2017.

D. Genkin, L. Pachmanov, I. Pipman, E. Tromer, and Y. Yarom, Ecdsa key extraction from mobile devices via nonintrusive physical side channels, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS '16, pp.1626-1638, 2016.

P. Georgiev and F. J. Theis, Blind Source Separation of Linear Mixtures with Singular Matrices, pp.121-128, 2004.

B. Gierlichs, L. Batina, P. Tuyls, and B. Preneel, Mutual information analysis, CHES, 10th International Workshop, vol.5154, pp.426-442, 2008.

B. Gierlichs, K. Lemke-rust, and C. Paar, Templates vs. Stochastic Methods, CHES, vol.4249, pp.15-29, 2006.

G. Goodwill, B. Jun, J. Jaffe, and P. Rohatgi, A testing methodology for side-channel resistance validation, NIST Non-Invasive Attack Testing Workshop, 2011.

P. J. Huber, Projection pursuit, Ann. Statist, vol.13, issue.2, pp.435-475, 1985.

A. Hyvärinen, New approximations of differential entropy for independent component analysis and projection pursuit, Advances in Neural Information Processing Systems 10, pp.273-279, 1998.

A. Hyvarinen, Fast and robust fixed-point algorithms for independent component analysis, Trans. Neur. Netw, vol.10, issue.3, pp.626-634, 1999.

A. Hyvärinen, The fixed-point algorithm and maximum likelihood estimation for independent component analysis, Neural Processing Letters, vol.10, issue.1, pp.1-5, 1999.

A. Hyvärinen, Sparse code shrinkage: Denoising of nongaussian data by maximum likelihood estimation, Neural Comput, vol.11, issue.7, pp.1739-1768, 1999.

A. Hyvärinen and E. Oja, A fast fixed-point algorithm for independent component analysis, Neural Comput, vol.9, issue.7, pp.1483-1492, 1997.

A. Hyvrinen and E. Oja, Independent component analysis: algorithms and applications, Neural Networks, vol.13, pp.411-430, 2000.

I. T. Jolliffe, Principal Component Analysis. Springer Series in Statistics, p.387954422, 2002.

C. Jutten and J. Herault, Blind separation of sources, part i: An adaptive algorithm based on neuromimetic architecture, Signal Processing, vol.24, issue.1, pp.1-10, 1991.

P. C. Kocher, J. Jaffe, and B. Jun, Differential power analysis, Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO '99, pp.388-397, 1999.

T. Le, J. Cledì-ere, C. Servì, and J. Lacoume, Noise Reduction in Side Channel Attack using Fourth-order Cumulant, IEEE Transaction on Information Forensics and Security, vol.2, issue.4, pp.710-720, 2007.

J. Longo, E. D. Mulder, D. Page, and M. Tunstall, SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip, pp.620-640, 2015.

H. Maghrebi, V. Servant, and J. Bringer, There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks, pp.223-243, 2016.

S. Mangard, E. Oswald, and T. Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards, 2006.

S. Pozo and F. Standaert, Blind Source Separation from Single Measurements Using Singular Spectrum Analysis, pp.42-59, 2015.

J. Nadal and N. Parga, Nonlinear neurons in the low-noise limit: a factorial code maximizes information transfer, Network: Computation in Neural Systems, vol.5, issue.4, pp.565-581, 1994.
URL : https://hal.archives-ouvertes.fr/hal-00143844

G. R. Naik and W. Wang, Blind Source Separation: Advances in Theory, Algorithms and Applications, 2014.

C. O'flynn and Z. D. Chen, ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research, pp.243-260, 2014.

A. Papoulis and S. U. Pillai, Probability, Random Variables, and Stochastic Processes, 2002.

E. Prouff, M. Rivain, and R. Bévan, Statistical analysis of second order differential power analysis, IEEE Trans. Comput, vol.58, issue.6, pp.799-811, 2009.

T. Schneider and A. Moradi, Leakage Assessment Methodology, pp.495-513, 2015.

Y. Souissi, S. Guilley, J. Danger, G. Duc, and S. Mekki, Improvement of power analysis attacks using Kalman filter, ICASSP, IEEE Signal Processing Society, pp.1778-1781, 2010.

F. Standaert and C. Archambeau, Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages, CHES, vol.5154, pp.411-425

. Springer, , 2008.

F. Standaert, T. Malkin, and M. Yung, A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, EUROCRYPT, vol.5479, pp.443-461, 2009.

T. Paristech, S. Research-group, and . Contest, , pp.2009-2010

J. G. Van-woudenberg, M. F. Witteman, and B. Bakker, Improving Differential Power Analysis by Elastic Alignment, Lecture Notes in Computer Science, vol.6558, pp.104-119, 2011.

R. Wang, H. Ma, G. Liu, and D. Zuo, Selection of window length for singular spectrum analysis, Journal of the Franklin Institute, vol.352, issue.4, pp.1541-1560, 2015.