, Python implementation of FastICA algorithm
Template Attacks in Principal Subspaces, CHES, vol.4249, pp.1-14 ,
, , 2006.
, Bitslicing and Masking at 1 GHz, pp.599-619, 2015.
Mutual Information Analysis: a Comprehensive Study, J. Cryptology, vol.24, issue.2, pp.269-291, 2011. ,
Getting More from PCA: First Results of Using Principal Component Analysis for Extensive Power Analysis, pp.383-397, 2012. ,
An information-maximization approach to blind separation and blind deconvolution, Neural Comput, vol.7, issue.6, pp.1129-1159, 1995. ,
NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage, International Symposium on Electromagnetic Compatibility, pp.12-16, 2014. ,
Side-channel Leakage and Trace Compression Using Normalized Inter-class Variance, Proceedings of the Third Workshop on Hardware and Architectural Support for Security and Privacy, HASP '14, vol.7, pp.1-7, 2014. ,
Principal and independent component analysis for crypto-systems with hardware unmasked units, Proceedings, 2003. ,
Correlation Power Analysis with a Leakage Model, CHES, vol.3156, pp.16-29, 2004. ,
Kernel Discriminant Analysis for Information Extraction in the Presence of Masking, pp.1-22, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01532186
Python and Matlab implementations of JADE algorithm ,
Infomax and maximum likelihood for blind source separation, IEEE Signal Processing Letters, vol.4, issue.4, pp.112-114, 1997. ,
Blind beamforming for non-gaussian signals, IEE Proceedings F-Radar and Signal Processing, vol.140, pp.362-370, 1993. ,
Efficient Template Attacks, pp.253-270, 2014. ,
Independent component analysis, Signal Processing, vol.36, issue.3, pp.287-314, 1994. ,
URL : https://hal.archives-ouvertes.fr/hal-00346684
Handbook of Blind Source Separation: Independent Component Analysis and Applications, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-00460653
Common Criteria (aka CC) for Information Technology Security Evaluation (ISO/IEC 15408), 2013. ,
Elements of Information Theory, Series in Telecommunications and Signal Processing, 2006. ,
Wavelet Transform Based Pre-processing for Side Channel Analysis, HASP, pp.32-38, 2012. ,
Adaptive blind separation of independent sources: A deflation approach. Signal Process, vol.45, pp.59-83, 1995. ,
Simpler, Faster, and More Robust TTest Based Leakage Detection, pp.163-183, 2016. ,
From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces, pp.240-262, 2016. ,
The use of multiple measurements in taxonomic problems, Annals of Eugenics, vol.7, issue.7, pp.179-188, 1936. ,
A projection pursuit algorithm for exploratory data analysis, IEEE Trans. Comput, vol.23, issue.9, pp.881-890, 1974. ,
, My Traces Learn What You Did in the Dark: Recovering Secret Signals Without Key Guesses, pp.363-378, 2017.
Ecdsa key extraction from mobile devices via nonintrusive physical side channels, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS '16, pp.1626-1638, 2016. ,
Blind Source Separation of Linear Mixtures with Singular Matrices, pp.121-128, 2004. ,
Mutual information analysis, CHES, 10th International Workshop, vol.5154, pp.426-442, 2008. ,
Templates vs. Stochastic Methods, CHES, vol.4249, pp.15-29, 2006. ,
A testing methodology for side-channel resistance validation, NIST Non-Invasive Attack Testing Workshop, 2011. ,
Projection pursuit, Ann. Statist, vol.13, issue.2, pp.435-475, 1985. ,
New approximations of differential entropy for independent component analysis and projection pursuit, Advances in Neural Information Processing Systems 10, pp.273-279, 1998. ,
Fast and robust fixed-point algorithms for independent component analysis, Trans. Neur. Netw, vol.10, issue.3, pp.626-634, 1999. ,
The fixed-point algorithm and maximum likelihood estimation for independent component analysis, Neural Processing Letters, vol.10, issue.1, pp.1-5, 1999. ,
Sparse code shrinkage: Denoising of nongaussian data by maximum likelihood estimation, Neural Comput, vol.11, issue.7, pp.1739-1768, 1999. ,
A fast fixed-point algorithm for independent component analysis, Neural Comput, vol.9, issue.7, pp.1483-1492, 1997. ,
Independent component analysis: algorithms and applications, Neural Networks, vol.13, pp.411-430, 2000. ,
, Principal Component Analysis. Springer Series in Statistics, p.387954422, 2002.
Blind separation of sources, part i: An adaptive algorithm based on neuromimetic architecture, Signal Processing, vol.24, issue.1, pp.1-10, 1991. ,
Differential power analysis, Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO '99, pp.388-397, 1999. ,
Noise Reduction in Side Channel Attack using Fourth-order Cumulant, IEEE Transaction on Information Forensics and Security, vol.2, issue.4, pp.710-720, 2007. ,
, SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip, pp.620-640, 2015.
There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks, pp.223-243, 2016. ,
Power Analysis Attacks: Revealing the Secrets of Smart Cards, 2006. ,
Blind Source Separation from Single Measurements Using Singular Spectrum Analysis, pp.42-59, 2015. ,
Nonlinear neurons in the low-noise limit: a factorial code maximizes information transfer, Network: Computation in Neural Systems, vol.5, issue.4, pp.565-581, 1994. ,
URL : https://hal.archives-ouvertes.fr/hal-00143844
Blind Source Separation: Advances in Theory, Algorithms and Applications, 2014. ,
ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research, pp.243-260, 2014. ,
Probability, Random Variables, and Stochastic Processes, 2002. ,
Statistical analysis of second order differential power analysis, IEEE Trans. Comput, vol.58, issue.6, pp.799-811, 2009. ,
, Leakage Assessment Methodology, pp.495-513, 2015.
Improvement of power analysis attacks using Kalman filter, ICASSP, IEEE Signal Processing Society, pp.1778-1781, 2010. ,
Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages, CHES, vol.5154, pp.411-425 ,
, , 2008.
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, EUROCRYPT, vol.5479, pp.443-461, 2009. ,
, , pp.2009-2010
Improving Differential Power Analysis by Elastic Alignment, Lecture Notes in Computer Science, vol.6558, pp.104-119, 2011. ,
Selection of window length for singular spectrum analysis, Journal of the Franklin Institute, vol.352, issue.4, pp.1541-1560, 2015. ,