. .. Cross-entropy,

. .. Countermeasures, Experiments against Software

, 125 6.10.1 Performances over Artificial Augmented Clock Jitter, p.125

, Experiments against Real-Case Hardware Countermeasures, p.128

.. .. Conclusion,

, Billion Smart Cards Shipped in 2014 Driven by Growth in the Banking and SIM Card Markets

/. Accessed, , vol.8, pp.2018-2025

L. Mehdi, C. Akkar, and . Giraud, An implementation of DES and AES, secure against some attacks, International Workshop on Cryptographic Hardware and Embedded Systems, p.43, 2001.

C. Archambeau, Template Attacks in Principal Subspaces, Cryptographic Hardware and Embedded Systems -CHES, 2006.

, Lecture Notes in Computer Science, vol.4249, p.62, 2006.

G. Baudat and F. Anouar, Generalized discriminant analysis using a kernel approach, Neural computation, vol.12, p.92, 2000.

G. Barthe, Verified Proofs of Higher-Order Masking, Advances in Cryptology -EUROCRYPT 2015 -34th Annual International Conference on the Theory and Applications of Cryptographic Techniques
URL : https://hal.archives-ouvertes.fr/hal-01216699

B. Sofia, Proceedings, Part I, pp.457-485, 2015.

L. Batina, Mutual information analysis: a comprehensive study, Journal of Cryptology, vol.24, pp.269-291, 2011.

A. Battistello, Horizontal side-channel attacks and countermeasures on the ISW masking scheme, International Conference on Cryptographic Hardware and Embedded Systems, p.31, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01399577

A. Bauer, Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations, vol.32, p.31, 2013.

E. Brier, C. Clavier, and F. Olivier, Correlation power analysis with a leakage model, International Workshop on Cryptographic Hardware and Embedded Systems, vol.36, p.35, 2004.
URL : https://hal.archives-ouvertes.fr/hal-02487026

M. Bär, H. Drexler, and J. Pulkus, Improved template attacks, p.42, 2010.

S. Belaïd, Improved Side-Channel Analysis of Finite-Field Multiplication, Cryptographic Hardware and Embedded Systems -CHES 2015 -17th International Workshop, p.122, 2015.

E. Richard and . Bellman, Adaptive control processes: a guided tour, vol.2045, p.39, 2015.

Y. Bengio and Y. Grandvalet, Bias in estimating the variance of K-fold cross-validation". In: Statistical modeling and analysis for complex data problems, p.137, 2005.

J. Blömer, J. Guajardo, and V. Krummel, Provably secure masking of AES, International Workshop on Selected Areas in Cryptography, p.43, 2004.

N. Peter, J. P. Belhumeur, D. J. Hespanha, and . Kriegman, Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection, vol.75, p.63, 1997.

L. Batina, J. Hogenboom, and J. G. Van-woudenberg, Getting More from PCA: First Results of Using Principal Component Analysis for Extensive Power Analysis". English, Topics in Cryptology CT-RSA 2012, vol.7178, pp.978-981, 2012.

G. Bouffard, J. Iguchi-cartigny, and J. Lanet, Combined software and hardware attacks on the java card control flow, International Conference on Smart Card Research and Advanced Applications, p.10, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00684616

B. Bilgin, A more efficient AES threshold implementation, International Conference on Cryptology in Africa, p.43, 2014.

M. Christopher and . Bishop, Pattern recognition and machine learning, vol.64, 2006.

R. Bevan and E. Knudsen, Ways to enhance differential power analysis, International Conference on Information Security and Cryptology, p.36, 2002.

T. Bartkewitz and K. Lemke-rust, Efficient Template Attacks Based on Probabilistic Multi-class Support Vector Machines, Smart Card Research and Advanced Applications. Ed. by Stefan Mangard, vol.7771, p.57, 2013.

A. Bogdanov, Improved side-channel collision attacks on AES, International Workshop on Selected Areas in Cryptography, p.29, 2007.

A. Bogdanov, Multiple-differential side-channel collision attacks on AES, International Workshop on Cryptographic Hardware and Embedded Systems, p.29, 2008.

L. Breiman, Heuristics of instability and stabilization in model selection, The annals of statistics 24, vol.6, p.137, 1996.

N. Bruneau, Boosting Higher-Order Correlation Attacks by Dimensionality Reduction, English. In: Security, Privacy, and Applied Cryptography Engineering, vol.8804

, , pp.183-200, 2014.

. /-/-dx, , p.89

N. Bruneau, Less is more, International Workshop on Cryptographic Hardware and Embedded Systems, vol.73, p.62, 2015.
URL : https://hal.archives-ouvertes.fr/hal-02287177

C. Carlet, Achieving side-channel high-order correlation immunity with leakage squeezing, Journal of Cryptographic Engineering, vol.4, p.45, 2014.
URL : https://hal.archives-ouvertes.fr/hal-02286851

E. Cagli, C. Dumas, and E. Prouff, Enhancing dimensionality reduction methods for side-channel attacks, International Conference on Smart Card Research and Advanced Applications
URL : https://hal.archives-ouvertes.fr/hal-01399580

. Springer, , vol.70, pp.15-33, 2015.

E. Cagli, C. Dumas, and E. Prouff, Kernel Discriminant Analysis for Information Extraction in the Presence of Masking, International Conference on Smart Card Research and Advanced Applications, pp.1-22, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01532186

E. Cagli, C. Dumas, and E. Prouff, Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures -Profiling Attacks Without Pre-processing, vol.10529, pp.45-68, 2017.

P. John, Z. Cunningham, and . Ghahramani, Linear dimensionality reduction: survey, insights, and generalizations, In: Journal of Machine Learning Research, vol.16, issue.1, p.61, 2015.

S. Chari, Towards sound approaches to counteract poweranalysis attacks, Annual International Cryptology Conference, vol.87, pp.398-412, 1999.

L. Chen, A new LDA-based face recognition system which can solve the small sample size problem, Pattern Recognition, vol.33, p.63, 2000.

F. Chollet, , p.122

I. Jean-sébastien-coron and . Kizhvatov, An efficient method for random delay generation in embedded software, Cryptographic Hardware and Embedded Systems-CHES 2009, p.156, 2009.

I. Jean-sébastien-coron and . Kizhvatov, Analysis and improvement of the random delay countermeasure of CHES, International Workshop on Cryptographic Hardware and Embedded Systems, pp.95-109, 2009.

O. Choudary and M. G. Kuhn, Efficient Stochastic Methods: Profiled Attacks Beyond 8 Bits, IACR Cryptology ePrint Archive, p.62, 2014.

O. Choudary and M. G. Kuhn, Efficient template attacks, Smart Card Research and Advanced Applications, vol.127, p.68, 2014.

O. Choudary and M. G. Kuhn, Template attacks on different devices, International Workshop on Constructive Side-Channel Analysis and Secure Design, p.82, 2014.

O. Marios, M. G. Choudary, and . Kuhn, Efficient, Portable Template Attacks, IEEE Transactions on Information Forensics and Security 13, vol.2, p.63, 2018.

P. Tonatiuh, N. Centeno, and . Lawrence, Optimising kernel parameters and regularisation coefficients for non-linear discriminant analysis, The Journal of Machine Learning Research, vol.7, p.96, 2006.

C. Clavier, Horizontal Correlation Analysis on Exponentiation, In: ICICS, vol.6476, p.30, 2010.
URL : https://hal.archives-ouvertes.fr/hal-02486982

C. Clavier, ROSETTA for single trace analysis, Progress in Cryptology-INDOCRYPT 2012: 12th International Conference on Cryptology in India, vol.7668, p.29, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00776817

C. Clavier, D. Marion, and A. Wurcker, Simple power analysis on AES key expansion revisited, International Workshop on Cryptographic Hardware and Embedded Systems, p.29, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01218060

J. Coron, Higher-order side channel security and mask refreshing, International Workshop on Fast Software Encryption

. Springer, , p.43, 2013.

S. Chari, J. Rao, and P. Rohatgi, Template Attacks

. English, Cryptographic Hardware and Embedded Systems -CHES, 2002.

E. Burton, S. Kaliski, C. K. Koc, and C. Paar, Lecture Notes in Computer Science, vol.2523, p.41, 2003.

C. Cortes and V. Vapnik, Support-vector networks, Machine learning, vol.20, p.57, 1995.

. Thomas-de-cnudde, Higher-order threshold implementation of the AES S-box, International Conference on Smart Card Research and Advanced Applications, p.43, 2015.

J. Doget, Univariate side channel attacks and leakage modeling, Journal of Cryptographic Engineering, vol.1, issue.2, p.36, 2011.

F. Durvaux and F. Standaert, From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces, IACR Cryptology ePrint Archive, p.89, 2015.

F. Durvaux, Efficient removal of random delays from embedded software implementations using hidden markov models, International Conference on Smart Card Research and Advanced Applications, pp.123-140, 2012.

F. Durvaux, Efficient selection of time samples for higherorder DPA with projection pursuits, Constructive Side-Channel Analysis and Secure Design, vol.88, p.62, 2015.

T. Eisenbarth, C. Paar, and B. Weghenkel, Building a Side Channel Based Disassembler, English. In: Transactions on Computational Science X, vol.6340

H. Springer-berlin, , p.62, 2010.

W. Feller, An introduction to probability theory and its applications

J. Friedman, T. Hastie, and R. Tibshirani, The elements of statistical learning, Springer series in statistics, vol.1, p.137, 2001.

Y. Fei, Q. Luo, and A. Ding, A statistical model for DPA with novel algorithmic confusion analysis, International Workshop on Cryptographic Hardware and Embedded Systems, p.35, 2012.

H. Jerome, J. W. Friedman, and . Tukey, A projection pursuit algorithm for exploratory data analysis, IEEE Transactions on computers, vol.100, p.62, 1974.

K. Fukunaga, Introduction to Statistical Pattern Recognition

P. , A. Fouque, and F. Valette, The doubling attack-why upwards is better than downwards, International Workshop on Cryptographic Hardware and Embedded Systems, p.29, 2003.
URL : https://hal.archives-ouvertes.fr/inria-00563965

Y. Gal, Uncertainty in deep learning, p.135, 2016.

I. Goodfellow, Y. Bengio, and A. Courville, Deep Learning

I. J. Goodfellow, Y. Bengio, and A. C. Courville, Deep Learning. Adaptive computation and machine learning, p.111, 2016.

D. Genkin, Stealing keys from PCs using a radio: Cheap electromagnetic attacks on windowed exponentiation, International Workshop on Cryptographic Hardware and Embedded Systems, pp.207-228, 2015.

D. Genkin, ECDH key-extraction via low-bandwidth electromagnetic attacks on PCs, Cryptographers' Track at the RSA Conference, pp.219-235, 2016.

B. Gierlichs, Mutual information analysis, International Workshop on Cryptographic Hardware and Embedded Systems, p.36, 2008.

B. Gierlichs, Revisiting higher-order DPA attacks, Cryptographers? Track at the RSA Conference, p.221, 2010.

B. Gierlichs, K. Lemke-rust, and C. Paar, Templates vs. stochastic methods, International Workshop on Cryptographic Hardware and Embedded Systems, vol.42, p.41, 2006.

T. Guhr, A. Müller-groeling, and H. A. Weidenmüller, Random-matrix theories in quantum physics: common concepts, Physics Reports, vol.299, p.69, 1998.

K. Gandolfi, C. Mourtel, and F. Olivier, Electromagnetic analysis: Concrete results, Cryptographic Hardware and Embedded Systems -CHES 2001, pp.251-261, 2001.

L. Goubin and J. Patarin, DES and differential power analysis the ?Duplication? method, International Workshop on Cryptographic Hardware and Embedded Systems, vol.44, p.43, 1999.

D. Genkin, I. Pipman, and E. Tromer, Get your hands off my laptop: Physical side-channel key-extraction attacks on PCs, Journal of Cryptographic Engineering, vol.5, pp.95-112, 2015.

D. Goudarzi and M. Rivain, How Fast Can Higher-Order Masking Be in Software?, In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, p.43, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01494061

V. Grosso, Scalable Key Rank Estimation (and Key Enumeration) Algorithm for Large Keys, Cryptology ePrint Archive, 2018.

D. Genkin, A. Shamir, and E. Tromer, RSA key extraction via low-bandwidth acoustic cryptanalysis, International Cryptology Conference, pp.444-461, 2014.

C. Harpes, Cryptanalysis of iterated block ciphers, p.35, 1996.

G. E. Hinton, Improving neural networks by preventing co-adaptation of feature detectors, 2012.

G. Hospodar, Machine learning in side-channel analysis: a first study, English. In: Journal of Cryptographic Engineering, vol.1, pp.2190-8508, 2011.

, , p.57

A. Heuser, O. Rioul, and S. Guilley, Good is not good enough, International Workshop on Cryptographic Hardware and Embedded Systems, vol.37, p.36, 2014.
URL : https://hal.archives-ouvertes.fr/hal-02286943

R. Huang, Solving the small sample size problem of LDA, Proceedings. 16th International Conference on, 2002.

, , vol.3, p.63, 2002.

A. Heuser and M. Zohner, Intelligent Machine Homicide

. English, Constructive Side-Channel Analysis and Secure Design

W. Schindler, . Sorina, and . Huss, Lecture Notes in Computer Science, vol.7275, p.57, 2012.

J. Irwin, D. Page, and N. P. Smart, Instruction stream mutation for non-deterministic processors, Application-Specific Systems, Architectures and Processors, pp.286-295, 2002.

S. Ioffe and C. Szegedy, Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift, p.122, 2015.

Y. Ishai, A. Sahai, and D. Wagner, Private circuits: Securing hardware against probing attacks, Annual International Cryptology Conference, pp.463-481, 2003.

M. Joye, P. Paillier, and B. Schoenmakers, On second-order differential power analysis, International Workshop on Cryptographic Hardware and Embedded Systems, p.44, 2005.

A. Journault and F. Standaert, Very high order masking: Efficient implementation and security evaluation, International Conference on Cryptographic Hardware and Embedded Systems

. Springer, , p.43, 2017.

M. Joye and S. Yen, The Montgomery powering ladder, International Workshop on Cryptographic Hardware and Embedded Systems, p.27, 2002.

P. Karsmakers, Side channel attacks on cryptographic devices as a classification problem, p.61, 2009.

P. Kocher, J. Jaffe, and B. Jun, Differential power analysis, Annual International Cryptology Conference, vol.35, p.30, 1999.

P. Kocher, Introduction to differential power analysis, Journal of Cryptographic Engineering, vol.1, p.28, 2011.

C. Paul and . Kocher, Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems, Annual International Cryptology Conference, vol.25, p.9, 1996.

A. Krizhevsky, I. Sutskever, and G. E. Hinton, ImageNet Classification with Deep Convolutional Neural Networks, Advances in Neural Information Processing Systems 25: 26th Annual Conference on Neural Information Processing Systems, vol.119, p.105, 2012.

Y. Lecun and Y. Bengio, Convolutional networks for images, speech, and time series, The handbook of brain theory and neural networks, vol.3361, p.115, 1995.

L. Lerman, G. Bontempi, and O. Markowitch, Power analysis attack: an approach based on machine learning, International Journal of Applied Cryptography, vol.3, p.57, 2014.

L. Lerman, G. Bontempi, and O. Markowitch, A machine learning approach against a masked AES, In: Journal of Cryptographic Engineering, vol.5, p.57, 2015.

K. Liu, Y. Cheng, and J. Yang, A generalized optimal set of discriminant vectors, Pattern Recognition, vol.25, p.75, 1992.

T. Le, Analyses et mesures avancées du rayonnement électromagnétique d'un circuit intégré, p.26, 2007.

A. Yann and . Lecun, Efficient BackProp, Neural Networks: Tricks of the Trade: Second Edition, p.111, 2012.

L. Lerman, Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis), International Workshop on Constructive Side-Channel Analysis and Secure Design, p.57, 2015.

Y. Lecun, . Fu-jie, and . Huang, Loss Functions for Discriminative Training of Energy-Based Models, Proceedings of the Tenth International Workshop on Artificial Intelligence and Statistics, AISTATS 2005, p.111, 2005.

, Application of Attack Potential to SmartSmart, Version 2.9, p.15, 2013.

R. Lior, Data mining with decision trees: theory and applications

, World scientific, vol.81, p.57, 2014.

H. Ledig, F. Muller, and F. Valette, Enhancing collision attacks, International Workshop on Cryptographic Hardware and Embedded Systems, p.29, 2004.

V. Lomné, How to estimate the success rate of higher-order side-channel attacks, International Workshop on Cryptographic Hardware and Embedded Systems, p.35, 2014.

V. Lomné, How to Estimate the Success Rate of Higher-Order Side-Channel Attacks, Cryptographic Hardware and Embedded Systems CHES, vol.8731, pp.35-54, 2014.

V. Lomné, E. Prouff, and T. Roche, Behind the scene of side channel attacks, International Conference on the Theory and Application of Cryptology and Information Security, p.41, 2013.

K. Lemke, -. Rust, and C. Paar, Gaussian mixture models for higherorder side channel analysis, vol.87, 2007.

J. Kevin, A. H. Lang, G. E. Waibel, and . Hinton, A time-delay neural network architecture for isolated word recognition, Neural networks, vol.3, p.105, 1990.

T. Li, S. Zhu, and M. Ogihara, Using discriminant analysis for multi-class classification: an experimental investigation, Knowledge and Information Systems, vol.10, issue.4, p.96, 2006.

S. Mangard, A simple power-analysis (SPA) attack on implementations of the AES key expansion, International Conference on Information Security and Cryptology, p.29, 2002.

S. Mangard, Hardware countermeasures against DPA-a statistical analysis of their effectiveness, Topics in Cryptology-CT-RSA, vol.106, p.43, 2004.

D. Mavroeidis, PCA, Eigenvector Localization and Clustering for Side-Channel Attacks on Cryptographic Hardware Devices

. English, Lecture Notes in Computer Science, Machine Learning and Knowledge Discovery in Databases, vol.7523, pp.253-268, 2012.

Z. Martinasek, P. Dzurenda, and L. Malina, Profiling power analysis attack based on MLP in DPA contest V4. 2, Telecommunications and Signal Processing, 2016.

. Ieee, , p.57, 2016.

S. Thomas, . Messerges, A. Ezzat, R. Dabbish, and . Sloan, Examining smart-card security under the threat of power analysis attacks, IEEE transactions on computers, vol.51, p.36, 2002.

S. Thomas and . Messerges, Securing the AES finalists against power analysis attacks, International Workshop on Fast Software Encryption, p.43, 2000.

S. Thomas and . Messerges, Using second-order power analysis to attack DPA resistant software, International Workshop on Cryptographic Hardware and Embedded Systems, p.44, 2000.

D. A. Mcallester, T. Hazan, and J. Keshet, Direct Loss Minimization for Structured Prediction, Advances in Neural Information Processing Systems 23: 24th Annual Conference on Neural Information Processing Systems, p.113, 2010.

Z. Martinasek, J. Hajny, and L. Malina, Optimization of power analysis using neural network, International Conference on Smart Card Research and Advanced Applications, p.57, 2013.

D. May, L. Henk, N. P. Muller, and . Smart, Non-deterministic processors, Australasian Conference on Information Security and Privacy, pp.115-129, 2001.

Z. Martinasek, L. Malina, and K. Trasy, Profiling power analysis attack based on multi-layer perceptron network, Computational Problems in Science and Engineering, p.57, 2015.

S. Moore, Improving smart card security using self-timed circuits, Proceedings. Eighth International Symposium on, pp.211-218, 2002.

S. Moore, Balanced self-checking asynchronous logic for smart card applications, Microprocessors and Microsystems, vol.27, pp.421-430, 2003.

S. Mangard, E. Oswald, and T. Popp, Power analysis attacks: Revealing the secrets of smart cards, vol.31, p.41, 2008.

A. Moradi, Pushing the limits: a very compact and a threshold implementation of AES, Annual International Conference on the Theory and Applications of Cryptographic Techniques, p.43, 2011.

R. Moreno, Methods of data storage and data storage systems. US3971916A. 1974 (cit, vol.8

S. Mangard, E. Oswald, and F. Standaert, One for all-all for one: unifying standard differential power analysis attacks, IET Information Security, vol.5, p.36, 2011.

H. Maghrebi, T. Portigliatti, and E. Prouff, Breaking Cryptographic Implementations Using Deep Learning Techniques, International Conference on Security, Privacy, and Applied Cryptography Engineering, vol.131, p.57, 2016.

Z. Martinasek and V. Zeman, Innovative method of the power analysis, Radioengineering 22, vol.2, p.57, 2013.

S. Nagashima, DPA using phase-based waveform matching against random-delay countermeasure, Circuits and Systems, pp.1807-1810, 2007.

V. Nair and G. E. Hinton, Rectified linear units improve restricted boltzmann machines, Proceedings of the 27th international conference on machine learning (ICML-10), vol.122, p.110, 2010.

. Fips and . Nist, Advanced Encryption Standard (AES), vol.197, 2001.

O. Colin, Z. Flynn, and . Chen, ChipWhisperer: An opensource platform for hardware embedded security research, Constructive Side-Channel Analysis and Secure Design, vol.94, p.77, 2014.

E. Oswald, A side-channel analysis resistant description of the AES S-box, International Workshop on Fast Software Encryption, p.43, 2005.

E. Oswald, Practical second-order DPA attacks for masked smart card implementations of block ciphers, Cryptographers? Track at the RSA Conference, p.44, 2006.

C. Ou, Manifold Learning Towards Masking Implementations: A First Study. Cryptology ePrint Archive, p.85, 2017.

Y. Oren, O. Weisse, and A. Wool, Practical template-algebraic side channel attacks with extremely low data complexity, Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, p.32, 2013.

Y. Oren, O. Weisse, and A. Wool, A New Framework for Constraint-Based Probabilistic Template Side Channel Attacks, Cryptographic Hardware and Embedded Systems CHES, vol.8731, p.32, 2014.

. Telecom-paristech, DPA Contest 4, p.69

J. Fabrice and . Pautot, Some Formal Solutions in Side-channel Cryptanalysis-An Introduction, In: IACR Cryptology ePrint Archive, p.24, 2008.

E. Peeters, Improved higher-order side-channel attacks with FPGA experiments, International Workshop on Cryptographic Hardware and Embedded Systems, p.44, 2005.

S. Picek, A. Heuser, and S. Guilley, Template attack versus Bayes classifier, Journal of Cryptographic Engineering, vol.7, p.39, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01629884

T. Popp and S. Mangard, Masked dual-rail pre-charge logic: DPA-resistance without routing constraints, International Workshop on Cryptographic Hardware and Embedded Systems, p.43, 2005.

E. Prouff and M. Rivain, Masking against side-channel attacks: A formal security proof, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.142-159, 2013.

E. Prouff, M. Rivain, and R. Bevan, Statistical Analysis of Second Order Differential Power Analysis, IEEE Trans. Computers, vol.58, p.44, 2009.

L. Prechelt, Early Stopping -But When?" In: Neural Networks: Tricks of the Trade: Second Edition, p.111, 2012.

E. Prouff, Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database, Cryptology ePrint Archive, vol.136, p.131, 2018.

G. Piret and F. Standaert, Security analysis of higher-order Boolean masking schemes for block ciphers (with conditions of perfect masking), IET Information Security, vol.2, issue.1, p.44, 2008.

S. Pu, Trace Augmentation: What Can Be Done Even Before Preprocessing in a Profiled SCA, In: International Conference on Smart Card Research and Advanced Applications, p.120, 2017.

J. Quisquater and D. Samyde, Electromagnetic analysis (ema): Measures and counter-measures for smart cards, Smart Card Programming and Security, pp.200-210, 2001.

O. Reparaz, B. Gierlichs, and I. Verbauwhede, Selecting Time Samples for Multivariate DPA Attacks". English. In: Cryptographic Hardware and Embedded Systems CHES 2012, vol.7428, pp.155-174, 2012.

. /-/-dx, , vol.87

M. Rivain, On the exact success rate of side channel analysis in the gaussian model, International Workshop on Selected Areas in Cryptography, p.35, 2008.

L. Ronald and . Rivest, Cryptography and machine learning, International Conference on the Theory and Application of Cryptology, p.57, 1991.

C. Rechberger and E. Oswald, Practical Template Attacks". English, Lecture Notes in Computer Science, vol.3325

H. Springer-berlin, , p.41, 2005.

M. Rivain and E. Prouff, Provably secure higher-order masking of AES, International Workshop on Cryptographic Hardware and Embedded Systems, p.43, 2010.

M. Renauld and F. Standaert, Algebraic Side-Channel Attacks, In: Inscrypt, vol.6151, p.31, 2009.

A. Ronald-l-rivest, L. Shamir, and . Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM 21, vol.2, p.27, 1978.

F. Mathieu-renauld, N. Standaert, and . Veyrat-charvillon, Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA, In: CHES, vol.5747, p.32, 2009.

X. François, C. Standaert, and . Archambeau, Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages, Cryptographic Hardware and Embedded Systems CHES, vol.5154, pp.411-425, 2008.

K. Schramm, A collision-attack on AES, International Workshop on Cryptographic Hardware and Embedded Systems, p.29, 2004.

W. Schindler, K. Lemke, and C. Paar, A stochastic model for differential side channel cryptanalysis, International Workshop on Cryptographic Hardware and Embedded Systems, p.127, 2005.

B. Schölkopf and K. Mullert, Fisher discriminant analysis with kernels, Neural networks for signal processing IX, vol.1, p.1, 1999.

F. Standaert, T. Malkin, and M. Yung, A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks

. English, Lecture Notes in Computer Science, Advances in Cryptology -EUROCRYPT 2009, vol.5479, p.32, 2009.

Y. Song, Direct Loss Minimization for Training Deep Neural Nets, p.113, 2015.

K. Schramm and C. Paar, Higher order masking of the AES, Cryptographers? Track at the RSA Conference, p.43, 2006.

R. Specht, Improving Non-Profiled Attacks on Exponentiations Based on Clustering and Extracting Leakage from Multi-Channel High-Resolution EM Measurements, Sixth International Workshop on Constructive Side-Channel Analysis and Secure Design, vol.69, p.62, 2015.

F. Standaert, E. Peeters, and J. Quisquater, On the masking countermeasure and higher-order power analysis attacks, Information Technology: Coding and Computing, 2005. ITCC 2005. International Conference on, vol.1, p.44, 2005.

B. Schölkopf, A. Smola, and K. Müller, Nonlinear component analysis as a kernel eigenvalue problem, Neural computation, vol.10, pp.1299-1319, 1998.

Y. Patrice, D. Simard, J. C. Steinkraus, and . Platt, Best Practices for Convolutional Neural Networks Applied to Visual Document Analysis, In: ICDAR, vol.3, pp.958-962, 2003.

K. Schramm, T. Wollinger, and C. Paar, A new class of collision attacks and its application to DES, International Workshop on Fast Software Encryption, p.29, 2003.

M. Tunstall and O. Benoit, Efficient use of random delays in embedded software, IFIP International Workshop on Information Security Theory and Practices, p.122, 2007.

T. M. Mitchell, Machine Learning, p.47, 1997.

M. Ugon, Portable data carrier including a microprocessor. US4211919A. 1977 (cit, vol.8

N. Veyrat-charvillon, Shuffling against side-channel attacks: A comprehensive study with cautionary note, International Conference on the Theory and Application of Cryptology and Information Security

. Springer, , p.43, 2012.

N. Veyrat-charvillon and F. Standaert, Mutual information analysis: how, when and why?, In: Cryptographic Hardware and Embedded Systems-CHES 2009, p.36, 2009.

N. Veyrat-charvillon, B. Gérard, and F. Standaert, Soft Analytical Side-Channel Attacks, IACR Cryptology ePrint Archive, p.32, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01096218

H. David, W. G. Wolpert, and . Macready, No free lunch theorems for optimization, IEEE transactions on evolutionary computation, vol.1, issue.1, p.56, 1997.

J. Waddle and D. Wagner, Towards Efficient Second-Order Power Analysis, Cryptographic Hardware and Embedded Systems -CHES 2004

, Lecture Notes in Computer Science, vol.3156, p.44, 2004.

J. Weston and C. Watkins, Multi-class support vector machines, p.57, 1998.

. Jasper-gj-van-woudenberg, B. Marc-f-witteman, and . Bakker, Improving differential power analysis by elastic alignment, Cryptographersí Track at the RSA Conference, pp.104-119, 2011.

H. Yu and J. Yang, A direct LDA algorithm for high-dimensional data with application to face recognition, Pattern Recognition, vol.34, pp.2067-2070, 2001.

X. Zhou, A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher, International Conference on Smart Card Research and Advanced Applications, vol.102, p.85, 2017.