Page 465 - 《软件学报》2026年第1期
P. 465
462 软件学报 2026 年第 37 卷第 1 期
Cryptographic Hardware and Embedded Systems, 2021, 4: 27–56. [doi: 10.46586/tches.v2021.i4.27-56]
[48] Choudary O, Kuhn MG. Template attacks on different devices. In: Prouff E, ed. Proc. of the 5th Int’l Workshop on Constructive Side-
channel Analysis and Secure Design. Paris: Springer, 2014. 179–198. [doi: 10.1007/978-3-319-10175-0_13]
[49] Choudary MO, Kuhn MG. Efficient, portable template attacks. IEEE Trans. on Information Forensics and Security, 2018, 13(2): 490–501.
[doi: 10.1109/tifs.2017.2757440]
[50] Wang HY, Brisfors M, Forsmark S, Dubrova E. How diversity affects deep-learning side-channel attacks. In: Proc. of the 2019 IEEE
Nordic Circuits and Systems Conf. (NORCAS): NORCHIP and Int’l Symp. of System-on-chip (SoC). Helsinki: IEEE, 2019. 1–7. [doi: 10.
1109/NORCHIP.2019.8906945]
[51] Wu LC, Picek S. Remove some noise: On pre-processing of side-channel measurements with autoencoders. IACR Trans. on
Cryptographic Hardware and Embedded Systems, 2020, 4: 389–415. [doi: 10.13154/tches.v2020.i4.389-415]
[52] Yu HG, Wang M, Song XY, Shan HQ, Qiu HB, Wang JY, Yang KC. Noise2Clean: Cross-device side-channel traces denoising with
unsupervised deep learning. Electronics, 2023, 12(4): 1054. [doi: 10.3390/electronics12041054]
[53] Wu LC, Won YS, Jap D, Perin G, Bhasin S, Picek S. Ablation analysis for multi-device deep learning-based physical side-channel
analysis. IEEE Trans. on Dependable and Secure Computing, 2024, 21(3): 1331–1341. [doi: 10.1109/tdsc.2023.3278857]
[54] Paguada S, Batina L, Buhan I, Armendariz I. Playing with blocks: Toward re-usable deep learning models for side-channel profiled
attacks. IEEE Trans. on Information Forensics and Security, 2022, 17: 2835–2847. [doi: 10.1109/tifs.2022.3196273]
[55] Rioja U, Batina L, Flores JL, Armendariz I. Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis.
Computer Networks, 2021, 198: 108405. [doi: 10.1016/j.comnet.2021.108405]
[56] Thapar D, Alam M, Mukhopadhyay D. Transca: Cross-family profiled side-channel attacks using transfer learning on deep neural
networks. Cryptology ePrint Archive, Paper 2020/1258, 2020.
[57] Liskov M, Rivest RL, Wagner D. Tweakable block ciphers. Journal of Cryptology, 2011, 24: 588–613. [doi: 10.1007/3-540-45708-9_3]
[58] Liu JJ, Sun B, Liu GQ, Dong XF, Liu L, Zhang H, Li C. New wine old bottles: Feistel structure revised. IEEE Trans. on Information
Theory, 2023, 69(3): 2000–2008. [doi: 10.1109/tit.2022.3223139]
[59] Yu HG, Shan HQ, Panoff M, Jin YE. Cross-device profiled side-channel attacks using meta-transfer learning. In: Proc. of the 58th
ACM/IEEE Design Automation Conf. (DAC). San Francisco: IEEE, 2021. 703–708. [doi: 10.1109/DAC18074.2021.9586100]
[60] Gohr A, Jacob S, Schindler W. CHES 2018 side channel contest CTF-solution of the AES challenges. Cryptology ePrint Archive, Paper
2019/094, 2019.
[61] Wang CG, Ninan M, Reilly S, Ward J, Hawkins W, Wang BY, Emmert JM. Portability of deep-learning side-channel attacks against
software discrepancies. In: Proc. of the 16th ACM Conf. on Security and Privacy in Wireless and Mobile Networks. Guildford: ACM,
2023. 227–238. [doi: 10.1145/3558482.3590177]
[62] Seckiner S, Kose S. Preprocessing of the physical leakage information to combine side-channel distinguishers. IEEE Trans. on Very
Large Scale Integration (VLSI) Systems, 2021, 29(12): 2052–2063. [doi: 10.1109/tvlsi.2021.3115420]
[63] Souissi Y, Nassar M, Guilley S, Danger JL, Flament F. First principal components analysis: A new side channel distinguisher. In: Rhee
KH, Nyang D, eds. Proc. of the 13th Int’l Conf. on Information Security and Cryptology. Seoul: Springer, 2011. 407–419. [doi: 10.1007/
978-3-642-24209-0_27]
[64] Mahmudlu R, Banciu V, Batina L, Buhan I. LDA-based clustering as a side-channel distinguisher. In: Hancke G, Markantonakis K, eds.
Proc. of the 12th Int’l Workshop on Radio Frequency Identification and IoT Security. Hong Kong: Springer, 2017. 62–75. [doi: 10.1007/
978-3-319-62024-4_5]
[65] Kizhvatov I. Side channel analysis of AVR XMEGA crypto engine. In: Proc. of the 4th Workshop on Embedded Systems Security.
Grenoble: ACM, 2009. 8. [doi: 10.1145/1631716.1631724]
[66] Danial J, Das D, Golder A, Ghosh S, Raychowdhury A, Sen S. EM-X-DL: Efficient cross-device deep learning side-channel attack with
noisy EM signatures. ACM Journal on Emerging Technologies in Computing Systems, 2021, 18(1): 4. [doi: 10.1145/3465380]
[67] Won YS, Hou XL, Jap D, Breier J, Bhasin S. Back to the basics: Seamless integration of side-channel pre-processing in deep neural
networks. IEEE Trans. on Information Forensics and Security, 2021, 16: 3215–3227. [doi: 10.1109/tifs.2021.3076928]
[68] Ngo K, Dubrova E. Side-channel analysis of the random number generator in STM32 MCUs. In: Proc. of the 2022 Great Lakes Symp. on
VLSI 2022. Irvine: ACM, 2022. 15–20. [doi: 10.1145/3526241.3530324]
[69] Le TH, Clédière J, Serviere C, Lacoume JL. Noise reduction in side channel attack using fourth-order cumulant. IEEE Trans. on
Information Forensics and Security, 2007, 2(4): 710–720. [doi: 10.1109/TIFS.2007.910252]
[70] Coron JS, Kizhvatov I. Analysis and improvement of the random delay countermeasure of CHES 2009. In: Mangard S, Standaert FX, eds.
Proc. of the 12th Int’l Workshop on Cryptographic Hardware and Embedded Systems. Santa Barbara: Springer, 2010. 95–109. [doi: 10.

