{"id":"https://openalex.org/W2126246073","doi":"https://doi.org/10.1007/978-3-642-31912-9_12","title":"Back Propagation Neural Network Based Leakage Characterization for Practical Security Analysis of Cryptographic Implementations","display_name":"Back Propagation Neural Network Based Leakage Characterization for Practical Security Analysis of Cryptographic Implementations","publication_year":2012,"publication_date":"2012-01-01","ids":{"openalex":"https://openalex.org/W2126246073","doi":"https://doi.org/10.1007/978-3-642-31912-9_12","mag":"2126246073"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-31912-9_12","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-31912-9_12","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100801445","display_name":"Shuguo Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shuguo Yang","raw_affiliation_strings":["Graduate University of Chinese Academy of Sciences, 19A Yuquan Lu, Beijing, 100049, P.R. China","State Key Laboratory of Information Security, Institute of Software Chinese Academy of Sciences, P.O. Box 8718, Beijing, 100190, P.R. China"],"affiliations":[{"raw_affiliation_string":"Graduate University of Chinese Academy of Sciences, 19A Yuquan Lu, Beijing, 100049, P.R. China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Software Chinese Academy of Sciences, P.O. Box 8718, Beijing, 100190, P.R. China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063991302","display_name":"Yongbin Zhou","orcid":"https://orcid.org/0000-0002-1337-0655"},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongbin Zhou","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Software Chinese Academy of Sciences, P.O. Box 8718, Beijing, 100190, P.R. China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Software Chinese Academy of Sciences, P.O. Box 8718, Beijing, 100190, P.R. China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074818931","display_name":"Jiye Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiye Liu","raw_affiliation_strings":["Graduate University of Chinese Academy of Sciences, 19A Yuquan Lu, Beijing, 100049, P.R. China","State Key Laboratory of Information Security, Institute of Software Chinese Academy of Sciences, P.O. Box 8718, Beijing, 100190, P.R. China"],"affiliations":[{"raw_affiliation_string":"Graduate University of Chinese Academy of Sciences, 19A Yuquan Lu, Beijing, 100049, P.R. China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Software Chinese Academy of Sciences, P.O. Box 8718, Beijing, 100190, P.R. China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100652778","display_name":"Danyang Chen","orcid":"https://orcid.org/0000-0003-2978-3806"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I25254941","display_name":"Beijing Normal University","ror":"https://ror.org/022k4wk35","country_code":"CN","type":"education","lineage":["https://openalex.org/I25254941"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Danyang Chen","raw_affiliation_strings":["School of Mathematics Sciences, Beijing Normal University, No.19, XinJieKouWai St., Beijing, 100875, P.R. China","State Key Laboratory of Information Security, Institute of Software Chinese Academy of Sciences, P.O. Box 8718, Beijing, 100190, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics Sciences, Beijing Normal University, No.19, XinJieKouWai St., Beijing, 100875, P.R. China","institution_ids":["https://openalex.org/I25254941"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Software Chinese Academy of Sciences, P.O. Box 8718, Beijing, 100190, P.R. China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100801445"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210128818","https://openalex.org/I4210165038"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":1.2688,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.81709767,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"169","last_page":"185"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7848955392837524},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.6718276739120483},{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.605510413646698},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5985264778137207},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5656849145889282},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.49738672375679016},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.3679038882255554},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.33203306794166565},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2989608645439148}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7848955392837524},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.6718276739120483},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.605510413646698},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5985264778137207},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5656849145889282},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.49738672375679016},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3679038882255554},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.33203306794166565},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2989608645439148},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-642-31912-9_12","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-31912-9_12","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4300000071525574,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W200116028","https://openalex.org/W1480799882","https://openalex.org/W1499081748","https://openalex.org/W1502001447","https://openalex.org/W1519539754","https://openalex.org/W1562542037","https://openalex.org/W1566203915","https://openalex.org/W1569512666","https://openalex.org/W1607006990","https://openalex.org/W1740609432","https://openalex.org/W1796231437","https://openalex.org/W1862426464","https://openalex.org/W2053875764","https://openalex.org/W2107839822","https://openalex.org/W2134620466","https://openalex.org/W2140190241","https://openalex.org/W2146817693","https://openalex.org/W2154909745","https://openalex.org/W2177288330","https://openalex.org/W2188162208","https://openalex.org/W2479682916","https://openalex.org/W2484860292","https://openalex.org/W2486433473","https://openalex.org/W2490813647","https://openalex.org/W2491896407","https://openalex.org/W2493587259","https://openalex.org/W2496045601","https://openalex.org/W3216957239"],"related_works":["https://openalex.org/W3006344745","https://openalex.org/W182679101","https://openalex.org/W2103519941","https://openalex.org/W3180573957","https://openalex.org/W2162805750","https://openalex.org/W2043669269","https://openalex.org/W1968560271","https://openalex.org/W4388856880","https://openalex.org/W2081998479","https://openalex.org/W2751059292"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
