{"id":"https://openalex.org/W3202257033","doi":"https://doi.org/10.1007/s13389-023-00320-6","title":"No (good) loss no gain: systematic evaluation of loss functions in deep learning-based side-channel analysis","display_name":"No (good) loss no gain: systematic evaluation of loss functions in deep learning-based side-channel analysis","publication_year":2023,"publication_date":"2023-05-28","ids":{"openalex":"https://openalex.org/W3202257033","doi":"https://doi.org/10.1007/s13389-023-00320-6","mag":"3202257033"},"language":"en","primary_location":{"id":"doi:10.1007/s13389-023-00320-6","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s13389-023-00320-6","pdf_url":"https://link.springer.com/content/pdf/10.1007/s13389-023-00320-6.pdf","source":{"id":"https://openalex.org/S2764800400","display_name":"Journal of Cryptographic Engineering","issn_l":"2190-8508","issn":["2190-8508","2190-8516"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cryptographic Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s13389-023-00320-6.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041356164","display_name":"Maikel Kerkhof","orcid":null},"institutions":[{"id":"https://openalex.org/I98358874","display_name":"Delft University of Technology","ror":"https://ror.org/02e2c7k09","country_code":"NL","type":"education","lineage":["https://openalex.org/I98358874"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Maikel Kerkhof","raw_affiliation_strings":["Cyber Security Research Group, Delft University of Technology, Mekelweg 2, Delft, The Netherlands"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Cyber Security Research Group, Delft University of Technology, Mekelweg 2, Delft, The Netherlands","institution_ids":["https://openalex.org/I98358874"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045570758","display_name":"Lichao Wu","orcid":"https://orcid.org/0000-0002-7139-732X"},"institutions":[{"id":"https://openalex.org/I98358874","display_name":"Delft University of Technology","ror":"https://ror.org/02e2c7k09","country_code":"NL","type":"education","lineage":["https://openalex.org/I98358874"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Lichao Wu","raw_affiliation_strings":["Cyber Security Research Group, Delft University of Technology, Mekelweg 2, Delft, The Netherlands"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Cyber Security Research Group, Delft University of Technology, Mekelweg 2, Delft, The Netherlands","institution_ids":["https://openalex.org/I98358874"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082617536","display_name":"Guilherme Perin","orcid":"https://orcid.org/0000-0003-3799-7636"},"institutions":[{"id":"https://openalex.org/I145872427","display_name":"Radboud University Nijmegen","ror":"https://ror.org/016xsfp80","country_code":"NL","type":"education","lineage":["https://openalex.org/I145872427"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Guilherme Perin","raw_affiliation_strings":["Digital Security Group, Radboud University, Postbus 9010, Nijmegen, The Netherlands"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Digital Security Group, Radboud University, Postbus 9010, Nijmegen, The Netherlands","institution_ids":["https://openalex.org/I145872427"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024072796","display_name":"Stjepan Picek","orcid":"https://orcid.org/0000-0001-7509-4337"},"institutions":[{"id":"https://openalex.org/I145872427","display_name":"Radboud University Nijmegen","ror":"https://ror.org/016xsfp80","country_code":"NL","type":"education","lineage":["https://openalex.org/I145872427"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Stjepan Picek","raw_affiliation_strings":["Digital Security Group, Radboud University, Postbus 9010, Nijmegen, The Netherlands"],"raw_orcid":"https://orcid.org/0000-0001-7509-4337","affiliations":[{"raw_affiliation_string":"Digital Security Group, Radboud University, Postbus 9010, Nijmegen, The Netherlands","institution_ids":["https://openalex.org/I145872427"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5041356164"],"corresponding_institution_ids":["https://openalex.org/I98358874"],"apc_list":{"value":2390,"currency":"EUR","value_usd":2990},"apc_paid":{"value":2390,"currency":"EUR","value_usd":2990},"fwci":3.6929,"has_fulltext":true,"cited_by_count":25,"citation_normalized_percentile":{"value":0.94271316,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"13","issue":"3","first_page":"311","last_page":"324"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9876999855041504,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9742000102996826,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hyperparameter","display_name":"Hyperparameter","score":0.7653377056121826},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7278809547424316},{"id":"https://openalex.org/keywords/cross-entropy","display_name":"Cross entropy","score":0.641739010810852},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5801339149475098},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5499833822250366},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5324493646621704},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5260928869247437},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5103225111961365},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.4117946922779083},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.266363263130188}],"concepts":[{"id":"https://openalex.org/C8642999","wikidata":"https://www.wikidata.org/wiki/Q4171168","display_name":"Hyperparameter","level":2,"score":0.7653377056121826},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7278809547424316},{"id":"https://openalex.org/C167981619","wikidata":"https://www.wikidata.org/wiki/Q1685498","display_name":"Cross entropy","level":3,"score":0.641739010810852},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5801339149475098},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5499833822250366},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5324493646621704},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5260928869247437},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5103225111961365},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.4117946922779083},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.266363263130188},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/s13389-023-00320-6","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s13389-023-00320-6","pdf_url":"https://link.springer.com/content/pdf/10.1007/s13389-023-00320-6.pdf","source":{"id":"https://openalex.org/S2764800400","display_name":"Journal of Cryptographic Engineering","issn_l":"2190-8508","issn":["2190-8508","2190-8516"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cryptographic Engineering","raw_type":"journal-article"},{"id":"pmh:oai:repository.ubn.ru.nl:2066/293719","is_oa":true,"landing_page_url":"https://hdl.handle.net/2066/293719","pdf_url":"https://repository.ubn.ru.nl//bitstream/handle/2066/293719/293719.pdf","source":{"id":"https://openalex.org/S4306401067","display_name":"Radboud Repository (Radboud University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I145872427","host_organization_name":"Radboud University Nijmegen","host_organization_lineage":["https://openalex.org/I145872427"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article / Letter to editor"},{"id":"pmh:tud:oai:tudelft.nl:uuid:7fb72f35-bcf8-4a90-974a-45fe2102dfa4","is_oa":true,"landing_page_url":"http://resolver.tudelft.nl/uuid:7fb72f35-bcf8-4a90-974a-45fe2102dfa4","pdf_url":"http://resolver.tudelft.nl/uuid:7fb72f35-bcf8-4a90-974a-45fe2102dfa4","source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cryptographic Engineering","raw_type":"info:eu-repo/semantics/article"},{"id":"pmh:ru:oai:repository.ubn.ru.nl:2066/293719","is_oa":true,"landing_page_url":"http://hdl.handle.net/2066/293719","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cryptographic Engineering, 1 - 14","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.1007/s13389-023-00320-6","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s13389-023-00320-6","pdf_url":"https://link.springer.com/content/pdf/10.1007/s13389-023-00320-6.pdf","source":{"id":"https://openalex.org/S2764800400","display_name":"Journal of Cryptographic Engineering","issn_l":"2190-8508","issn":["2190-8508","2190-8516"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cryptographic Engineering","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G669276890","display_name":null,"funder_award_id":"CS.019","funder_id":"https://openalex.org/F4320321800","funder_display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek"}],"funders":[{"id":"https://openalex.org/F4320321800","display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","ror":"https://ror.org/04jsz6e67"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W3202257033.pdf"},"referenced_works_count":39,"referenced_works":["https://openalex.org/W1752847028","https://openalex.org/W1796231437","https://openalex.org/W1972978214","https://openalex.org/W2556867355","https://openalex.org/W2594265094","https://openalex.org/W2604086375","https://openalex.org/W2746796098","https://openalex.org/W2810943746","https://openalex.org/W2903143476","https://openalex.org/W2923594358","https://openalex.org/W2949117887","https://openalex.org/W2954019744","https://openalex.org/W2955805282","https://openalex.org/W2962730503","https://openalex.org/W2963351448","https://openalex.org/W2979978950","https://openalex.org/W2990296674","https://openalex.org/W2990306706","https://openalex.org/W3003493139","https://openalex.org/W3004280948","https://openalex.org/W3010290582","https://openalex.org/W3011143880","https://openalex.org/W3016108562","https://openalex.org/W3046385973","https://openalex.org/W3081745170","https://openalex.org/W3096110808","https://openalex.org/W3105654374","https://openalex.org/W3126247501","https://openalex.org/W3185518807","https://openalex.org/W3208320534","https://openalex.org/W4232050619","https://openalex.org/W4289115712","https://openalex.org/W4289552067","https://openalex.org/W4382322519","https://openalex.org/W4390689254","https://openalex.org/W4391061070","https://openalex.org/W4391731596","https://openalex.org/W6679338098","https://openalex.org/W6816565927"],"related_works":["https://openalex.org/W2140186469","https://openalex.org/W4390421286","https://openalex.org/W4280563792","https://openalex.org/W4389724018","https://openalex.org/W4318719684","https://openalex.org/W4318559728","https://openalex.org/W3183136280","https://openalex.org/W2775233965","https://openalex.org/W3046682795","https://openalex.org/W2994927414"],"abstract_inverted_index":{"Abstract":[0],"Deep":[1],"learning":[2,54,112,163],"is":[3,30,83],"a":[4,21,118,140,198],"powerful":[5],"direction":[6],"for":[7,65,170],"profiling":[8],"side-channel":[9,66,135],"analysis":[10],"as":[11],"it":[12,29],"can":[13,42],"break":[14],"targets":[15],"protected":[16],"with":[17,20,101],"countermeasures":[18],"even":[19],"relatively":[22],"small":[23],"number":[24],"of":[25,85,109,143,146,205],"attack":[26,39],"traces.":[27],"Still,":[28,194],"necessary":[31],"to":[32,36],"conduct":[33],"hyperparameter":[34],"tuning":[35],"reach":[37],"strong":[38],"performance,":[40],"which":[41,71],"be":[43],"far":[44],"from":[45,51],"trivial.":[46],"Besides":[47],"many":[48],"options":[49],"stemming":[50],"the":[52,73,78,86,97,102,105,110,144,151,203],"machine":[53,162],"domain,":[55],"recent":[56],"years":[57],"also":[58],"brought":[59],"neural":[60,89,113,206],"network":[61,90,207],"elements":[62],"specially":[63],"designed":[64,169],"analysis.":[67],"The":[68,92],"loss":[69,76,94,129,148,157,166,178,188],"function,":[70],"calculates":[72],"error":[74],"or":[75,107],"between":[77,104],"actual":[79],"and":[80,164,185],"desired":[81],"output,":[82],"one":[84],"most":[87,191],"important":[88],"elements.":[91],"resulting":[93],"values":[95],"guide":[96],"weights":[98],"update":[99],"associated":[100],"connections":[103],"neurons":[106],"filters":[108],"deep":[111],"network.":[114],"Unfortunately,":[115],"despite":[116],"being":[117],"highly":[119],"relevant":[120],"hyperparameter,":[121],"there":[122],"are":[123],"no":[124],"systematic":[125],"comparisons":[126],"among":[127],"different":[128,147],"functions":[130,149,158,167,189],"regarding":[131],"their":[132],"effectiveness":[133],"in":[134,150,161,190],"attacks.":[136],"This":[137],"work":[138],"provides":[139],"detailed":[141],"study":[142],"efficiency":[145],"SCA":[152],"context.":[153],"We":[154],"evaluate":[155],"five":[156],"commonly":[159],"used":[160],"three":[165],"specifically":[168],"SCA.":[171],"Our":[172],"results":[173],"show":[174],"that":[175],"an":[176],"SCA-specific":[177],"function":[179],"(called":[180],"CER)":[181],"performs":[182],"very":[183],"well":[184],"outperforms":[186],"other":[187],"evaluated":[192],"settings.":[193],"categorical":[195],"cross-entropy":[196],"represents":[197],"good":[199],"option,":[200],"especially":[201],"considering":[202],"variety":[204],"architectures.":[208]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3}],"updated_date":"2026-05-08T15:41:06.802602","created_date":"2025-10-10T00:00:00"}
