{"id":"https://openalex.org/W2428169085","doi":"https://doi.org/10.1109/hst.2016.7495589","title":"Template attacks using classification algorithms","display_name":"Template attacks using classification algorithms","publication_year":2016,"publication_date":"2016-05-01","ids":{"openalex":"https://openalex.org/W2428169085","doi":"https://doi.org/10.1109/hst.2016.7495589","mag":"2428169085"},"language":"en","primary_location":{"id":"doi:10.1109/hst.2016.7495589","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hst.2016.7495589","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079030319","display_name":"Elif Ozgen","orcid":null},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Elif Ozgen","raw_affiliation_strings":["Technische Universiteit Eindhoven, MB Eindhoven, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Technische Universiteit Eindhoven, MB Eindhoven, The Netherlands","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028204202","display_name":"Louiza Papachristodoulou","orcid":null},"institutions":[{"id":"https://openalex.org/I145872427","display_name":"Radboud University Nijmegen","ror":"https://ror.org/016xsfp80","country_code":"NL","type":"education","lineage":["https://openalex.org/I145872427"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Louiza Papachristodoulou","raw_affiliation_strings":["Radboud University Nijmegen, Digital Security Group - ICIS, GL Nijmegen, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Radboud University Nijmegen, Digital Security Group - ICIS, GL Nijmegen, The Netherlands","institution_ids":["https://openalex.org/I145872427"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051408740","display_name":"Lejla Batina","orcid":"https://orcid.org/0000-0003-0727-3573"},"institutions":[{"id":"https://openalex.org/I145872427","display_name":"Radboud University Nijmegen","ror":"https://ror.org/016xsfp80","country_code":"NL","type":"education","lineage":["https://openalex.org/I145872427"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Lejla Batina","raw_affiliation_strings":["Radboud University Nijmegen, Digital Security Group - ICIS, GL Nijmegen, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Radboud University Nijmegen, Digital Security Group - ICIS, GL Nijmegen, The Netherlands","institution_ids":["https://openalex.org/I145872427"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5079030319"],"corresponding_institution_ids":["https://openalex.org/I83019370"],"apc_list":null,"apc_paid":null,"fwci":1.7139,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.88771901,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"242","last_page":"247"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8268716335296631},{"id":"https://openalex.org/keywords/template","display_name":"Template","score":0.7151545882225037},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5964370369911194},{"id":"https://openalex.org/keywords/template-matching","display_name":"Template matching","score":0.5946722030639648},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4913991689682007},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4816397726535797},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.47278735041618347},{"id":"https://openalex.org/keywords/scalar-multiplication","display_name":"Scalar multiplication","score":0.4701889753341675},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.35887229442596436},{"id":"https://openalex.org/keywords/scalar","display_name":"Scalar (mathematics)","score":0.3175157606601715},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.1421259045600891},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08789882063865662}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8268716335296631},{"id":"https://openalex.org/C82714645","wikidata":"https://www.wikidata.org/wiki/Q438331","display_name":"Template","level":2,"score":0.7151545882225037},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5964370369911194},{"id":"https://openalex.org/C158096908","wikidata":"https://www.wikidata.org/wiki/Q3983303","display_name":"Template matching","level":3,"score":0.5946722030639648},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4913991689682007},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4816397726535797},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.47278735041618347},{"id":"https://openalex.org/C171182647","wikidata":"https://www.wikidata.org/wiki/Q126736","display_name":"Scalar multiplication","level":3,"score":0.4701889753341675},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35887229442596436},{"id":"https://openalex.org/C57691317","wikidata":"https://www.wikidata.org/wiki/Q1289248","display_name":"Scalar (mathematics)","level":2,"score":0.3175157606601715},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.1421259045600891},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08789882063865662},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/hst.2016.7495589","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hst.2016.7495589","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","raw_type":"proceedings-article"},{"id":"pmh:oai:repository.ubn.ru.nl:2066/159598","is_oa":false,"landing_page_url":"https://hdl.handle.net/2066/159598","pdf_url":null,"source":{"id":"https://openalex.org/S4306401067","display_name":"Radboud Repository (Radboud University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I145872427","host_organization_name":"Radboud University Nijmegen","host_organization_lineage":["https://openalex.org/I145872427"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article in monograph or in proceedings"},{"id":"pmh:ru:oai:repository.ubn.ru.nl:2066/159598","is_oa":false,"landing_page_url":"http://hdl.handle.net/2066/159598","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Robinson, W.H. (ed.), HOST 2016: Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) : 3-5 May 2016, The Ritz-Carlton McLean, VA, USA, 242 - 247. Piscataway : IEEE","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W60105051","https://openalex.org/W198953946","https://openalex.org/W229144803","https://openalex.org/W360266487","https://openalex.org/W1461760393","https://openalex.org/W1508193711","https://openalex.org/W1539482743","https://openalex.org/W1540404582","https://openalex.org/W1562630396","https://openalex.org/W1565369953","https://openalex.org/W1752434584","https://openalex.org/W1871651397","https://openalex.org/W1902539741","https://openalex.org/W1998162042","https://openalex.org/W2003736153","https://openalex.org/W2036378739","https://openalex.org/W2116787154","https://openalex.org/W2145498126","https://openalex.org/W2398218726","https://openalex.org/W2542862245","https://openalex.org/W2914572864","https://openalex.org/W2951744003","https://openalex.org/W6628477492","https://openalex.org/W6651121328","https://openalex.org/W6677444029","https://openalex.org/W6712845048","https://openalex.org/W6759495720"],"related_works":["https://openalex.org/W2188111145","https://openalex.org/W2361315595","https://openalex.org/W2602219756","https://openalex.org/W2952185445","https://openalex.org/W1991639997","https://openalex.org/W2572945594","https://openalex.org/W2092361839","https://openalex.org/W2102786134","https://openalex.org/W2360986010","https://openalex.org/W2383447469"],"abstract_inverted_index":{"Template":[0,40],"attacks":[1,112],"constitute":[2],"a":[3,44,127,136,147],"powerful":[4],"side-channel":[5],"attack":[6,23],"technique":[7],"that":[8,60],"is":[9],"shown":[10],"to":[11,54,62,78,106,152],"be":[12,63],"efficient":[13,80],"in":[14,47,89,104],"breaking":[15],"many":[16],"secure":[17],"cryptographic":[18],"implementations.":[19],"This":[20],"type":[21],"of":[22,25,30,50,58,110,135,142],"consists":[24],"two":[26],"phases,":[27],"the":[28,31,36,48,51,55,70,108,115,133],"profiling":[29],"device":[32],"(template":[33],"building)":[34],"and":[35,83],"template":[37,102,111,116,128],"matching":[38,41,117],"phase.":[39,118],"can":[42],"create":[43],"significant":[45],"overhead":[46],"performance":[49],"attack,":[52],"due":[53],"large":[56],"amount":[57],"data":[59,129],"needs":[61],"processed":[64],"for":[65],"every":[66],"possible":[67],"value.":[68],"On":[69],"other":[71],"hand,":[72],"machine":[73,99],"learning":[74,100],"techniques":[75,97],"are":[76,150],"developed":[77],"provide":[79],"pattern":[81],"recognition":[82],"feature":[84],"extraction":[85],"algorithms,":[86],"mainly":[87],"used":[88],"artificial":[90],"intelligence.":[91],"In":[92],"this":[93],"work,":[94],"we":[95,121,149],"combine":[96],"from":[98],"with":[101,156],"attacks,":[103],"order":[105],"improve":[107],"efficiency":[109],"focusing":[113],"on":[114,126],"More":[119],"precisely,":[120],"compare":[122],"three":[123],"classification":[124],"algorithms":[125],"set":[130],"built":[131],"during":[132],"execution":[134],"regular":[137],"scalar":[138,154],"multiplication":[139],"algorithm":[140],"(double-and-add-always)":[141],"mbedTLS":[143],"(formerly":[144],"PolarSSL).":[145],"As":[146],"result,":[148],"able":[151],"retrieve":[153],"bits":[155],"20":[157],"templates":[158],"per":[159],"bit.":[160]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
