{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T12:56:30Z","timestamp":1762520190708,"version":"build-2065373602"},"reference-count":39,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computational Science"],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1016\/j.jocs.2023.102078","type":"journal-article","created":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T20:58:54Z","timestamp":1685393934000},"page":"102078","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":8,"special_numbering":"C","title":["A deep learning-based side channel attack model for different block ciphers"],"prefix":"10.1016","volume":"72","author":[{"given":"Lang","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6917-6889","authenticated-orcid":false,"given":"Yu","family":"Ou","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jocs.2023.102078_b1","doi-asserted-by":"crossref","DOI":"10.1037\/met0000330","article-title":"Summary-statistics-based power analysis: A new and practical method to determine sample size for mixed-effects modeling","author":"Murayama","year":"2022","journal-title":"Psychol. Methods"},{"issue":"7","key":"10.1016\/j.jocs.2023.102078_b2","first-page":"1314","article-title":"Novel hybrid CMOS\/memristor implementation of the AES algorithm robust against differential power analysis attack","volume":"67","author":"Masoumi","year":"2019","journal-title":"IEEE Trans. Circuits Syst. II"},{"key":"10.1016\/j.jocs.2023.102078_b3","series-title":"2009 Second Pacific-Asia Conference on Web Mining and Web-Based Application","first-page":"120","article-title":"Differential electromagnetic analysis on AES cryptographic system","author":"Ding","year":"2009"},{"key":"10.1016\/j.jocs.2023.102078_b4","series-title":"Proceedings of the 9th International Conference on Computer Engineering and Networks","first-page":"565","article-title":"Power analysis attack on a lightweight block cipher GIFT","author":"Zhang","year":"2021"},{"key":"10.1016\/j.jocs.2023.102078_b5","series-title":"2016 ACM\/IEEE 7th International Conference on Cyber-Physical Systems","first-page":"1","article-title":"Acoustic side-channel attacks on additive manufacturing systems","author":"Al Faruque","year":"2016"},{"year":"2017","series-title":"Securing vehicle to vehicle communications using blockchain through visible light and acoustic side-channels","author":"Rowan","key":"10.1016\/j.jocs.2023.102078_b6"},{"key":"10.1016\/j.jocs.2023.102078_b7","series-title":"International Symposium on Research in Attacks, Intrusions, and Defenses","first-page":"118","article-title":"Cloudradar: A real-time side-channel attack detection system in clouds","author":"Zhang","year":"2016"},{"issue":"5","key":"10.1016\/j.jocs.2023.102078_b8","doi-asserted-by":"crossref","first-page":"1039","DOI":"10.1109\/TIFS.2016.2516905","article-title":"A framework for the analysis and evaluation of algebraic fault attacks on lightweight block ciphers","volume":"11","author":"Zhang","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"10.1016\/j.jocs.2023.102078_b9","doi-asserted-by":"crossref","first-page":"791","DOI":"10.1007\/s40745-019-00230-7","article-title":"Predicting the unpredictable: An application of machine learning algorithms in Indian stock market","volume":"9","author":"Saini","year":"2022","journal-title":"Ann. Data Sci."},{"issue":"1","key":"10.1016\/j.jocs.2023.102078_b10","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/s40745-021-00344-x","article-title":"A comprehensive comparative study of Artificial Neural Network (ANN) and support vector machines (SVM) on stock forecasting","volume":"10","author":"Kurani","year":"2023","journal-title":"Ann. Data Sci."},{"issue":"1","key":"10.1016\/j.jocs.2023.102078_b11","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1007\/s40745-022-00421-9","article-title":"A statistical analysis of Chinese stock indices returns from approach of parametric distributions fitting","volume":"10","author":"Si","year":"2023","journal-title":"Ann. Data Sci."},{"key":"10.1016\/j.jocs.2023.102078_b12","series-title":"IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004","first-page":"3","article-title":"Keyboard acoustic emanations","author":"Asonov","year":"2004"},{"key":"10.1016\/j.jocs.2023.102078_b13","series-title":"Least squares support vector machines for side-channel analysis","first-page":"99","author":"Hospodar","year":"2011"},{"year":"2011","series-title":"Side Channel Attack: An Approach Based on Machine Learning, Vol. 29","author":"Lerman","key":"10.1016\/j.jocs.2023.102078_b14"},{"key":"10.1016\/j.jocs.2023.102078_b15","series-title":"Cryptographic Hardware and Embedded Systems - CHES 2002, Vol. 2523","first-page":"13","article-title":"Template attacks","author":"Chari","year":"2003"},{"issue":"4","key":"10.1016\/j.jocs.2023.102078_b16","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/s13389-011-0023-x","article-title":"Machine learning in side-channel analysis: A first study","volume":"1","author":"Hospodar","year":"2011","journal-title":"J. Cryptogr. Eng."},{"key":"10.1016\/j.jocs.2023.102078_b17","series-title":"Constructive Side-Channel Analysis and Secure Design. COSADE 2012, Vol. 7275","first-page":"249","article-title":"Intelligent machine homicide-breaking cryptographic devices using support vector machines","author":"Heuser","year":"2012"},{"key":"10.1016\/j.jocs.2023.102078_b18","series-title":"Smart Card Research and Advanced Applications. CARDIS 2012, Vol. 7771","first-page":"263","article-title":"Efficient template attacks based on probabilistic multi-class support vector machines","author":"Bartkewitz","year":"2013"},{"key":"10.1016\/j.jocs.2023.102078_b19","series-title":"Constructive Side-Channel Analysis and Secure Design. COSADE 2015, Vol. 9064","first-page":"20","article-title":"Template attacks vs. Machine learning revisited (and the curse of dimensionality in side-channel analysis)","author":"Lerman","year":"2015"},{"key":"10.1016\/j.jocs.2023.102078_b20","series-title":"International Conference on Security, Privacy, and Applied Cryptography Engineering","first-page":"3","article-title":"Breaking cryptographic implementations using deep learning techniques","author":"Maghrebi","year":"2016"},{"key":"10.1016\/j.jocs.2023.102078_b21","series-title":"International Conference on Cryptographic Hardware and Embedded Systems","first-page":"45","article-title":"Convolutional neural networks with data augmentation against jitter-based countermeasures","author":"Cagli","year":"2017"},{"key":"10.1016\/j.jocs.2023.102078_b22","doi-asserted-by":"crossref","first-page":"148","DOI":"10.46586\/tches.v2019.i3.148-179","article-title":"Make some noise. Unleashing the power of convolutional neural networks for profiled side-channel analysis","author":"Kim","year":"2019","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"issue":"2","key":"10.1016\/j.jocs.2023.102078_b23","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1007\/s13389-019-00220-8","article-title":"Deep learning for side-channel analysis and introduction to ASCAD database","volume":"10","author":"Benadjila","year":"2020","journal-title":"J. Cryptogr. Eng."},{"key":"10.1016\/j.jocs.2023.102078_b24","series-title":"International Workshop on Constructive Side-Channel Analysis and Secure Design","first-page":"175","article-title":"Kilroy was here: The first step towards explainability of neural networks in profiled side-channel analysis","author":"Valk","year":"2020"},{"key":"10.1016\/j.jocs.2023.102078_b25","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1007\/978-3-319-15765-8_18","article-title":"Profiling power analysis attack based on multi-layer perceptron network","volume":"343","author":"Martinasek","year":"2015","journal-title":"Comput. Probl. Sci. Eng."},{"key":"10.1016\/j.jocs.2023.102078_b26","doi-asserted-by":"crossref","unstructured":"Z. Martinasek, P. Dzurenda, L. Malina, Profiling power analysis attack based on MLP in DPA contest V4.2, in: 2016 39th International Conference on Telecommunications and Signal Processing, TSP, 2016, pp. 223\u2013226.","DOI":"10.1109\/TSP.2016.7760865"},{"key":"10.1016\/j.jocs.2023.102078_b27","first-page":"1","article-title":"A multidirectional LSTM model for predicting the stability of a smart grid","volume":"PP","author":"Alazab","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.jocs.2023.102078_b28","series-title":"Security, Privacy, and Applied Cryptography Engineering. SPACE 2018, Vol. 11348","first-page":"157","article-title":"On the performance of convolutional neural networks for side-channel analysis","author":"S.","year":"2018"},{"key":"10.1016\/j.jocs.2023.102078_b29","series-title":"International Conference on Security, Privacy, and Applied Cryptography Engineering","first-page":"3","article-title":"Breaking cryptographic implementations using deep learning techniques","author":"Maghrebi","year":"2016"},{"key":"10.1016\/j.jocs.2023.102078_b30","doi-asserted-by":"crossref","first-page":"389","DOI":"10.46586\/tches.v2020.i4.389-415","article-title":"Remove some noise: On pre-processing of side-channel measurements with autoencoders","author":"Wu","year":"2020","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"10.1016\/j.jocs.2023.102078_b31","series-title":"Computational Problems in Science and Engineering","first-page":"317","article-title":"Profiling power analysis attack based on multi-layer perceptron network","author":"Martinasek","year":"2015"},{"key":"10.1016\/j.jocs.2023.102078_b32","series-title":"International Conference on Security, Privacy, and Applied Cryptography Engineering","first-page":"157","article-title":"On the performance of convolutional neural networks for side-channel analysis","author":"Picek","year":"2018"},{"key":"10.1016\/j.jocs.2023.102078_b33","doi-asserted-by":"crossref","first-page":"552","DOI":"10.46586\/tches.v2021.i3.552-598","article-title":"DL-LA: Deep learning leakage assessment: A modern roadmap for SCA evaluations","author":"Moos","year":"2021","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"10.1016\/j.jocs.2023.102078_b34","doi-asserted-by":"crossref","first-page":"413","DOI":"10.46586\/tches.v2022.i3.413-437","article-title":"The best of two worlds: Deep learning-assisted template attack","author":"Wu","year":"2022","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"10.1016\/j.jocs.2023.102078_b35","doi-asserted-by":"crossref","first-page":"677","DOI":"10.46586\/tches.v2021.i3.677-707","article-title":"Reinforcement learning for hyperparameter tuning in deep learning-based side-channel analysis","author":"Rijsdijk","year":"2021","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"10.1016\/j.jocs.2023.102078_b36","doi-asserted-by":"crossref","first-page":"235","DOI":"10.46586\/tches.v2021.i3.235-274","article-title":"Pay attention to raw traces: A deep learning architecture for end-to-end profiling attacks","author":"Lu","year":"2021","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"10.1016\/j.jocs.2023.102078_b37","doi-asserted-by":"crossref","first-page":"828","DOI":"10.46586\/tches.v2022.i4.828-861","article-title":"Exploring feature selection scenarios for deep learning-based side-channel analysis","author":"Perin","year":"2022","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"10.1016\/j.jocs.2023.102078_b38","series-title":"International Workshop on Cryptographic Hardware and Embedded Systems","first-page":"30","article-title":"A stochastic model for differential side channel cryptanalysis","author":"Schindler","year":"2005"},{"key":"10.1016\/j.jocs.2023.102078_b39","unstructured":"H. Gao, L. Zhuang, v. Laurens, W.K. Q., Densely Connected Convolutional Networks, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, CVPR, 2017, pp. 4700\u20134708."}],"container-title":["Journal of Computational Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877750323001382?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877750323001382?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T05:23:15Z","timestamp":1761801795000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877750323001382"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9]]},"references-count":39,"alternative-id":["S1877750323001382"],"URL":"https:\/\/doi.org\/10.1016\/j.jocs.2023.102078","relation":{},"ISSN":["1877-7503"],"issn-type":[{"type":"print","value":"1877-7503"}],"subject":[],"published":{"date-parts":[[2023,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A deep learning-based side channel attack model for different block ciphers","name":"articletitle","label":"Article Title"},{"value":"Journal of Computational Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jocs.2023.102078","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"102078"}}