1 ChipWhispererⓇ - NewAE Technology Inc, "chipwhisperer"
2 F. Rosenblatt, "The perceptron: A probabilistic model for information storage and organization in the brain" 65 (65): 1958
3 S. Chari, "Template Attacks" 2523 : 13-28, 2002
4 C. Cortes, "Support-vector networks" 20 (20): 273-297, 1995
5 S. Mangard, "Power analysis attacks: Revealing the secrets of smart cards" Springer 2008
6 F. X. Standaert, "Partition vs. comparison side-channel Distinguishers :An empirical evaluation of statistical tests for univariate side-channel attacks against two unprotected CMOS device" 5461 : 253-267, 2008
7 Z. Martinasek, "Optimization of power analysis using neural network" 8419 : 94-107, 2014
8 G. Hospodar, "Machine learning in side-channel analysis : a first study" 1 (1): 293-302, 2011
9 R. Collobert, "Links between perceptrons, MLPs and SVMs" 23-, 2004
10 T. Hofmann, "Kernel Methods in Machine Learning" 36 (36): 1171-1220, 2008
1 ChipWhispererⓇ - NewAE Technology Inc, "chipwhisperer"
2 F. Rosenblatt, "The perceptron: A probabilistic model for information storage and organization in the brain" 65 (65): 1958
3 S. Chari, "Template Attacks" 2523 : 13-28, 2002
4 C. Cortes, "Support-vector networks" 20 (20): 273-297, 1995
5 S. Mangard, "Power analysis attacks: Revealing the secrets of smart cards" Springer 2008
6 F. X. Standaert, "Partition vs. comparison side-channel Distinguishers :An empirical evaluation of statistical tests for univariate side-channel attacks against two unprotected CMOS device" 5461 : 253-267, 2008
7 Z. Martinasek, "Optimization of power analysis using neural network" 8419 : 94-107, 2014
8 G. Hospodar, "Machine learning in side-channel analysis : a first study" 1 (1): 293-302, 2011
9 R. Collobert, "Links between perceptrons, MLPs and SVMs" 23-, 2004
10 T. Hofmann, "Kernel Methods in Machine Learning" 36 (36): 1171-1220, 2008
11 Z. Martinasek, "Innovative method of the power analysis" 22 (22): 589-594, 2013
12 "Federal Information Processing Standards Publication (FIPS 197), Advanced Encryption Standard(AES)"
13 P. Kocher, "Differential Power Analysis" 1999
14 E. Brier, "Correlation Power Analysis with a Leakage Model" 3156 : 16-29, 2004
15 W. Schindler, "A Stochastic Model for Differential Side Channel Cryptanalysis" (3659) : 30-46, 2005