{"entities":{"Q486132":{"pageid":487899,"ns":120,"title":"Item:Q486132","lastrevid":62203266,"modified":"2026-04-11T04:28:08Z","type":"item","id":"Q486132","labels":{"en":{"language":"en","value":"Power analysis attack: an approach based on machine learning"}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 6386697"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q486132$ED43B191-5E29-4073-8CF0-58C52A9D1A22","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"8a88c8d407bdaa47569a461432aaf565a0a4a5fa","datavalue":{"value":{"text":"Power analysis attack: an approach based on machine learning","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q486132$24F8CB44-8C74-4AC6-80FD-78EE0D0382C8","rank":"normal"}],"P225":[{"mainsnak":{"snaktype":"value","property":"P225","hash":"692b614f8fa01f4658c6c717892de5a1dd8a6315","datavalue":{"value":"1351.94055","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q486132$58E33D9F-1767-4322-8D9E-DBD6DE780DD3","rank":"normal"}],"P27":[{"mainsnak":{"snaktype":"value","property":"P27","hash":"e5bb58c9355fe7f121fca7b492cc233dfc17347f","datavalue":{"value":"10.1504/IJACT.2014.062722","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q486132$0D27E163-7A29-458E-9657-2A41EAF94853","rank":"normal"}],"P16":[{"mainsnak":{"snaktype":"value","property":"P16","hash":"701681377a3cfbb6a7ea535b40b2deb41774faee","datavalue":{"value":{"entity-type":"item","numeric-id":486129,"id":"Q486129"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q486132$5B437C0D-5BFA-49C8-8065-B4A328B8DAC8","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P16","hash":"8cb88203e0fbd69252ad091e48dcb39043b1106e","datavalue":{"value":{"entity-type":"item","numeric-id":486131,"id":"Q486131"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q486132$CD6978A2-A0C9-4B16-BE8F-8AD16D54A2F1","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P16","hash":"0e931826fef142f70acdde537d3651f853b882b6","datavalue":{"value":{"entity-type":"item","numeric-id":212143,"id":"Q212143"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q486132$971277AB-ADE8-45C4-B2F2-385832C1BB47","rank":"normal"}],"P200":[{"mainsnak":{"snaktype":"value","property":"P200","hash":"4f1dd5f1804b0765cf93ccdc0e7fe72ed510dc10","datavalue":{"value":{"entity-type":"item","numeric-id":244654,"id":"Q244654"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q486132$E7673935-38EB-4D4A-96B6-844AE77C94C2","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"263261338df616964a138c38a6f0c5b7f36f1f12","datavalue":{"value":{"time":"+2015-01-14T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q486132$0CB84FA9-14D7-41BA-AF62-83939D9746C6","rank":"normal"}],"P1448":[{"mainsnak":{"snaktype":"value","property":"P1448","hash":"9c27a6c29fadda59256a9abff8fe258b75a3a1c6","datavalue":{"value":"Summary: In cryptography, a side-channel attack is any attack based on the analysis of measurements related to the physical implementation of a cryptosystem. Nowadays, the possibility of collecting a large amount of observations paves the way to the adoption of machine learning techniques, i.e., techniques able to extract information and patterns from large datasets. The use of statistical techniques for side-channel attacks is not new. Techniques like the template attack have shown their effectiveness in recent years. However, these techniques rely on parametric assumptions and are often limited to small dimensionality settings, which limit their range of application. This paper explores the use of machine learning techniques to relax such assumptions and to deal with high dimensional feature vectors.","type":"string"},"datatype":"string"},"type":"statement","id":"Q486132$09676586-7F27-4318-967E-C647360374BA","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"b3f5570531d36cdad95fcc8cba24a2dabc5fbbbf","datavalue":{"value":"94A60","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q486132$F765E750-EE36-47D0-8241-37674C643683","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"cfe779e91fe9c53ee133568259955801965765ae","datavalue":{"value":"68T05","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q486132$282E6C4D-1978-4E4D-B46A-7257295FBA0B","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"91ed43a00d89d6f2c716dd53f7018739d135c93a","datavalue":{"value":"6386697","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q486132$E84C920C-FF5B-421A-BBE9-4C31CBD6FB93","rank":"normal"}],"P1450":[{"mainsnak":{"snaktype":"value","property":"P1450","hash":"0ca18a341e8b649b565a1d8f1ff707d449835862","datavalue":{"value":"cryptanalysis","type":"string"},"datatype":"string"},"type":"statement","id":"Q486132$0C211BE5-3B4C-410A-9A31-B8850C94D3ED","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"e2ecc89a95ec0ae1db616ebbd4c05975d5337106","datavalue":{"value":"side-channel attacks","type":"string"},"datatype":"string"},"type":"statement","id":"Q486132$E3354B2E-FAF9-4D4E-8853-7E366DAD1BC3","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"80d73359ad25c46e6821be7f684db12337eb9f3a","datavalue":{"value":"template attacks","type":"string"},"datatype":"string"},"type":"statement","id":"Q486132$D4B302D7-C59E-4E7A-96F2-49B76ABD10C8","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"e0afe30fcd4cd25e8e8273c02ad48a97b4a0e001","datavalue":{"value":"machine learning","type":"string"},"datatype":"string"},"type":"statement","id":"Q486132$3D585C3F-7E22-4725-95FA-628CB4871874","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"9bc70bb43412e30e739c6279ddbbb30f765a58f4","datavalue":{"value":"power analysis attacks","type":"string"},"datatype":"string"},"type":"statement","id":"Q486132$019F3E3E-F773-4EE6-A9AA-1EFC792FC57D","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"d54d97c9d74a7974164bd27bc3725f50a6bd71c8","datavalue":{"value":"cryptography","type":"string"},"datatype":"string"},"type":"statement","id":"Q486132$751BBAC8-FE6D-4DEC-B3FD-3F5FA288ABAE","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"0237de6cd44e9a4b1c2a0f9aa90768e6ab09de24","datavalue":{"value":"high dimensional feature vectors","type":"string"},"datatype":"string"},"type":"statement","id":"Q486132$30CEDDA3-17F5-4F89-A7E6-60DC2737CAA4","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"84c612e97d0bbc5f0fc0c1fc6c648d85c6d9bbe2","datavalue":{"value":"security","type":"string"},"datatype":"string"},"type":"statement","id":"Q486132$4CF36D58-6A77-4F66-A9EC-E7A14DF4F930","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q486132$F842C072-3EF6-40E5-A18C-88C30D4E375E","rank":"normal"}],"P205":[{"mainsnak":{"snaktype":"value","property":"P205","hash":"75d690503748c9df0477cbb2f5e7ae6b81020855","datavalue":{"value":"https://doi.org/10.1504/ijact.2014.062722","type":"string"},"datatype":"url"},"type":"statement","id":"Q486132$4E9D3945-16B0-410E-874A-38B636140DC5","rank":"normal"}],"P388":[{"mainsnak":{"snaktype":"value","property":"P388","hash":"2c5e57f8dd5666cb93d102cf81c865eeb22934b5","datavalue":{"value":"W1970267951","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q486132$8E2E4E79-2D9C-4460-AC03-033E1528348E","rank":"normal"}],"P1643":[{"mainsnak":{"snaktype":"value","property":"P1643","hash":"60307b4c8f683a48fa9c0c65e8dff4c787527d04","datavalue":{"value":{"entity-type":"item","numeric-id":4975179,"id":"Q4975179"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"6f3683f280f945c13966f18f2e490079ebec1d91","datavalue":{"value":{"amount":"+0.8563300371170044","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"a327a09ea0305e98d5cf33bd4036320e19f2aed0","datavalue":{"value":{"entity-type":"item","numeric-id":6821328,"id":"Q6821328"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q486132$EA8494F0-DAD1-43AE-A00C-290C1784C996","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"724611bb6df6cb1af5676e360ee96fa2e4fcb133","datavalue":{"value":{"entity-type":"item","numeric-id":1989607,"id":"Q1989607"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"44e5d0de6c3c3392656ee6f642b9b4e7b27bb340","datavalue":{"value":{"amount":"+0.7983866930007935","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"a327a09ea0305e98d5cf33bd4036320e19f2aed0","datavalue":{"value":{"entity-type":"item","numeric-id":6821328,"id":"Q6821328"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q486132$67733FC5-A9AD-4AF0-B99D-D33C34E16049","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"006874ee9976782e660c596f240ca720222d625b","datavalue":{"value":{"entity-type":"item","numeric-id":5711588,"id":"Q5711588"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"bd45d53dbb692a6d10a9d3d6e8419ab6fd3c07ba","datavalue":{"value":{"amount":"+0.7756444811820984","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"a327a09ea0305e98d5cf33bd4036320e19f2aed0","datavalue":{"value":{"entity-type":"item","numeric-id":6821328,"id":"Q6821328"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q486132$4B5CFFD2-3DA6-4F3F-8A4E-6FFE9C2D8141","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"5b8b717cd324f5e63f7cb85fe9d71cd444e99306","datavalue":{"value":{"entity-type":"item","numeric-id":5095942,"id":"Q5095942"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"af8117c10ea15933e669b40b04e26b09ee61b79e","datavalue":{"value":{"amount":"+0.7691628336906433","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"a327a09ea0305e98d5cf33bd4036320e19f2aed0","datavalue":{"value":{"entity-type":"item","numeric-id":6821328,"id":"Q6821328"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q486132$286F2716-8420-4F2D-843E-1F0FAD4CBCD2","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"231eba0b8a0bcefa4faf289503236687158d629b","datavalue":{"value":{"entity-type":"item","numeric-id":5897458,"id":"Q5897458"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"820cf3033aef31b9ac51474555f84152753606c5","datavalue":{"value":{"amount":"+0.764966607093811","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"a327a09ea0305e98d5cf33bd4036320e19f2aed0","datavalue":{"value":{"entity-type":"item","numeric-id":6821328,"id":"Q6821328"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q486132$5628080E-7959-475D-BDAD-DAF498F2D4FC","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"Power analysis attack: an approach based on machine learning","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/Power_analysis_attack:_an_approach_based_on_machine_learning"}}}}}