M. Abadi, A. Agarwal, P. Barham, E. Brevdo, Z. Chen et al., TensorFlow: Large-scale machine learning on heterogeneous systems, Oriol Vinyals, 2015.

R. Akbani, S. Kwek, and N. Japkowicz, Applying Support Vector Machines to Imbalanced Datasets, Machine Learning: ECML 2004, pp.39-50, 2004.

É. Brier, C. Clavier, F. Olivier-;-cambridge, M. A. , U. Shivam-bhasin et al., Countering Early Evaluation: An Approach Towards Robust Dual-Rail Precharge Logic, WESS. ACM, vol.3156, pp.16-29, 2004.

L. Batina, B. Gierlichs, E. Prouff, and M. Rivain, François-Xavier Standaert, and Nicolas Veyrat-Charvillon. Mutual Information Analysis: a Comprehensive Study, J. Cryptology, vol.24, issue.2, pp.269-291, 2011.

S. Boughorbel, F. Jarray, and M. El-anbari, Optimal classifier for imbalanced data using Matthews Correlation Coefficient metric, PLOS ONE, vol.12, issue.6, pp.1-17, 2017.

E. A. Gustavo, R. C. Batista, M. C. Prati, and . Monard, A Study of the Behavior of Several Methods for Balancing Machine Learning Training Data, SIGKDD Explor. Newsl, vol.6, issue.1, pp.20-29, 2004.

L. Breiman, Random Forests, Machine Learning, vol.45, pp.5-32, 2001.

V. Nitesh, K. W. Chawla, L. O. Bowyer, W. P. Hall, and . Kegelmeyer, Smote: Synthetic minority over-sampling technique, J. Artif. Int. Res, vol.16, issue.1, pp.321-357, 2002.

E. Cagli, C. Dumas, and E. Prouff, Convolutional Neural Networks with Data Augmentation Against Jitter-Based CountermeasuresProfiling Attacks Without Pre-processing, Cryptographic Hardware and Embedded Systems-CHES 2017-19th International Conference, pp.45-68, 2017.

J. Cooper, G. Goodwill, J. Jaffe, G. Kenworthy, and P. Rohatgi, International Cryptographic Module Conference (ICMC), 2013.

I. Jean-sébastien-coron and . Kizhvatov, An Efficient Method for Random Delay Generation in Embedded Software, Cryptographic Hardware and Embedded Systems-CHES 2009, 11th International Workshop, pp.156-170, 2009.

O. Choudary and M. G. Kuhn, Efficient template attacks, Smart Card Research and Advanced Applications-12th International Conference, CARDIS 2013, vol.8419, pp.253-270, 2013.

J. Cohen, A Coefficient of Agreement for Nominal Scales, Educational and Psychological Measurement, vol.20, issue.1, pp.37-46, 1960.

S. Chari, J. R. Rao, and P. Rohatgi, Template Attacks, CHES, volume 2523 of LNCS, pp.13-28, 2002.

D. J. Dittman, T. M. Khoshgoftaar, and A. Napolitano, The Effect of Data Sampling When Using Random Forest on Imbalanced Bioinformatics Data, 2015 IEEE International Conference on Information Reuse and Integration, pp.457-463, 2015.

J. Doget, E. Prouff, M. Rivain, and F. Standaert, Univariate side channel attacks and leakage modeling, J. Cryptographic Engineering, vol.1, issue.2, pp.123-144, 2011.

F. Durvaux and F. Standaert, From improved leakage detection to the detection of points of interests in leakage traces, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.240-262, 2016.

J. Seyda-ertekin, C. L. Huang, and . Giles, Active Learning for Class Imbalance Problem, Proceedings of the 30th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR '07, pp.823-824, 2007.

. Rong-en-fan, C. Pai-hsuen-chen, and . Lin, Working Set Selection Using Second Order Information for Training Support Vector Machines, J. Mach. Learn. Res, vol.6, pp.1889-1918, 2005.

M. Fernández-delgado, E. Cernadas, S. Barro, and D. Amorim, Do we Need Hundreds of Classifiers to Solve Real World Classification Problems, Journal of Machine Learning Research, vol.15, pp.3133-3181, 2014.

R. Gilmore, N. Hanley, and M. O'neill, Neural network based attack on a masked implementation of AES, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp.106-111, 2015.

H. He and E. A. Garcia, Learning from Imbalanced Data, IEEE Trans. on Knowl. and Data Eng, vol.21, issue.9, pp.1263-1284, 2009.

G. Hospodar, B. Gierlichs, E. D. Mulder, I. Verbauwhede, and J. Vandewalle, Machine learning in side-channel analysis: a first study, Journal of Cryptographic Engineering, vol.1, pp.293-302, 2011.

S. Picek, A. Heuser, and A. Jovic, Shivam Bhasin and Francesco Regazzoni, vol.231

A. Heuser, S. Picek, S. Guilley, and N. Mentens, Lightweight ciphers and their side-channel resilience, IEEE Transactions on Computers, issue.99, pp.1-1, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01629886

A. Heuser and M. Zohner, Intelligent Machine Homicide-Breaking Cryptographic Devices Using Support Vector Machines, LNCS, vol.7275, pp.249-264, 2012.

A. László, J. F. Jeni, F. Cohn, and . Torre, Facing Imbalanced Data-Recommendations for the Use of Performance Metrics, Proceedings of the 2013 Humaine Association Conference on Affective Computing and Intelligent Interaction, ACII '13, pp.245-251, 2013.

G. James, D. Witten, T. Hastie, and R. Tibsihrani, An Introduction to Statistical Learning. Springer Texts in Statistics, 2001.

B. Krawczyk-;-yann-lecun and Y. Bengio, Learning from imbalanced data: open challenges and future directions, The handbook of brain theory and neural networks, vol.5, pp.221-232, 1995.

L. Lerman, G. Bontempi, and O. Markowitch, A machine learning approach against a masked AES-Reaching the limit of side-channel attacks with a learning model, J. Cryptographic Engineering, vol.5, issue.2, pp.123-139, 2015.

R. Longadge and S. Dongre, Class Imbalance Problem in Data Mining Review, CoRR, abs/1305.1707, 2013.

L. Lerman, S. F. Medeiros, G. Bontempi, and O. Markowitch, CARDIS, 2013.

L. Lerman, R. Poussier, G. Bontempi, O. Markowitch, and F. Standaert, Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis), COSADE 2015, pp.20-33, 2015.

B. W. Matthews, Comparison of the predicted and observed secondary structure of T4 phage lysozyme, Biochimica et Biophysica Acta (BBA)Protein Structure, vol.405, issue.2, pp.442-451, 1975.

S. Mangard, E. Oswald, and T. Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards, 2006.

H. Maghrebi, T. Portigliatti, and E. Prouff, Breaking cryptographic implementations using deep learning techniques, Security, Privacy, and Applied Cryptography Engineering-6th International Conference, SPACE 2016, pp.3-26, 2016.

A. Paszke, S. Gross, S. Chintala, G. Chanan, E. Yang et al., Automatic differentiation in pytorch, 2017.

S. Picek, A. Heuser, and S. Guilley, Template attack versus Bayes classifier, Journal of Cryptographic Engineering, vol.7, issue.4, pp.343-351, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01629884

S. Picek, A. Heuser, A. Jovic, S. A. Ludwig, S. Guilley et al., Side-channel analysis and machine learning: A practical perspective, 2017 International Joint Conference on Neural Networks, pp.4095-4102, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01628681

S. Picek, P. Ioannis, A. Samiotis, J. Heuser, S. Kim et al., On the performance of convolutional neural networks for side-channel analysis, Cryptology ePrint Archive, 2018.
URL : https://hal.archives-ouvertes.fr/hal-02010591

F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion et al., Scikit-learn: Machine learning in Python, Journal of Machine Learning Research, vol.12, pp.2825-2830, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00650905

W. Schindler, K. Lemke, and C. Paar, A Stochastic Model for Differential Side Channel Cryptanalysis, LNCS, vol.3659, pp.30-46, 2005.

F. Standaert, T. Malkin, and M. Yung, A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, EUROCRYPT, vol.5479, pp.443-461, 2009.

F. X. Standaert, E. Peeters, and J. J. Quisquater, On the masking countermeasure and higher-order power analysis attacks, International Conference on Information Technology: Coding and Computing (ITCC'05, vol.II, pp.562-567, 2005.

T. Paristech, S. Research-group, and . Contest, , pp.2013-2014

D. L. Wilson, Asymptotic Properties of Nearest Neighbor Rules Using Edited Data, IEEE Transactions on Systems, Man, and Cybernetics, SMC, vol.2, issue.3, pp.408-421, 1972.