Attacking Acros MixColumns algorithm

Hello, the success rate of attacking AES keys using the Attacking Acros MixColumns algorithm is not high. We hope to receive your help. Thank you very much.
The problem description is as follows:
Background: When using CW1173 devices to attack custom target versions of hardware AES keys, the success rate is only 20%. The design concept is as follows.

  1. Use 100MHz sampling to collect 25600 power consumption trajectory data for model building.
  2. Perform low-pass filtering and alignment processing on the collected power consumption trajectory data, with the alignment method based on the valley of the collected trajectory as a reference.
  3. Create a model using aligned trajectory data.
  4. Collect 256 power consumption trajectories for calculating keys, filter and align them, and use the created model to calculate the keys.
    Question:
  5. Do the collected power consumption trajectories need to undergo low-pass filtering and alignment processing? What are the effective filtering and alignment methods?
  6. Is it possible to use the valley of the trajectory as the alignment basis during the trajectory alignment process?
  7. Is the location of key leakage located near the valley of the collected trajectory
  8. Figure 1 shows the shape of a set of collected power consumption trajectories, with 13 valleys. Figure 2 shows the enlarged shape of a single valley position
  9. Which position in Figure 2 has the highest possibility of key leakage?
  10. What feature points can identify the location of key leakage in the collected trajectory?

This is essentially a copy of your previous post; I asked follow-up questions there and you did not answer them. I can’t help you beyond that.