{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T14:24:25Z","timestamp":1725459865787},"publisher-location":"Boston, MA","reference-count":6,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781402081460"},{"type":"electronic","value":"9781402081477"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/1-4020-8147-2_16","type":"book-chapter","created":{"date-parts":[[2006,2,20]],"date-time":"2006-02-20T11:57:38Z","timestamp":1140436658000},"page":"241-254","source":"Crossref","is-referenced-by-count":0,"title":["On The Security of the DeKaRT Primitive"],"prefix":"10.1007","author":[{"given":"Gilles","family":"Piret","sequence":"first","affiliation":[]},{"given":"Francois-Xavier","family":"Standaert","sequence":"additional","affiliation":[]},{"given":"Gael","family":"Rouvroy","sequence":"additional","affiliation":[]},{"given":"Jean-Jacques","family":"Quisquater","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1007\/978-3-540-45238-6_9","volume":"2779","author":"J.D. Golic","year":"2003","unstructured":"J.D. Golic, DeKaRT: A New Paradigm for Key-Dependent Reversible Circuits, Proceedings of CHES 2003, Lecture Notes in Computer Science, vol. 2779, pp. 98\u2013112, 2003.","journal-title":"Lecture Notes in Computer Science"},{"key":"16_CR2","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/3-540-44709-1_3","volume":"2162","author":"E. Brier","year":"2001","unstructured":"E. Brier, H. Handschuh, C. Tymen, Fast Primitives for Internal Data Scrambling in Tamper Resistant Hardware, Proceedings of CHES 2001, Lecture Notes in Computer Science, vol. 2162, pp. 16\u201327, 2001.","journal-title":"Lecture Notes in Computer Science"},{"key":"16_CR3","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume":"765","author":"M. Matsui","year":"1994","unstructured":"M. Matsui, Linear Cryptanalysis Method for DES Cipher, Advances in Cryptology-EUROCRYPT 93, Lecture Notes in Computer Science, vol. 765, pp. 386\u2013397, 1994.","journal-title":"Lecture Notes in Computer Science"},{"unstructured":"R. Anderson and M. Kuhn, Tamper resistance-a Cautionary Note, second USENIX Workshop on Electronic Commerce Proceedings, pp. 1\u201311, Oakland, California, November 1996.","key":"16_CR4"},{"unstructured":"O. Kemmerling and M. Kuhn, Design principles for Tamper-Resistant Smartcard Processors, USENIX Workshop on Smartcard Technology, Chicago, Illinois, USA, May 1999.","key":"16_CR5"},{"doi-asserted-by":"crossref","unstructured":"A. Biryukov, C. De Canniere, M. Quisquater, On Multiple Linear Approximations, Available at http:\/\/eprint.iacr.org\/,2004\/057 .","key":"16_CR6","DOI":"10.1007\/978-3-540-28628-8_1"}],"container-title":["IFIP International Federation for Information Processing","Smart Card Research and Advanced Applications VI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/1-4020-8147-2_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,16]],"date-time":"2019-04-16T21:04:17Z","timestamp":1555448657000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/1-4020-8147-2_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9781402081460","9781402081477"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/1-4020-8147-2_16","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2004]]}}}