{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:53:01Z","timestamp":1764996781830},"publisher-location":"Boston, MA","reference-count":13,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781402081460"},{"type":"electronic","value":"9781402081477"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/1-4020-8147-2_9","type":"book-chapter","created":{"date-parts":[[2006,2,20]],"date-time":"2006-02-20T16:57:38Z","timestamp":1140454658000},"page":"127-142","source":"Crossref","is-referenced-by-count":62,"title":["Differential Power Analysis Model and Some Results"],"prefix":"10.1007","author":[{"given":"Sylvain","family":"Guilley","sequence":"first","affiliation":[]},{"given":"Philippe","family":"Hoogvorst","sequence":"additional","affiliation":[]},{"given":"Renaud","family":"Pacalet","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"M. Akkar and C. Giraud. An Implementation of DES and AES secure against Some Attacks. Proc. of CHES\u201901, (2162):309\u2013318, 2001.","DOI":"10.1007\/3-540-44709-1_26"},{"key":"9_CR2","unstructured":"Ross J. Anderson. Serpent website (former candidate to the AES), 1999. http:\/\/www.cl.cam.ac.uk\/~rja14\/serpent.html ."},{"issue":"1","key":"9_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"E. Biham and A. Shamir. Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology, 4(1):3\u201372, 1991.","journal-title":"Journal of Cryptology"},{"key":"9_CR4","unstructured":"Eric Brier, Christophe Clavier, and Francis Olivier. Optimal statistical power analysis. 2003. http:\/\/eprint.iacr.org\/ ."},{"key":"9_CR5","first-page":"356","volume":"950","author":"F. Chabaud","year":"1995","unstructured":"Florent Chabaud and Serge Vaudenay. Links between Differential and Linear Cryptanalysis. Proc. of Eurocrypt\u201994, 950:356\u2013365, 1995.","journal-title":"Proc. of Eurocrypt\u201994"},{"key":"9_CR6","first-page":"251","volume":"2162","author":"K. Gandolfi","year":"2001","unstructured":"K. Gandolfi, C. Mourtel, and F. Olivier. Electromagnetic Analysis: Concrete Results. Proc. of CHES\u201901, 2162:251\u2013261, 2001.","journal-title":"Proc. of CHES\u201901"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"L. Goubin and J. Patarin. DES and Differential Power Analysis: The Duplication Method. Proc. of CHES\u201999, (1717):158\u2013172, 1999.","DOI":"10.1007\/3-540-48059-5_15"},{"key":"9_CR8","first-page":"388","volume":"1666","author":"P. Kocher","year":"1999","unstructured":"Paul Kocher, Joshua Jaffe, and Benjamin Jun. Differential Power Analysis: Leaking Secrets. Proc. of CRYPTO\u201999, 1666:388\u2013397, 1999.","journal-title":"Proc. of CRYPTO\u201999"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"M. Matsui. Linear cryptanalysis method for DES cipher. Proc. of Eurocrypt\u201993, (765):386\u2013397, 1994.","DOI":"10.1007\/3-540-48285-7_33"},{"key":"9_CR10","unstructured":"Thomas S. Messerges, Ezzy A. Dabbish, and Robert H. Sloan. Investigations of Power Analysis Attacks on Smartcards. USENIX Workshop on Smartcard Technology, pages 151\u2013162, May 1999."},{"key":"9_CR11","unstructured":"Elisabeth Oswald. On Side-Channel Attacks and the Application of Algorithmic Countermeasures. PhD thesis, may 2003. http:\/\/www.iaik.tu-graz.ac.at\/aboutus\/people\/oswald\/papers\/PhD.pdf ."},{"key":"9_CR12","first-page":"20","volume":"1716","author":"T. Satoh","year":"1999","unstructured":"Takashi Satoh, Tetsu Iwata, and Kaoru Kurosawa. On Cryptographically Secure Vectorial Boolean Functions. Proc. of Asiacrypt\u201999, 1716:20\u201328, 1999.","journal-title":"Proc. of Asiacrypt\u201999"},{"key":"9_CR13","first-page":"126","volume":"2779","author":"K. Tiri","year":"2003","unstructured":"K. Tiri and I. Verbauwhede. Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology. Proc. of CHES\u201903,2779: 126\u2013136, 2003.","journal-title":"Proc. of CHES\u201903"}],"container-title":["IFIP International Federation for Information Processing","Smart Card Research and Advanced Applications VI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/1-4020-8147-2_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,17]],"date-time":"2019-04-17T01:04:23Z","timestamp":1555463063000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/1-4020-8147-2_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9781402081460","9781402081477"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/1-4020-8147-2_9","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2004]]}}}