{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T07:43:56Z","timestamp":1758267836705},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540284741"},{"type":"electronic","value":"9783540319405"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11545262_23","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T10:35:35Z","timestamp":1127817335000},"page":"309-323","source":"Crossref","is-referenced-by-count":54,"title":["Improved Higher-Order Side-Channel Attacks with FPGA Experiments"],"prefix":"10.1007","author":[{"given":"Eric","family":"Peeters","sequence":"first","affiliation":[]},{"given":"Fran\u00e7ois-Xavier","family":"Standaert","sequence":"additional","affiliation":[]},{"given":"Nicolas","family":"Donckers","sequence":"additional","affiliation":[]},{"given":"Jean-Jacques","family":"Quisquater","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/3-540-44709-1_26","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2001","author":"M.L. Akkar","year":"2001","unstructured":"Akkar, M.L., Giraud, C.: An Implementation of DES and AES Secure againts Some Attacks. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.\u00a02162, pp. 309\u2013318. Springer, Heidelberg (2001)"},{"key":"23_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/978-3-540-45238-6_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"D. Agrawal","year":"2003","unstructured":"Agrawal, D., Rao, J.R., Rohatgi, P.: Multi-channel Attacks. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 2\u201316. Springer, Heidelberg (2003)"},{"key":"23_CR3","unstructured":"Anderson, R., Biham, E., Knudsen, L.: Serpent: A Flexible Block Cipher With Maximum Assurance. In: the proceedings of The First Advanced Encryption Standard Candidate Conference, Ventura, California, USA (August 1998)"},{"key":"23_CR4","unstructured":"Barreto, P., Rijmen, V.: The KHAZAD Legacy-Level Block Cipher. Submission to NESSIE project, available from, \n                    \n                      http:\/\/www.cosic.esat.kuleuven.ac.be\/nessie\/"},{"key":"23_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"E. Brier","year":"2004","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 16\u201329. Springer, Heidelberg (2004)"},{"key":"23_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1007\/3-540-48405-1_26","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"S. Chari","year":"1999","unstructured":"Chari, S., Jutla, C., Rao, J., Rohatgi, P.: Towards Sound Approaches to Counteract Power-Analysis Attacks. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 398\u2013412. Springer, Heidelberg (1999)"},{"key":"23_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/3-540-48059-5_15","volume-title":"Cryptographic Hardware and Embedded Systems","author":"L. Goubin","year":"1999","unstructured":"Goubin, L., Patarin, J.: DES and Differential Power Analysis. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol.\u00a01717, pp. 158\u2013172. Springer, Heidelberg (1999)"},{"key":"23_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-540-45238-6_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"C. Karlof","year":"2003","unstructured":"Karlof, C., Wagner, D.: Hidden Markov Model Cryptanalysis. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 17\u201330. Springer, Heidelberg (2003)"},{"key":"23_CR9","series-title":"Lecture Notes in Computer Science","first-page":"398","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P. Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 398\u2013412. Springer, Heidelberg (1999)"},{"key":"23_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/978-3-540-30574-3_24","volume-title":"Topics in Cryptology \u2013 CT-RSA 2005","author":"S. Mangard","year":"2005","unstructured":"Mangard, S.: Side-Channel Leakage of Masked CMOS Gates. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol.\u00a03376, pp. 351\u2013365. Springer, Heidelberg (2005)"},{"key":"23_CR11","doi-asserted-by":"publisher","DOI":"10.1002\/0471721182","volume-title":"Finite Mixture Models","author":"G.J. McLachlan","year":"2000","unstructured":"McLachlan, G.J., Peel, D.: Finite Mixture Models. John Willey and Sons, New York (2000)"},{"issue":"5","key":"23_CR12","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"T.S. Messerges","year":"2002","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining Smart-Card Security under the Threat of Power Analysis Attacks. IEEE Transactions on Computers\u00a051(5), 541\u2013552 (2002)","journal-title":"IEEE Transactions on Computers"},{"key":"23_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/3-540-44499-8_5","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2000","author":"T.S. Messerges","year":"2000","unstructured":"Messerges, T.S.: Using Second-Order Power Analysis to Attack DPA Resistant Software. In: Paar, C., Ko\u00e7, \u00c7.K. (eds.) CHES 2000. LNCS, vol.\u00a01965, pp. 71\u201377. Springer, Heidelberg (2000)"},{"key":"23_CR14","unstructured":"National Bureau of Standards, FIPS PUB 46, The Data Encryption Standard, Federal Information Processing Standard, NIST, U.S.\u00a0Dept. of Commerce (January 1977)"},{"key":"23_CR15","unstructured":"National Bureau of Standards, FIPS\u00a0197, Advanced Encryption Standard, Federal Information Processing Standard, NIST, U.S.\u00a0Dept. of Commerce (November 2001)"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Ors, S.B., Gurkaynak, F., Oswald, E., Preneel, B.: Power-Analysis Attack on an ASIC AES implementation. In: the proceedings of ITCC 2004, Las Vegas, April 5-7 (2004)","DOI":"10.1109\/ITCC.2004.1286711"},{"key":"23_CR17","unstructured":"Oswald, E., Mangard, S., Pramstaller, N.: Secure and Efficient Masking of AES - A Mission Impossible? IACR e-print archive 2004\/134 (2004), \n                    \n                      http:\/\/eprint.iacr.org"},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"Oswald, E., Mangard, S., Pramstaller, N., Rijmen, V.: A Side-Channel Analysis Description of the AES S-box. In: the proceedings of FSE 2005 (2005)","DOI":"10.1007\/11502760_28"},{"key":"23_CR19","volume-title":"Digital Integrated Circuits","author":"J.M. Rabaey","year":"1996","unstructured":"Rabaey, J.M.: Digital Integrated Circuits. Prentice Hall International, Englewood Cliffs (1996)"},{"key":"23_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/978-3-540-28632-5_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"F.-X. Standaert","year":"2004","unstructured":"Standaert, F.-X., Ors, S.B., Preneel, B.: Power Analysis of an FPGA Implementation of Rijndael: is Pipelining a DPA Countermeasure? In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 30\u201344. Springer, Heidelberg (2004)"},{"key":"23_CR21","doi-asserted-by":"crossref","unstructured":"Standart, F.-X., Peeters, E., Quisquater, J.-J.: On the Masking Countermeasure and Higher-Order Power Analysis Attacks. In: the proceedings of ITCC 2005, Las Vegas, USA, vol.\u00a01, pp. 562\u2013567 (April 2005)","DOI":"10.1109\/ITCC.2005.213"},{"key":"23_CR22","unstructured":"Standart, F.-X., Peeters, E., Rouvroy, G., Quisquater, J.-J.: Power Analysis Attacks and Countermeasures of Field Programmable Gate Arrays: a Survey. In: to appear in the Proceedings of the IEEE, special issue on Cryptographic Hardware and Embedded Systems (August 2005)"},{"key":"23_CR23","doi-asserted-by":"crossref","unstructured":"Trailovic, L., Pao, L.Y.: Variance Estimation and Ranking of Gaussian Mixture Distributions in Target Tracking Applications. In: the proceedings of the IEEE Conference on Decision and Control, Las Vegas, NV, pp. 2195\u20132201 (December 2002)","DOI":"10.1109\/CDC.2002.1184857"},{"key":"23_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-28632-5_1","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"J. Waddle","year":"2004","unstructured":"Waddle, J., Wagner, D.: Towards Efficient Second-Order Power Analysis. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 1\u201315. Springer, Heidelberg (2004)"},{"key":"23_CR25","unstructured":"Xilinx: Spartan 2.5V Field Programmable Gate Arrays Data Sheet, \n                    \n                      http:\/\/www.xilinx.com"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems \u2013 CHES 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11545262_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T02:57:04Z","timestamp":1619492224000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11545262_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540284741","9783540319405"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/11545262_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}