{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:46:06Z","timestamp":1772725566251,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540007166","type":"print"},{"value":"9783540365525","type":"electronic"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36552-4_24","type":"book-chapter","created":{"date-parts":[[2007,6,6]],"date-time":"2007-06-06T23:22:37Z","timestamp":1181172157000},"page":"343-358","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":76,"title":["A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion"],"prefix":"10.1007","author":[{"given":"Stefan","family":"Mangard","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,3,14]]},"reference":[{"key":"24_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1007\/3-540-44448-3_38","volume-title":"Advances in Cryptology-ASIACRYPT 2000","author":"M.-L. Akkar","year":"2000","unstructured":"M.-L. Akkar, R. Bevan, P. Dischamp, and D. Moyart. Power Analysis, What Is Now Possible... In Advances in Cryptology-ASIACRYPT 2000, volume 1976 of Lecture Notes in Computer Science (LNCS), pages 489\u2013502. Springer-Verlag, 2000. 349"},{"key":"24_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/3-540-44709-1_26","volume-title":"Cryptographic Hardware and Embedded Systems-CHES 2001","author":"M.-L. Akkar","year":"2001","unstructured":"M.-L. Akkar and C. Giraud. An implementation of DES and AES, secure against some attacks. In Cryptographic Hardware and Embedded Systems-CHES 2001, volume 2162 of Lecture Notes in Computer Science (LNCS), pages 309\u2013318. Springer-Verlag, 2001. 344, 355"},{"key":"24_CR3","series-title":"Lect Notes Comput Sci","volume-title":"Cryptographic Hardware and Embedded Systems-CHES 2002","author":"G. Bertoni","year":"2002","unstructured":"G. Bertoni, L. Breveglieri, P. Fragneto, M. Macchetti, and S. Marchesin. Efficient Software Implementation of AES on 32-bits Platforms. In Cryptographic Hardware and Embedded Systems-CHES 2002, Lecture Notes in Computer Science (LNCS). Springer-Verlag, 2002. 348, 354"},{"key":"24_CR4","unstructured":"E. Biham and A. Shamir. Power Analysis of the Key Scheduling of the AES Candidates. In Second Advanced Encryption Standard (AES) Candidate Conference, Rome, Italy, 1999. 343, 344, 347"},{"key":"24_CR5","unstructured":"S. Chari, C. Jutla, J.R. Rao, and P. Rohatgi. A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards. In Second Advanced Encryption Standard (AES) Candidate Conference, Rome, Italy, 1999. 343"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"J. Daemen and V. Rijmen. The Design of Rijndael. Springer-Verlag, 2002, ISBN b3-540-42580-2. 343","DOI":"10.1007\/978-3-662-04722-4"},{"key":"24_CR7","unstructured":"J. Daemen and V. Rijmen. The Rijndael Page. Available at \n                    http:\/\/www.esat.kuleuven.ac.be\/~rijmen\/rijndael\/\n                    \n                  . 348"},{"key":"24_CR8","unstructured":"J. Daemen and V. Rijmen. Resistance Against Implementation Attacks. A Comparative Study of the AES Proposals. In Second Advanced Encryption Standard (AES) Candidate Conference, Rome, Italy, 1999. 343"},{"key":"24_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/3-540-48059-5_16","volume-title":"IPA: A New Class of Power Attacks","author":"P. Fahn","year":"1999","unstructured":"P. Fahn and P. Pearson. IPA: A New Class of Power Attacks. In Workshop on Cryptographic Hardware and Embedded Systems-CHES 1999, volume 1717 of Lecture Notes in Computer Science (LNCS), pages 173\u2013186. Springer-Verlag, 1999. 347"},{"key":"24_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/3-540-44709-1_8","volume-title":"Two Methods of Rijndael Implementation in Reconfigurable Hardware","author":"V. Fischer","year":"2001","unstructured":"V. Fischer and M. Drutarovsk\u00fd. Two Methods of Rijndael Implementation in Reconfigurable Hardware. In Workshop on Cryptographic Hardware and Embedded Systems-CHES 2001, volume 2162 of Lecture Notes in Computer Science (LNCS), pages 77\u201392. Springer-Verlag, 2001. 354"},{"key":"24_CR11","series-title":"Lect Notes Comput Sci","volume-title":"Cryptographic Hardware and Embedded Systems-CHES 2002","author":"J. Dj. Golic","year":"2002","unstructured":"J. Dj. Golic and C. Tymen. Multiplicative Masking and Power Analysis of AES. In Cryptographic Hardware and Embedded Systems-CHES 2002, Lecture Notes in Computer Science (LNCS). Springer-Verlag, 2002. 344, 355, 356"},{"key":"24_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1007\/3-540-45861-1_33","volume-title":"Information Security and Cryptology-ICISC 2001","author":"K. Itoh","year":"2002","unstructured":"K. Itoh, M. Takenaka, and N. Torii. DPA Countermeasure Based on the \u201cMasking Method\u201d. In Information Security and Cryptology-ICISC 2001, volume 2288 of Lecture Notes in Computer Science (LNCS), pages 440\u2013456. Springer-Verlag, 2002. 344, 355"},{"key":"24_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology-CRYPTO 1999","author":"P. C. Kocher","year":"1999","unstructured":"P. C. Kocher, J. Jaffe, and B. Jun. Differential Power Analysis. In Advances in Cryptology-CRYPTO 1999, volume 1666 of Lecture Notes in Computer Science (LNCS), pages 388\u2013397. Springer-Verlag, 1999. 343, 346"},{"key":"24_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/3-540-44709-1_6","volume-title":"Architectural Optimization for a 1.82Gbits\/sec VLSI Implementation of the AES Rijndael Algorithm","author":"H. Kuo","year":"2001","unstructured":"H. Kuo and I. Verbauwhede. Architectural Optimization for a 1.82Gbits\/sec VLSI Implementation of the AES Rijndael Algorithm. In Workshop on Cryptographic Hardware and Embedded Systems-CHES 2001, volume 2162 of Lecture Notes in Computer Science (LNCS), pages 51\u201364. Springer-Verlag, 2001. 354"},{"key":"24_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/3-540-44499-8_6","volume-title":"Cryptographic Hardware and Embedded Systems-CHES 2000","author":"R. Mayer-Sommer","year":"2000","unstructured":"R. Mayer-Sommer. Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smartcards. In Cryptographic Hardware and Embedded Systems-CHES 2000, volume 1965 of Lecture Notes in Computer Science (LNCS) pages 78\u201392. Springer-Verlag, 2000. 344"},{"key":"24_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/3-540-44709-1_7","volume-title":"High Performance Single-Chip FPGA Rijndael Algorithm Implementations","author":"M. McLoone","year":"2001","unstructured":"M. McLoone and J.V. McCanny. High Performance Single-Chip FPGA Rijndael Algorithm Implementations. In Workshop on Cryptographic Hardware and Embedded Systems-CHES 2001, volume 2162 of Lecture Notes in Computer Science (LNCS), pages 65\u201376. Springer-Verlag, 2001. 354"},{"key":"24_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/3-540-44499-8_19","volume-title":"Cryptographic Hardware and Embedded Systems-CHES 2000","author":"T. S. Messerges","year":"2000","unstructured":"T. S. Messerges. Using Second-Order Power Analysis to Attack DPA Resistant Software. In Cryptographic Hardware and Embedded Systems-CHES 2000, volume 1965 of Lecture Notes in Computer Science (LNCS), pages 238\u2013251. Springer-Verlag, 2000. 344"},{"key":"24_CR18","unstructured":"T. S. Messerges, E.A. Dabbish, and R. H. Sloan. Investigations of Power Analysis Attacks on Smartcards. In Proceedings of USENIX Workshop on Smartcard Technology, pages 151\u2013162, 1999. 344"},{"key":"24_CR19","unstructured":"National Institute of Standards and Technology. FIPS 197 Advanced Encryption Standard (AES). Available at \n                    http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf\n                    \n                  . 343, 345"},{"key":"24_CR20","unstructured":"National Institute of Standards and Technology. FIPS 46-2 Data Encryption Standard (DES). Available at \n                    http:\/\/csrc.nist.gov\/publications\/fips\/\n                    \n                  . 343"},{"key":"24_CR21","unstructured":"National Institute of Standards and Technology. The AES Home Page. Available at \n                    http:\/\/csrc.nist.gov\/encryption\/aes\/\n                    \n                  . 348"},{"key":"24_CR22","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/3-540-45682-1_15","volume-title":"Advances in Cryptology-ASIACRYPT 2001","author":"A. Satoh","year":"2001","unstructured":"A. Satoh, S. Morioka, K. Takano, and S. Munetoh. A Compact Rijndael Hardware Architecture with S-Box Optimization. In Advances in Cryptology-ASIACRYPT 2001, volume 2248 of Lecture Notes in Computer Science (LNCS), pages 239\u2013254. Springer-Verlag, 2001. 354"},{"key":"24_CR23","unstructured":"K. Tiri, M. Akmal, and I. Verbauwhede. A Dynamic and Differential CMOS Logic with Signal Independent Power Consumption to Withstand Differential Power Analysis on Smart Cards. In 28th European Solid-State Circuits Conference-ESSCIRC 2002, Florence, Italy, 2002. 343"},{"key":"24_CR24","series-title":"Lect Notes Comput Sci","volume-title":"Cryptographic Hardware and Embedded Systems-CHES 2002","author":"E. Trichina","year":"2002","unstructured":"E. Trichina, D. De Seta, and L. Germani. Simplified Adaptive Multiplicative Masking for AES and its Secure Implementation. In Cryptographic Hardware and Embedded Systems-CHES 2002, Lecture Notes in Computer Science (LNCS). Springer-Verlag, 2002. 344, 355, 356"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2014 ICISC 2002"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36552-4_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T13:45:47Z","timestamp":1558273547000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36552-4_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540007166","9783540365525"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/3-540-36552-4_24","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"14 March 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}