{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T12:27:36Z","timestamp":1756384056755},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540417286"},{"type":"electronic","value":"9783540447061"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-44706-7_10","type":"book-chapter","created":{"date-parts":[[2007,10,7]],"date-time":"2007-10-07T01:25:09Z","timestamp":1191720309000},"page":"134-149","source":"Crossref","is-referenced-by-count":18,"title":["Bitslice Ciphers and Power Analysis Attacks"],"prefix":"10.1007","author":[{"given":"Joan","family":"Daemen","sequence":"first","affiliation":[]},{"given":"Michael","family":"Peeters","sequence":"additional","affiliation":[]},{"given":"Gilles","family":"Van Assche","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,1,18]]},"reference":[{"key":"10_CR1","unstructured":"E. Biham, R. Anderson, and L. Knudsen. Aes proposal serpent. AES CD-1: documentation, 1998."},{"issue":"1","key":"10_CR2","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"E. Biham and A. Shamir. Differential cryptanalysis of des-like cryptosystems. Journal of Cryptology, 4(1):3\u201372, 1991.","journal-title":"Journal of Cryptology"},{"key":"10_CR3","unstructured":"E. Biham and A. Shamir. Power analysis of the key scheduling of the aes candidates. In 2nd AES Candidates Conference, March 1999."},{"key":"10_CR4","unstructured":"S. Chari, C. Jutla, J. Rao, and P. Rohatgi. A cautionary note regarding evaluation of aes candidates on smart-cards. In Proceedings of the 2nd AES Candidates Conference, March 1999."},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"S. Chari, C. Jutla, J. Rao, and P. Rohatgi. Towards sound approaches to counteract power-analysis attacks. In Advances in Cryptology-CRYPTO'99, pages 398\u2013412. Springer-Verlag, 1999.","DOI":"10.1007\/3-540-48405-1_26"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"T. M. Cover and J. A. Thomas. Elements of Information Theory. John Wiley & Sons, 1991.","DOI":"10.1002\/0471200611"},{"key":"10_CR7","unstructured":"J. Daemen. Cipher and Hash Function Design. PhD thesis, Katholieke Universiteit Leuven, March 1995."},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"J. Daemen, R. Govaerts, and J. Vandewalle. Correlation matrices. In R. Anderson, editor, Fast Software Encryption, pages 275\u2013285. Springer-Verlag, 1994.","DOI":"10.1007\/3-540-60590-8_21"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"J. Daemen, R. Govaerts, and J. Vandewalle. A new approach towards block cipher design. In R. Anderson, editor, Fast Software Encryption, pages 18\u201333. Springer-Verlag, 1994.","DOI":"10.1007\/3-540-58108-1_2"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"J. Daemen, R. Govaerts, and J. Vandewalle. Weak keys of idea. In Advances in Cryptology-CRYPTO\u201993, pages 224\u2013231. Springer-Verlag, 1994.","DOI":"10.1007\/3-540-48329-2_20"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"D.W. Davies. Some regular properties of the des. In Advances in Cryptology-CRYPTO\u201982, pages 89\u201396. Plenum Press, 1983.","DOI":"10.1007\/978-1-4757-0602-4_8"},{"key":"10_CR12","first-page":"158","volume":"1717","author":"L. Goubin","year":"1999","unstructured":"L. Goubin and J. Patarin. Des and differential power analysis. In CHES\u201999, volume 1717, pages 158\u2013172. Springer-Verlag, 1999.","journal-title":"CHES\u201999"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"J. Kelsey, B. Schneier, and D. Wagner. Key-schedule cryptanalysis of idea, g-des, gost, safer and triple-des. In Advances in Cryptology-CRYPTO\u2019 96, page 237. Springer-Verlag, 1996.","DOI":"10.1007\/3-540-68697-5_19"},{"key":"10_CR14","unstructured":"P. Kocher, J. Jaffe, and B. Jun. Introduction to differential power analysis and related attacks. The article can be found at http:\/\/www.cryptography.com\/dpa\/technical\/index.html , 1998."},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"M. Matsui. Linear cryptanalysis method for des cipher. In Advances in Cryptology-EUROCRYPT\u201993, page 386. Springer-Verlag, 1993.","DOI":"10.1007\/3-540-48285-7_33"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44706-7_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T15:41:07Z","timestamp":1556898067000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44706-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540417286","9783540447061"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-44706-7_10","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}