{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T00:53:26Z","timestamp":1743036806034,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540443452"},{"type":"electronic","value":"9783540458531"}],"license":[{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45853-0_6","type":"book-chapter","created":{"date-parts":[[2007,5,3]],"date-time":"2007-05-03T20:42:13Z","timestamp":1178224933000},"page":"90-103","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Hamming Weight Attacks on Cryptographic Hardware \u2014 Breaking Masking Defense"],"prefix":"10.1007","author":[{"given":"Marcin","family":"Gomuff\u0142kiewicz","sequence":"first","affiliation":[]},{"given":"Mirosff\u0142aw","family":"Kutyff\u0142owski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,9,26]]},"reference":[{"key":"6_CR1","unstructured":"Burwick C., Coppersmith D., D\u2019Avignon E., Gennaro R., Halevi S., Jutla C., Matyas S., O\u2019Connor L., Peyravian M., Safford D., Zunic N., MARS \u2014 A Candidate Cipher for AES, \n                  http:\/\/www.research.ibm.com\/security\/mars.html\n                  \n                ."},{"key":"6_CR2","unstructured":"Chari S., Jutla Ch., Rao J. R., Rohatgi P., A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards, Second Advanced Encryption Standard (AES) Candidate Conference."},{"key":"6_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1007\/3-540-48405-1_26","volume-title":"CRYPTO\u201999","author":"S. Chari","year":"1999","unstructured":"Chari S., Jutla Ch., Rao J.R., Rohatgi P., Towards sound approaches to counteract power-analysis attacks, CRYPTO\u201999, Lecture Notes in Computer Science 1666. Springer-Verlag, 398\u2013412."},{"key":"6_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/3-540-44499-8_18","volume-title":"CHES\u20192000","author":"J. S. Coron","year":"2000","unstructured":"Coron J. S., On Boolean and arithmetic masking against differential power analysis, CHES\u20192000, Lecture Notes in Computer Science 1965. Springer-Verlag, 231\u2013237."},{"key":"6_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/BFb0052343","volume-title":"Fast Software Encryption\u201997","author":"J. Daemen","year":"1997","unstructured":"Daemen J., Knudsen L., Rijmen V., The block cipher Square, Fast Software Encryption\u201997, Lecture Notes in Computer Science 1267. Springer-Verlag, 149\u2013165."},{"key":"6_CR6","unstructured":"Daemen J., Rijmen V., The block cipher Rijndael, \n                  http:\/\/www.esat.kuleuven.ac.be\/~rijmen\/rijndael\n                  \n                ."},{"key":"6_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/3-540-44709-1_2","volume-title":"CHES\u20192001","author":"L. Goubin","year":"2001","unstructured":"Goubin L., A sound method for switching between Boolean and arithmetic masking, CHES\u20192001, Lecture Notes in Computer Science 2162. Springer-Verlag, 3\u201315."},{"key":"6_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/3-540-44709-1_21","volume-title":"CHES\u20192001","author":"K. Gandolfi","year":"2001","unstructured":"Gandolfi K., Mourtel Ch., Olivier F., Electromagnetic Analysis: Concrete Results, CHES\u20192001, Lecture Notes in Computer Science 2162. Springer-Verlag, 251\u2013261."},{"key":"6_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1007\/3-540-48059-5_15","volume-title":"CHES\u201999","author":"L. Goubin","year":"1999","unstructured":"Goubin L., Patarin J., DES and Differential Power Analysis (The \u201cDuplication\u201d Method), CHES\u201999, Lecture Notes in Computer Science 1717. Springer-Verlag, 158\u2013172."},{"key":"6_CR10","doi-asserted-by":"crossref","first-page":"141","DOI":"10.3233\/JCS-2000-82-304","volume":"8","author":"J. Kesley","year":"2000","unstructured":"Kesley J., Schneier B., Wagner D., Hall Ch., Side channel cryptanalysis of product ciphers, Journal on Computer Security 8 (2000), 141\u2013158.","journal-title":"Journal on Computer Security"},{"key":"6_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"RSA, DSS, and Other Systems. CRYPTO\u201996","author":"P. Kocher","year":"1996","unstructured":"Kocher P., Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. CRYPTO\u201996, Lecture Notes in Computer Science 1109. Springer-Verlag, 104\u2013113."},{"key":"6_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"CRYPTO\u201999","author":"P. Kocher","year":"1999","unstructured":"Kocher P., Jaffe J., Jun B., Differential power analysis, CRYPTO\u201999, Lecture Notes in Computer Science 1666. Springer-Verlag, 388\u2013397, also: Introduction to differential power analysis and related attacks, \n                  http:\/\/www.cryptography.com\/dpa\/technical\n                  \n                ."},{"key":"6_CR13","unstructured":"Lucks S., The saturation attack-a bait for Twofish, \n                  http:\/\/eprint.iacr.org\/2000\/046\/\n                  \n                ."},{"key":"6_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1007\/3-540-44706-7_11","volume-title":"FSE\u20192000","author":"Th. Messerges","year":"2001","unstructured":"Messerges Th., Securing AES finalists against power analysis attack, FSE\u20192000, Lecture Notes in Computer Science 1978. Springer-Verlag, 150\u2013164."},{"key":"6_CR15","unstructured":"Rivest R., Robshaw M., Sidney R., The RC6 Block Cipher, \n                  http:\/\/theory.lcs.mit.edu\/~rivest\/rc6.ps\n                  \n                ."},{"key":"6_CR16","unstructured":"Schneier B., Kesley J., Whiting D., Wagner D., Ch. Hall, N. Ferguson, The Twofish Encryption Algorithm: a 128-Bit Block Cipher, Wiley, 1999, ISBN 0-471-35381-7."},{"key":"6_CR17","unstructured":"AES Development Effort, NIST, \n                  http:\/\/www.nist.gov\/aes\n                  \n                ."}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2014 ESORICS 2002"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45853-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T20:09:27Z","timestamp":1559506167000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45853-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540443452","9783540458531"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-45853-0_6","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]},"assertion":[{"value":"26 September 2002","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}