{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:47:01Z","timestamp":1725515221278},"publisher-location":"Boston, MA","reference-count":16,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387096988"},{"type":"electronic","value":"9780387096995"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-09699-5_28","type":"book-chapter","created":{"date-parts":[[2008,7,16]],"date-time":"2008-07-16T14:12:54Z","timestamp":1216217574000},"page":"429-443","source":"Crossref","is-referenced-by-count":1,"title":["An Operation-Based Metric for CPA Resistance"],"prefix":"10.1007","author":[{"given":"J.","family":"Pan","sequence":"first","affiliation":[]},{"given":"J.I. den","family":"Hartog","sequence":"additional","affiliation":[]},{"given":"E.P. de","family":"Vink","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","doi-asserted-by":"crossref","unstructured":"M.-L. Akkar, R. Bevan, P. Dischamp, and D. Moyart. Power analysis, what is now possible... In ASIACRYPT, pages 489\u2013502. Springer, 2000.","DOI":"10.1007\/3-540-44448-3_38"},{"key":"28_CR2","doi-asserted-by":"crossref","unstructured":"R. Bevan and E. Knudsen. Ways to enhance differential power analysis. In ICISC, pages 327\u2013342. Springer, 2002.","DOI":"10.1007\/3-540-36552-4_23"},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"E. Brier, C. Clavier, and F. Olivier. Correlation power analysis with a leakage model. In CHES, pages 16\u201329. Springer, 2004.","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"28_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael","author":"J. Daemen","year":"2002","unstructured":"J. Daemen and V. Rijmen. The Design of Rijndael. Springer-Verlag New York, Inc., Secaucus, NJ, USA, 2002."},{"key":"28_CR5","unstructured":"D. Gligoroski. Stream cipher based on quasigroup string transformations in Z*p. Computing Research Repository (CoRR), cs.CR\/0403043, 2004."},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"S. Guilley, P. Hoogvorst, and R. Pacalet. Differential power analysis model and some results. In CARDIS, pages 127\u2013142. Kluwer, 2004.","DOI":"10.1007\/1-4020-8147-2_9"},{"key":"28_CR7","doi-asserted-by":"crossref","unstructured":"P. Kocher, J. Jaffe, and B. Jun. Differential power analysis. In CRYPTO, pages 388\u2013397. Springer, 1999.","DOI":"10.1007\/3-540-48405-1_25"},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"T.-H. Le, J. Clediere, C. Serviere, and J.-L. Lacoume. A proposition for correlation power analysis enhancement. In CHES, pages 174\u2013186. Springer, 2006.","DOI":"10.1007\/11894063_14"},{"key":"28_CR9","unstructured":"T.-H. Le, J. Clediere, C. Serviere, and J.-L. Lacoume. How can signal processing benefit side channel attacks? IEEE Workshop on Signal Processing Applications for Public Security and Forensics, pages 1\u20137, April 2007."},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"K. Lemke, K. Schramm, and C. Paar. DPA on n-bit sized boolean and arithmetic operations and its application to IDEA, RC6, and the HMAC-construction. In M. Joye and J-J. Quisquater, editors, CHES, pages 205\u2013219. Springer, 2004.","DOI":"10.1007\/978-3-540-28632-5_15"},{"key":"28_CR11","unstructured":"S. Mangard, E. Oswald, and T. Popp. Power Analysis Attacks: Revealing the Secrets of Smart Cards. Advances in Information Security. Springer, 2007."},{"issue":"5","key":"28_CR12","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"T. Messerges","year":"2002","unstructured":"T. Messerges, E. Dabbish, and R. Sloan. Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Computers, 51(5):541\u2013552, 2002.","journal-title":"IEEE Trans. Computers"},{"key":"28_CR13","doi-asserted-by":"crossref","unstructured":"E. Prouff. DPA attacks and S-boxes. In FSE, pages 424\u2013441. Springer, 2005.","DOI":"10.1007\/11502760_29"},{"key":"28_CR14","unstructured":"A. Siegel. Statistics and data analysis: an introduction. John Wiley & Sons,, 1988."},{"key":"28_CR15","doi-asserted-by":"crossref","unstructured":"F.-X. Standaert, E. Peeters, C. Archambeau, and J.-J. Quisquater. Towards security limits in side-channel attacks. In CHES, pages 30\u201345. Springer, 2006.","DOI":"10.1007\/11894063_3"},{"key":"28_CR16","doi-asserted-by":"crossref","unstructured":"D. Wheeler and R. Needham. TEA, a tiny encryption algorithm. In FSE, pages 363\u2013366. Springer, 1994.","DOI":"10.1007\/3-540-60590-8_29"}],"container-title":["IFIP \u2013 The International Federation for Information Processing","Proceedings of The Ifip Tc 11 23rd International Information Security Conference"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-09699-5_28.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T21:45:41Z","timestamp":1619559941000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-09699-5_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387096988","9780387096995"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-09699-5_28","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[]}}