{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T07:34:46Z","timestamp":1771572886875,"version":"3.50.1"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030900182","type":"print"},{"value":"9783030900199","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-90019-9_14","type":"book-chapter","created":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T18:47:48Z","timestamp":1635878868000},"page":"270-286","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Research of CPA Attack Methods Based on Ant Colony Algorithm"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4668-9427","authenticated-orcid":false,"given":"Xiaoyi","family":"Duan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0831-9238","authenticated-orcid":false,"given":"You","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4518-4830","authenticated-orcid":false,"given":"Jianmin","family":"Tong","sequence":"additional","affiliation":[]},{"given":"Xiuying","family":"Li","sequence":"additional","affiliation":[]},{"given":"Siman","family":"He","sequence":"additional","affiliation":[]},{"given":"Peishu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,3]]},"reference":[{"key":"14_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2014 CRYPTO 1999","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_25"},{"issue":"3","key":"14_CR2","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1109\/TDSC.2009.1","volume":"7","author":"M Alioto","year":"2009","unstructured":"Alioto, M., Poli, M., Rocchi, S.: Differential power analysis attacks to precharged buses: a general analysis for symmetric-key cryptographic algorithms. Dependab. Secure Comput. IEEE Trans. 7(3), 226\u2013239 (2009)","journal-title":"Dependab. Secure Comput. IEEE Trans."},{"key":"14_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/978-3-642-37288-9_15","volume-title":"Smart Card Research and Advanced Applications","author":"D Oswald","year":"2013","unstructured":"Oswald, D., Paar, C.: Improving side-channel analysis with optimal linear transforms. In: Mangard, S. (ed.) CARDIS 2012. LNCS, vol. 7771, pp. 219\u2013233. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-37288-9_15"},{"issue":"7","key":"14_CR4","first-page":"1322","volume":"133","author":"R Satoh","year":"2013","unstructured":"Satoh, R., Matsushima, D., Shiozaki, M., et al.: Subkey driven hybrid power analysis attack in frequency domain against cryptographic LSIs and its evaluation. IEEJ Trans. Electron. Inf. Syst. 133(7), 1322\u20131330 (2013)","journal-title":"IEEJ Trans. Electron. Inf. Syst."},{"key":"14_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-319-12160-4_7","volume-title":"Information Security and Cryptology \u2013 ICISC 2013","author":"Y Kim","year":"2014","unstructured":"Kim, Y., Ko, H.: Using principal component analysis for practical biasing of power traces to improve power analysis attacks. In: Lee, H.-S., Han, D.-G. (eds.) ICISC 2013. LNCS, vol. 8565, pp. 109\u2013120. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-12160-4_7"},{"issue":"2","key":"14_CR6","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1504\/IJACT.2014.062722","volume":"3","author":"L Lerman","year":"2014","unstructured":"Lerman, L., Bontempi, G., Markowitch, O.: Power analysis attack: an approach based on machine learning. Int. J. Appl. Cryptogr. 3(2), 97\u2013115 (2014)","journal-title":"Int. J. Appl. Cryptogr."},{"key":"14_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/978-3-319-12060-7_8","volume-title":"Security, Privacy, and Applied Cryptography Engineering","author":"D Shanmugam","year":"2014","unstructured":"Shanmugam, D., Selvam, R., Annadurai, S.: Differential power analysis attack on SIMON and LED block ciphers. In: Chakraborty, R.S., Matyas, V., Schaumont, P. (eds.) SPACE 2014. LNCS, vol. 8804, pp. 110\u2013125. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-12060-7_8"},{"key":"14_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/978-3-662-48324-4_3","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2015","author":"S Merino Del Pozo","year":"2015","unstructured":"Merino Del Pozo, S., Standaert, F.-X.: Blind source separation from single measurements using singular spectrum analysis. In: G\u00fcneysu, T., Handschuh, H. (eds.) CHES 2015. LNCS, vol. 9293, pp. 42\u201359. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48324-4_3"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Guo, L., Li, Q., Wang, L., et al.: A differential power analysis attack on dynamic password token based on SM3 algorithm. International Conference on Information Science & Electronic Technology (2015)","DOI":"10.2991\/iset-15.2015.28"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Mahanta, H.J., Azad, A.K., Khan, A.K.: Power analysis attack: a vulnerability to smart card security. In: International Conference on Signal Processing & Communication Engineering Systems. IEEE (2015)","DOI":"10.1109\/SPACES.2015.7058206"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Guo, L., Wang, L., Liu, D., et al.: A chosen - plaintext differential power analysis attack on HMAC - SM3. In: 2015 11th International Conference on Computational Intelligence and Security (CIS). IEEE (2016)","DOI":"10.1109\/CIS.2015.91"},{"issue":"3","key":"14_CR12","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1504\/IJITST.2016.080392","volume":"6","author":"M Masoumi","year":"2016","unstructured":"Masoumi, M., Habibi, P., Dehghan, A., Jadidi, M., Yousefi, L.: Efficient implementation of power analysis attack resistant advanced encryption standard algorithm on side-channel attack standard evaluation board. Int. J. Internet Technol. Secur. Trans. 6(3), 203 (2016). https:\/\/doi.org\/10.1504\/IJITST.2016.080392","journal-title":"Int. J. Internet Technol. Secur. Trans."},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Yoshikawa, M., Nozaki, Y., Asahi, K.: Multiple rounds aware power analysis attack for a lightweight cipher SIMECK. In: IEEE Second International Conference on Big Data Computing Service & Applications. IEEE (2016)","DOI":"10.1109\/BigDataService.2016.17"},{"key":"14_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-319-66787-4_3","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2017","author":"E Cagli","year":"2017","unstructured":"Cagli, E., Dumas, C., Prouff, E.: Convolutional neural networks with data augmentation against Jitter-based countermeasures. In: Fischer, W., Homma, N. (eds.) CHES 2017. LNCS, vol. 10529, pp. 45\u201368. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66787-4_3"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Chakraborty, A., Mondal, A., Srivastava, A.: Correlation power analysis attack against STT-MRAM based cyptosystems. In: IEEE International Symposium on Hardware Oriented Security & Trust. IEEE (2017)","DOI":"10.1109\/HST.2017.7951835"},{"key":"14_CR16","unstructured":"Wiemers, A., Klein, D.: Entropy reduction for the correlation-enhanced power analysis collision attack. In: Proceedings of the 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, 3\u20135 Sep 2018 (2018)"},{"issue":"3","key":"14_CR17","doi-asserted-by":"publisher","first-page":"148","DOI":"10.46586\/tches.v2019.i3.148-179","volume":"2019","author":"J Kim","year":"2019","unstructured":"Kim, J., Picek, S., Heuser, A., Bhasin, S., Hanjalic, A.: Make some noise unleashing the power of convolutional neural networks for profiled side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(3), 148\u2013179 (2019). 430","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"issue":"2","key":"14_CR18","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s13389-019-00220-8","volume":"10","author":"R Benadjila","year":"2019","unstructured":"Benadjila, R., Prouff, E., Strullu, R., Cagli, E., Dumas, C.: Deep learning for side-channel analysis and introduction to ASCAD database. J. Cryptogr. Eng. 10(2), 163\u2013188 (2019)","journal-title":"J. Cryptogr. Eng."},{"key":"14_CR19","doi-asserted-by":"publisher","first-page":"89084","DOI":"10.1109\/ACCESS.2020.2993701","volume":"8","author":"X Cai","year":"2020","unstructured":"Cai, X., Li, R., Kuang, S., Tan, J.: An energy trace compression method for differential power analysis attack. IEEE Access 8, 89084\u201389092 (2020)","journal-title":"IEEE Access"},{"key":"14_CR20","first-page":"1","volume":"2020","author":"X Duan","year":"2020","unstructured":"Duan, X., Chen, D., Fan, X., Li, X., Ding, D., Li, Y.: Research and implementation on power analysis attacks for unbalanced data. Secur. Commun. Netw. 2020, 1\u201310 (2020)","journal-title":"Secur. Commun. Netw."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-90019-9_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T18:55:27Z","timestamp":1635879327000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-90019-9_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030900182","9783030900199"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-90019-9_14","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"3 November 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/securecomm.eai-conferences.org\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy +","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"143","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"56","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}