{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:09:04Z","timestamp":1742915344882,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031213106"},{"type":"electronic","value":"9783031213113"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-21311-3_2","type":"book-chapter","created":{"date-parts":[[2022,12,10]],"date-time":"2022-12-10T12:02:38Z","timestamp":1670673758000},"page":"21-40","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Evolving a\u00a0Boolean Masked Adder Using Neuroevolution"],"prefix":"10.1007","author":[{"given":"Sebastian","family":"Renner","sequence":"first","affiliation":[]},{"given":"Enrico","family":"Pozzobon","sequence":"additional","affiliation":[]},{"given":"J\u00fcrgen","family":"Mottok","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,11]]},"reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-319-71667-1_4","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2017","author":"A Adomnicai","year":"2017","unstructured":"Adomnicai, A., Fournier, J.J.A., Masson, L.: Bricklayer attack: a side-channel analysis on the ChaCha quarter round. In: Patra, A., Smart, N.P. (eds.) INDOCRYPT 2017. LNCS, vol. 10698, pp. 65\u201384. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-71667-1_4"},{"key":"2_CR2","doi-asserted-by":"publisher","unstructured":"Adomnicai, A., Peyrin, T.: Fixslicing aes-like ciphers: New bitsliced AES speed records on arm-cortex m and RISC-V. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(1), 402\u2013425 (2020). https:\/\/doi.org\/10.46586\/tches.v2021.i1.402-425, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/8739","DOI":"10.46586\/tches.v2021.i1.402-425"},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/978-3-319-75208-2_2","volume-title":"Smart Card Research and Advanced Applications","author":"A Biryukov","year":"2018","unstructured":"Biryukov, A., Dinu, D., Le Corre, Y., Udovenko, A.: Optimal first-order Boolean masking for embedded IoT devices. In: Eisenbarth, T., Teglia, Y. (eds.) CARDIS 2017. LNCS, vol. 10728, pp. 22\u201341. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-75208-2_2"},{"key":"2_CR4","doi-asserted-by":"publisher","unstructured":"Cardamone, L., Loiacono, D., Lanzi, P.L.: Evolving competitive car controllers for racing games with neuroevolution. In: Proceedings of the 11th Annual Conference on Genetic and Evolutionary Computation, pp. 1179\u20131186. GECCO 2009, Association for Computing Machinery, New York, NY, USA (2009). https:\/\/doi.org\/10.1145\/1569901.1570060","DOI":"10.1145\/1569901.1570060"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/3-540-44499-8_18","volume-title":"Cryptographic Hardware and Embedded Systems \u2014 CHES 2000","author":"J-S Coron","year":"2000","unstructured":"Coron, J.-S., Goubin, L.: On Boolean and arithmetic masking against differential power analysis. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2000. LNCS, vol. 1965, pp. 231\u2013237. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-44499-8_18"},{"key":"2_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/978-3-662-48116-5_7","volume-title":"Fast Software Encryption","author":"J-S Coron","year":"2015","unstructured":"Coron, J.-S., Gro\u00dfsch\u00e4dl, J., Tibouchi, M., Vadnala, P.K.: Conversion from arithmetic to Boolean masking with logarithmic complexity. In: Leander, G. (ed.) FSE 2015. LNCS, vol. 9054, pp. 130\u2013149. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48116-5_7"},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-319-89641-0_5","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"Y Le Corre","year":"2018","unstructured":"Le Corre, Y., Gro\u00dfsch\u00e4dl, J., Dinu, D.: Micro-architectural power simulator for leakage assessment of cryptographic software on ARM cortex-M3 processors. In: Fan, J., Gierlichs, B. (eds.) COSADE 2018. LNCS, vol. 10815, pp. 82\u201398. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-89641-0_5"},{"key":"2_CR8","doi-asserted-by":"publisher","unstructured":"Deb, K., Agrawal, S., Pratap, A., Meyarivan, T.: A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 6(2), 182\u2013197 (2002). https:\/\/doi.org\/10.1109\/4235.996017","DOI":"10.1109\/4235.996017"},{"key":"2_CR9","doi-asserted-by":"publisher","unstructured":"Dinu, D., Gro\u00dfsch\u00e4dl, J., Corre, Y.L.: Efficient masking of ARX-based block ciphers using carry-save addition on Boolean shares. In: Nguyen, P.Q., Zhou, J. (eds.) Information Security - 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22\u201324, 2017, Proceedings. LNCS, vol. 10599, pp. 39\u201357. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-69659-1_3","DOI":"10.1007\/978-3-319-69659-1_3"},{"issue":"1","key":"2_CR10","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s12065-007-0002-4","volume":"1","author":"D Floreano","year":"2008","unstructured":"Floreano, D., D\u00fcrr, P., Mattiussi, C.: Neuroevolution: from architectures to learning. Evol. Intel. 1(1), 47\u201362 (2008)","journal-title":"Evol. Intel."},{"key":"2_CR11","doi-asserted-by":"publisher","unstructured":"Goubin, L.: A sound method for switching between Boolean and arithmetic masking. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14\u201316, 2001, Proceedings. LNCS, vol. 2162, pp. 3\u201315. Springer, Cham (2001). https:\/\/doi.org\/10.1007\/3-540-44709-1_2","DOI":"10.1007\/3-540-44709-1_2"},{"key":"2_CR12","doi-asserted-by":"publisher","unstructured":"Gro\u00df, H., Stoffelen, K., Meyer, L.D., Krenn, M., Mangard, S.: First-order masking with only two random bits. In: Bilgin, B., Petkova-Nikova, S., Rijmen, V. (eds.) Proceedings of ACM Workshop on Theory of Implementation Security Workshop, TIS@CCS 2019, London, UK, 11 November 2019, pp. 10\u201323. ACM (2019). https:\/\/doi.org\/10.1145\/3338467.3358950","DOI":"10.1145\/3338467.3358950"},{"issue":"4","key":"2_CR13","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1109\/TCIAIG.2013.2294713","volume":"6","author":"M Hausknecht","year":"2014","unstructured":"Hausknecht, M., Lehman, J., Miikkulainen, R., Stone, P.: A neuroevolution approach to general Atari game playing. IEEE Trans. Comput. Intell. AI Games 6(4), 355\u2013366 (2014). https:\/\/doi.org\/10.1109\/TCIAIG.2013.2294713","journal-title":"IEEE Trans. Comput. Intell. AI Games"},{"key":"2_CR14","doi-asserted-by":"publisher","unstructured":"Jungk, B., Petri, R., St\u00f6ttinger, M.: Efficient side-channel protections of ARX ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3), 627\u2013653 (2018). https:\/\/doi.org\/10.13154\/tches.v2018.i3.627-653, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/7289","DOI":"10.13154\/tches.v2018.i3.627-653"},{"key":"2_CR15","unstructured":"McIntyre, A., Kallada, M., Miguel, C.G., da Silva, C.F.: Neat-python. https:\/\/github.com\/CodeReclaimers\/neat-python"},{"key":"2_CR16","doi-asserted-by":"publisher","unstructured":"Nadkarni, J., Ferreira Neves, R.: Combining neuroevolution and principal component analysis to trade in the financial markets. Expert Syst. App. 103, 184\u2013195 (2018). https:\/\/doi.org\/10.1016\/j.eswa.2018.03.012, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0957417418301519","DOI":"10.1016\/j.eswa.2018.03.012"},{"key":"2_CR17","doi-asserted-by":"publisher","unstructured":"Risi, S., Hughes, C.E., Stanley, K.O.: Evolving plastic neural networks with novelty search. Adapt. Behav. 18(6), 470\u2013491 (2010). https:\/\/doi.org\/10.1177\/1059712310379923","DOI":"10.1177\/1059712310379923"},{"key":"2_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1007\/978-3-319-28166-7_27","volume-title":"Applied Cryptography and Network Security","author":"T Schneider","year":"2015","unstructured":"Schneider, T., Moradi, A., G\u00fcneysu, T.: Arithmetic addition over Boolean masking. In: Malkin, T., Kolesnikov, V., Lewko, A.B., Polychronakis, M. (eds.) ACNS 2015. LNCS, vol. 9092, pp. 559\u2013578. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-28166-7_27"},{"key":"2_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/978-3-319-69453-5_10","volume-title":"Selected Areas in Cryptography \u2013 SAC 2016","author":"P Schwabe","year":"2017","unstructured":"Schwabe, P., Stoffelen, K.: All the AES you need on cortex-M3 and M4. In: Avanzi, R., Heys, H. (eds.) SAC 2016. LNCS, vol. 10532, pp. 180\u2013194. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-69453-5_10"},{"key":"2_CR20","doi-asserted-by":"publisher","unstructured":"Stanley, K.O., Miikkulainen, R.: Evolving neural network through augmenting topologies. Evol. Comput. 10(2), 99\u2013127 (2002). https:\/\/doi.org\/10.1162\/106365602320169811","DOI":"10.1162\/106365602320169811"},{"key":"2_CR21","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1613\/jair.1338","volume":"21","author":"KO Stanley","year":"2004","unstructured":"Stanley, K.O., Miikkulainen, R.: Competitive coevolution through evolutionary complexification. J. Artif. Intell. Res. 21, 63\u2013100 (2004)","journal-title":"J. Artif. Intell. Res."},{"issue":"6","key":"2_CR22","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1109\/TEVC.2005.856210","volume":"9","author":"K Stanley","year":"2005","unstructured":"Stanley, K., Bryant, B., Miikkulainen, R.: Real-time neuroevolution in the Nero video game. IEEE Trans. Evol. Comput. 9(6), 653\u2013668 (2005). https:\/\/doi.org\/10.1109\/TEVC.2005.856210","journal-title":"IEEE Trans. Evol. Comput."},{"issue":"9","key":"2_CR23","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1109\/5.784219","volume":"87","author":"X Yao","year":"1999","unstructured":"Yao, X.: Evolving artificial neural networks. Proc. IEEE 87(9), 1423\u20131447 (1999). https:\/\/doi.org\/10.1109\/5.784219","journal-title":"Proc. IEEE"},{"issue":"1","key":"2_CR24","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1109\/TAC.1963.1105511","volume":"8","author":"L Zadeh","year":"1963","unstructured":"Zadeh, L.: Optimality and non-scalar-valued performance criteria. IEEE Trans. Autom. Control 8(1), 59\u201360 (1963). https:\/\/doi.org\/10.1109\/TAC.1963.1105511","journal-title":"IEEE Trans. Autom. Control"}],"container-title":["Lecture Notes in Computer Science","Attacks and Defenses for the Internet-of-Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-21311-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,10]],"date-time":"2022-12-10T12:03:07Z","timestamp":1670673787000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-21311-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031213106","9783031213113"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-21311-3_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"11 December 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ADIoT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Attacks and Defenses for Internet-of-Things","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"adiot2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/adiot.compute.dtu.dk\/2022\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}