{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T02:48:39Z","timestamp":1742957319386,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031544088"},{"type":"electronic","value":"9783031544095"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-54409-5_7","type":"book-chapter","created":{"date-parts":[[2024,2,22]],"date-time":"2024-02-22T06:08:12Z","timestamp":1708582092000},"page":"127-147","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Blind Side Channel Analysis Against AEAD with\u00a0a\u00a0Belief Propagation Approach"],"prefix":"10.1007","author":[{"given":"Modou","family":"Sarry","sequence":"first","affiliation":[]},{"given":"H\u00e9l\u00e8ne","family":"Le Bouder","sequence":"additional","affiliation":[]},{"given":"E\u00efd","family":"Maaloouf","sequence":"additional","affiliation":[]},{"given":"Ga\u00ebl","family":"Thomas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,23]]},"reference":[{"key":"7_CR1","unstructured":"NIST. Lightweight Cryptography Standardization Process (2018)"},{"key":"7_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77222-2","volume-title":"Side-channel analysis of embedded systems","author":"M Ouladj","year":"2021","unstructured":"Ouladj, M., Guilley, S.: Side-channel analysis of embedded systems. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-77222-2"},{"key":"7_CR3","unstructured":"NIST. Specification for the Advanced Encryption Standard. FIPS PUB 197 (2001)"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Berti, F., et al.: A finer-grain analysis of the leakage (non) resilience of OCB. IACR T CHES (2022)","DOI":"10.46586\/tches.v2022.i1.461-481"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Sim, S.M., Jap, D., Bhasin, S.: Differential analysis aided power attack on (non-) linear feedback shift registers. IACR TCHES (2021)","DOI":"10.46586\/tches.v2021.i1.169-191"},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-030-12146-4_20","volume-title":"Information Security and Cryptology \u2013 ICISC 2018","author":"A Adomnicai","year":"2019","unstructured":"Adomnicai, A., Masson, L., Fournier, J.J.A.: Practical algebraic side-channel attacks against ACORN. In: Lee, K. (ed.) ICISC 2018. LNCS, vol. 11396, pp. 325\u2013340. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-12146-4_20"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-3-319-21476-4_4","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"V Banciu","year":"2015","unstructured":"Banciu, V., Oswald, E., Whitnall, C.: Exploring the resilience of some lightweight ciphers against profiled single trace attacks. In: Mangard, S., Poschmann, A.Y. (eds.) COSADE 2014. LNCS, vol. 9064, pp. 51\u201363. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-21476-4_4"},{"key":"7_CR8","unstructured":"Beyne, T., Chen, Y.L., Dobraunig, C., Mennink, B.: Elephant v2. NIST lightweight competition (2021)"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Beierle, C., et al.: Schwaemm and esch: lightweight authenticated encryption and hashing using the sparkle permutation family. NIST Round 2 (2019)","DOI":"10.46586\/tosc.v2020.iS1.208-261"},{"key":"7_CR10","unstructured":"Meraneh, M.H., Clavier, C., Le Bouder, H., Maillard, J., Thomas, G.: Blind side channel on the elephant LFSR (2022)"},{"key":"7_CR11","doi-asserted-by":"publisher","unstructured":"Maillard, J., Meraneh, A.H., Sarry, M., Clavier, C., Bouder, H.L., Thomas, G.: Blind side channel analysis on the Elephant LFSR extended version. In: In: Van Sinderen, M., Wijnhoven, F., Hammoudi, S., Samarati, P., Vimercati, S.D.C.d. (eds.) E-Business and Telecommunications. ICSBT SECRYPT 2022. Communications in Computer and Information Science, vol. 1849, pp. 20\u201342. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-45137-9_2","DOI":"10.1007\/978-3-031-45137-9_2"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Barber, D.: Bayesian Reasoning and Machine Learning. Cambridge University Press, Cambridge (2011)","DOI":"10.1017\/CBO9780511804779"},{"key":"7_CR13","unstructured":"Dobraunig, C., Eichlseder, M., Mendel, F., Schl\u00e4ffer, M.: Ascon. Submission to the CAESAR Competition (2014)"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Beyne, T., Chen, Y.L., Dobraunig, C., Mennink, B.: Dumbo, jumbo, and delirium: parallel authenticated encryption for the lightweight circus. IACR Trans. Symmetric Cryptology. 2020, 5\u201330 (2020)","DOI":"10.46586\/tosc.v2020.iS1.5-30"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Bernstein, D.J.: How to stretch random functions: Secur. Protected Counter Sums. J. Cryptol. (1999)","DOI":"10.1007\/s001459900051"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-662-52993-5_3","volume-title":"Fast Software Encryption","author":"A Luykx","year":"2016","unstructured":"Luykx, A., Preneel, B., Tischhauser, E., Yasuda, K.: A MAC mode for lightweight block ciphers. In: Peyrin, T. (ed.) FSE 2016. LNCS, vol. 9783, pp. 43\u201359. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-52993-5_3"},{"key":"7_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/978-3-662-49890-3_11","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2016","author":"R Granger","year":"2016","unstructured":"Granger, R., Jovanovic, P., Mennink, B., Neves, S.: Improved masking for tweakable blockciphers with applications to authenticated encryption. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9665, pp. 263\u2013293. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49890-3_11"},{"key":"7_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1007\/978-3-642-23951-9_21","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"A Bogdanov","year":"2011","unstructured":"Bogdanov, A., Kne\u017eevi\u0107, M., Leander, G., Toz, D., Var\u0131c\u0131, K., Verbauwhede, I.: spongent: a lightweight hash function. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 312\u2013325. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23951-9_21"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Chakraborti, A., Datta, N., Nandi, M., Yasuda, K.: Beetle family of lightweight and secure authenticated encryption ciphers. IACR TCHES. (2018)","DOI":"10.46586\/tches.v2018.i2.218-241"},{"key":"7_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/978-3-642-28496-0_19","volume-title":"Selected Areas in Cryptography","author":"G Bertoni","year":"2012","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Duplexing the sponge: single-pass authenticated encryption and other applications. In: Miri, A., Vaudenay, S. (eds.) SAC 2011. LNCS, vol. 7118, pp. 320\u2013337. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-28496-0_19"},{"key":"7_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_25"},{"key":"7_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"E Brier","year":"2004","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16\u201329. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-28632-5_2"},{"key":"7_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/978-3-540-85053-3_27","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"B Gierlichs","year":"2008","unstructured":"Gierlichs, B., Batina, L., Tuyls, P., Preneel, B.: Mutual information analysis. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 426\u2013442. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85053-3_27"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Samwel, N., Daemen, J.: DPA on hardware implementations of Ascon and Keyak. In: Computing Frontiers Conference. ACM (2017)","DOI":"10.1145\/3075564.3079067"},{"key":"7_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-3-319-10175-0_14","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"Y Linge","year":"2014","unstructured":"Linge, Y., Dumas, C., Lambert-Lacroix, S.: Using the joint distributions of a cryptographic function in side channel analysis. In: Prouff, E. (ed.) COSADE 2014. LNCS, vol. 8622, pp. 199\u2013213. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10175-0_14"},{"key":"7_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-3-319-51966-1_13","volume-title":"Foundations and Practice of Security","author":"H Le Bouder","year":"2017","unstructured":"Le Bouder, H., Lashermes, R., Linge, Y., Thomas, G., Zie, J.-Y.: A multi-round side channel attack on AES using belief propagation. In: Cuppens, F., Wang, L., Cuppens-Boulahia, N., Tawbi, N., Garcia-Alfaro, J. (eds.) FPS 2016. LNCS, vol. 10128, pp. 199\u2013213. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-51966-1_13"},{"key":"7_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/978-3-319-66787-4_2","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2017","author":"C Clavier","year":"2017","unstructured":"Clavier, C., Reynaud, L.: Improved blind side-channel analysis by exploitation of joint distributions of leakages. In: Fischer, W., Homma, N. (eds.) CHES 2017. LNCS, vol. 10529, pp. 24\u201344. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66787-4_2"},{"key":"7_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-319-89641-0_9","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"C Clavier","year":"2018","unstructured":"Clavier, C., Reynaud, L., Wurcker, A.: Quadrivariate improved blind side-channel analysis on Boolean masked AES. In: Fan, J., Gierlichs, B. (eds.) COSADE 2018. LNCS, vol. 10815, pp. 153\u2013167. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-89641-0_9"},{"key":"7_CR29","doi-asserted-by":"crossref","unstructured":"Yli-M\u00e4yry, V., et al.: Diffusional side-channel leakage from unrolled lightweight block ciphers: a case study of power analysis on PRINCE. IEEE Trans. Inf. Forensics Secur. 16, 1351\u20131364 (2020)","DOI":"10.1109\/TIFS.2020.3033441"},{"key":"7_CR30","doi-asserted-by":"crossref","unstructured":"Gallager, R.G.:. Low-density parity-check codes. IRE Trans. Inf. Theory 8, 21\u201328 (1962)","DOI":"10.1109\/TIT.1962.1057683"},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"Gallager, R.G.: Low Density Parity check codes. PhD thesis, MIT, Cambridge, MA (1963)","DOI":"10.7551\/mitpress\/4347.001.0001"},{"key":"7_CR32","doi-asserted-by":"crossref","unstructured":"Chung, S.-Y., Forney Jr, G.D., Richardson, T.J., Urbanke, R.L.: On the design of low-density parity-check codes within 0.0045 dB of the Shannon limit. IEEE Commun. Lett. 5, 58\u201360 (2001)","DOI":"10.1109\/4234.905935"},{"key":"7_CR33","doi-asserted-by":"crossref","unstructured":"Tanner, R.M.: A recursive approach to low complexity codes. IEEE Trans. Inf. Theory 27, 533\u2013547 (1981)","DOI":"10.1109\/TIT.1981.1056404"},{"key":"7_CR34","unstructured":"Pearl, J.: Reverend bayes on inference engines: a distributed hierarchical approach. In: National Conference on Artificial Intelligence. AAAI Press (1982)"},{"key":"7_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/978-3-662-45611-8_15","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2014","author":"N Veyrat-Charvillon","year":"2014","unstructured":"Veyrat-Charvillon, N., G\u00e9rard, B., Standaert, F.-X.: Soft analytical side-channel attacks. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014. LNCS, vol. 8873, pp. 282\u2013296. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45611-8_15"},{"key":"7_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-662-48800-3_12","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2015","author":"V Grosso","year":"2015","unstructured":"Grosso, V., Standaert, F.-X.: ASCA, SASCA and DPA with enumeration: which one beats the other and when? In: Iwata, T., Cheon, J.H. (eds.) ASIACRYPT 2015. LNCS, vol. 9453, pp. 291\u2013312. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48800-3_12"},{"key":"7_CR37","doi-asserted-by":"crossref","unstructured":"Ouyang, W., Cham, W.K.: Fast algorithm for Walsh Hadamard transform on sliding windows. Trans. Pattern Anal. Mach. Intell. 32, 165\u2013171 (2009)","DOI":"10.1109\/TPAMI.2009.104"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-54409-5_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,31]],"date-time":"2024-03-31T12:02:20Z","timestamp":1711886540000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-54409-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031544088","9783031544095"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-54409-5_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"23 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CARDIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Smart Card Research and Advanced Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Amsterdam","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cardis2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easy Chair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}