{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T10:13:14Z","timestamp":1742983994968,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031840999"},{"type":"electronic","value":"9783031841002"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-84100-2_3","type":"book-chapter","created":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T23:59:36Z","timestamp":1741391976000},"page":"19-27","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Performance Comparison: Software vs. Hardware Implementation of\u00a0Novel S-Box Designed to\u00a0Resist Power Analysis Attack"],"prefix":"10.1007","author":[{"given":"Mattia","family":"Mirigaldi","sequence":"first","affiliation":[]},{"given":"Maurizio","family":"Martina","sequence":"additional","affiliation":[]},{"given":"Guido","family":"Masera","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,8]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Prouff, Emmanuel. \"DPA attacks and S-Boxes.\" International Workshop on Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005.","DOI":"10.1007\/11502760_29"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Carlet, Claude. \"On highly nonlinear S-boxes and their inability to thwart DPA attacks.\" International Conference on Cryptology in India. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005.","DOI":"10.1007\/11596219_5"},{"key":"3_CR3","unstructured":"Guilley, et al. \"Differential power analysis model and some results.\" Smart Card Research and Advanced Applications VI: IFIP 18th World Computer Congress TC8\/WG8. 8 TC11\/WG11. 2 Sixth International Conference on Smart Card Research and Advanced Applications (CARDIS) 22-27 August 2004 Toulouse, France. Springer US, 2004."},{"key":"3_CR4","unstructured":"Carlet, et al. \"Trade-offs for S-boxes: Cryptographic properties and side-channel resilience.\" Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings 15. Springer International Publishing, 2017."},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Kocher, Paul, et al. \"Introduction to differential power analysis.\" Journal of Cryptographic Engineering 1 (2011): 5-27.","DOI":"10.1007\/s13389-011-0006-y"},{"issue":"2","key":"3_CR6","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1109\/JPROC.2005.862300","volume":"94","author":"D Canniere","year":"2006","unstructured":"De Canniere, et al. \"An introduction to block cipher cryptanalysis.\" Proceedings of the IEEE 94.2 (2006): 346-356.","journal-title":"Proceedings of the IEEE"},{"key":"3_CR7","unstructured":"Prouff, et al. \"Theoretical and practical aspects of mutual information based side channel analysis.\" Applied Cryptography and Network Security: 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings 7. Springer Berlin Heidelberg, 2009."},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Freyre-Echevarr\u00eda, Alejandro, et al. \"Evolving nonlinear S-boxes with improved theoretical resilience to power attacks.\" IEEE Access 8 (2020): 202728-202737.","DOI":"10.1109\/ACCESS.2020.3035163"},{"issue":"8","key":"3_CR9","doi-asserted-by":"publisher","first-page":"3317","DOI":"10.1007\/s00521-017-3287-y","volume":"31","author":"F \u00d6zkaynak","year":"2019","unstructured":"\u00d6zkaynak, Fatih. \"Construction of robust substitution boxes based on chaotic systems.\" Neural Computing and Applications 31.8 (2019): 3317-3326.","journal-title":"Neural Computing and Applications"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"A\u00e7ikkapi, et al. \"Side-channel analysis of chaos-based substitution box structures.\" IEEE Access 7 (2019): 79030-79043.","DOI":"10.1109\/ACCESS.2019.2921708"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Hussain, Iqtadar, et al. \"An efficient approach for the construction of LFT S-boxes using chaotic logistic map.\" Nonlinear Dynamics 71 (2013): 133-140.","DOI":"10.1007\/s11071-012-0646-1"},{"key":"3_CR12","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/s13389-014-0087-5","volume":"5","author":"C O\u2019Flynn","year":"2015","unstructured":"O\u2019Flynn, Colin, and Zhizhang Chen. \"Synchronous sampling and clock recovery of internal oscillators for side channel analysis and fault injection.\" Journal of Cryptographic Engineering 5 (2015): 53-69.","journal-title":"Journal of Cryptographic Engineering"},{"key":"3_CR13","unstructured":"Cerini, Samuele Yves. Empirical evaluation of the resilience of novel s-box implementations against power side-channel attacks. Available at https:\/\/webthesis.biblio.polito.it\/18156\/ Diss. Politecnico di Torino, 2021."}],"container-title":["Lecture Notes in Electrical Engineering","Applications in Electronics Pervading Industry, Environment and Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-84100-2_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T23:59:42Z","timestamp":1741391982000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-84100-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031840999","9783031841002"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-84100-2_3","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"8 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ApplePies","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applications in Electronics Pervading Industry, Environment and Society","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Turin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"applepies2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}