{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T00:33:49Z","timestamp":1761006829420,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032014047","type":"print"},{"value":"9783032014054","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-01405-4_13","type":"book-chapter","created":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:24:36Z","timestamp":1760955876000},"page":"311-339","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Practical Second-Order CPA Attack on\u00a0Ascon with\u00a0Proper Selection Function"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-2939-8478","authenticated-orcid":false,"given":"Viet Sang","family":"Nguyen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3874-7527","authenticated-orcid":false,"given":"Vincent","family":"Grosso","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6708-868X","authenticated-orcid":false,"given":"Pierre-Louis","family":"Cayrel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,15]]},"reference":[{"key":"13_CR1","unstructured":"Advanced Encryption Standard (AES): National Institute of Standards and Technology, NIST FIPS PUB 197, U.S. Department of Commerce (2001)"},{"issue":"2","key":"13_CR2","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/s00145-010-9084-8","volume":"24","author":"L Batina","year":"2011","unstructured":"Batina, L., Gierlichs, B., Prouff, E., Rivain, M., Standaert, F.X., Veyrat-Charvillon, N.: Mutual information analysis: a comprehensive study. J. Cryptol. 24(2), 269\u2013291 (2011). https:\/\/doi.org\/10.1007\/s00145-010-9084-8","journal-title":"J. Cryptol."},{"key":"13_CR3","doi-asserted-by":"publisher","unstructured":"Bertoni, G., Daemen, J., Debande, N., Le, T.H., Peeters, M., Van\u00a0Assche, G.: Power analysis of hardware implementations protected with secret sharing. In: 2012 45th Annual IEEE\/ACM International Symposium on Microarchitecture Workshops, pp. 9\u201316 (2012). https:\/\/doi.org\/10.1109\/MICROW.2012.12","DOI":"10.1109\/MICROW.2012.12"},{"key":"13_CR4","doi-asserted-by":"publisher","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Duplexing the sponge: single-pass authenticated encryption and other applications. In: Miri, A., Vaudenay, S. (eds.) SAC 2011. LNCS, vol.\u00a07118, pp. 320\u2013337. Springer, Berlin, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-28496-0_19","DOI":"10.1007\/978-3-642-28496-0_19"},{"issue":"3","key":"13_CR5","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/s13389-016-0122-9","volume":"7","author":"P Bottinelli","year":"2017","unstructured":"Bottinelli, P., Bos, J.W.: Computational aspects of correlation power analysis. J. Cryptogr. Eng. 7(3), 167\u2013181 (2017). https:\/\/doi.org\/10.1007\/s13389-016-0122-9","journal-title":"J. Cryptogr. Eng."},{"key":"13_CR6","doi-asserted-by":"publisher","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.J. (eds.) CHES\u00a02004. LNCS, vol.\u00a03156, pp. 16\u201329. Springer, Berlin, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-28632-5_2","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"13_CR7","doi-asserted-by":"publisher","unstructured":"Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards sound approaches to counteract power-analysis attacks. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 398\u2013412. Springer, Berlin, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_26","DOI":"10.1007\/3-540-48405-1_26"},{"key":"13_CR8","doi-asserted-by":"publisher","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7etin Kaya., Paar, C. (eds.) CHES\u00a02002. LNCS, vol.\u00a02523, pp. 13\u201328. Springer, Berlin, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36400-5_3","DOI":"10.1007\/3-540-36400-5_3"},{"key":"13_CR9","doi-asserted-by":"publisher","unstructured":"Dobraunig, C., Eichlseder, M., Mendel, F., Schl\u00e4ffer, M.: Ascon v1.2: lightweight authenticated encryption and hashing. J. Cryptology 34(3), 33 (2021). https:\/\/doi.org\/10.1007\/s00145-021-09398-9","DOI":"10.1007\/s00145-021-09398-9"},{"key":"13_CR10","unstructured":"Goodwill, G., Jun, B., Jaffe, J., Rohatgi, P.: A testing methodology for side channel resistance validation. NIST non-invasive attack testing workshop (2011). https:\/\/csrc.nist.rip\/news_events\/non-invasive-attack-testing-workshop\/papers\/08_Goodwill.pdf"},{"key":"13_CR11","doi-asserted-by":"publisher","unstructured":"Goubin, L., Patarin, J.: DES and differential power analysis (the \u201cduplication\u201d method). In: Ko\u00e7, \u00c7etin Kaya., Paar, C. (eds.) CHES\u201999. LNCS, vol.\u00a01717, pp. 158\u2013172. Springer, Berlin, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48059-5_15","DOI":"10.1007\/3-540-48059-5_15"},{"key":"13_CR12","doi-asserted-by":"publisher","unstructured":"Joye, M., Paillier, P., Schoenmakers, B.: On second-order differential power analysis. In: Rao, J.R., Sunar, B. (eds.) CHES\u00a02005. LNCS, vol.\u00a03659, pp. 293\u2013308. Springer, Berlin, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11545262_22","DOI":"10.1007\/11545262_22"},{"key":"13_CR13","doi-asserted-by":"publisher","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Berlin, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_25","DOI":"10.1007\/3-540-48405-1_25"},{"key":"13_CR14","doi-asserted-by":"publisher","unstructured":"Luo, S., Wu, W., Li, Y., Zhang, R., Liu, Z.: An efficient soft analytical side-channel attack on ascon. Springer-Verlag, Berlin, Heidelberg (2022). https:\/\/doi.org\/10.1007\/978-3-031-19208-1_32","DOI":"10.1007\/978-3-031-19208-1_32"},{"key":"13_CR15","unstructured":"Maghrebi, H., Portigliatti, T., Prouff, E.: Breaking cryptographic implementations using deep learning techniques. Cryptology ePrint Archive, Report 2016\/921 (2016). https:\/\/eprint.iacr.org\/2016\/921"},{"key":"13_CR16","doi-asserted-by":"publisher","unstructured":"Messerges, T.S.: Using second-order power analysis to attack DPA resistant software. In: Ko\u00e7, \u00c7etin Kaya., Paar, C. (eds.) CHES\u00a02000. LNCS, vol.\u00a01965, pp. 238\u2013251. Springer, Berlin, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-44499-8_19","DOI":"10.1007\/3-540-44499-8_19"},{"key":"13_CR17","unstructured":"Prouff, E., Rivain, M., B\u00e9van, R.: Statistical analysis of second order differential power analysis. Cryptology ePrint Archive, Report 2010\/646 (2010). https:\/\/eprint.iacr.org\/2010\/646"},{"key":"13_CR18","unstructured":"Ramezanpour, K., Abdulgadir, A., Diehl, W., Kaps, J.P., , Ampadu, P.: Active and passive side-channel key recovery attacks on Ascon. NIST Lightweight Cryptography Workshop (2020). https:\/\/csrc.nist.gov\/CSRC\/media\/Events\/lightweight-cryptography-workshop-2020\/documents\/papers\/active-passive-recovery-attacks-ascon-lwc2020.pdf, https:\/\/csrc.nist.gov\/CSRC\/media\/Events\/lightweight-cryptography-workshop-2020\/documents\/papers\/active-passive-recovery-attacks-ascon-lwc2020.pdf"},{"key":"13_CR19","unstructured":"Rezaeezade, A., Basurto-Becerra, A., Weissbart, L., Perin, G.: One for all, all for ascon: ensemble-based deep learning side-channel analysis. Cryptology ePrint Archive, Report 2023\/1922 (2023). https:\/\/eprint.iacr.org\/2023\/1922"},{"key":"13_CR20","doi-asserted-by":"publisher","unstructured":"Roussel, N., Potin, O., Dutertre, J., Rigaud, J.: Security evaluation of a hybrid CMOS\/MRAM ascon hardware implementation. In: Design, Automation & Test in Europe Conference & Exhibition, DATE 2023, Antwerp, Belgium, April 17\u201319, 2023, pp.\u00a01\u20136. IEEE (2023). https:\/\/doi.org\/10.23919\/DATE56975.2023.10137126","DOI":"10.23919\/DATE56975.2023.10137126"},{"key":"13_CR21","doi-asserted-by":"publisher","unstructured":"Samwel, N., Daemen, J.: DPA on hardware implementations of Ascon and Keyak. In: CF 2017, Proceedings of the Computing Frontiers Conference, pp. 415\u2013424. Association for Computing Machinery, New York, NY, USA (2017). https:\/\/doi.org\/10.1145\/3075564.3079067","DOI":"10.1145\/3075564.3079067"},{"key":"13_CR22","doi-asserted-by":"publisher","unstructured":"Sinz, C.: Towards an optimal CNF encoding of boolean cardinality constraints. In: van Beek, P. (ed.) Principles and Practice of Constraint Programming - CP 2005, 11th International Conference, CP 2005, Sitges, Spain, October 1\u20135, 2005, Proceedings. Lecture Notes in Computer Science, vol.\u00a03709, pp. 827\u2013831. Springer (2005). https:\/\/doi.org\/10.1007\/11564751_73","DOI":"10.1007\/11564751_73"},{"key":"13_CR23","doi-asserted-by":"publisher","unstructured":"Standaert, F.X., et al.: The world is not enough: another look on second-order DPA. In: Abe, M. (ed.) ASIACRYPT\u00a02010. LNCS, vol.\u00a06477, pp. 112\u2013129. Springer, Berlin, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-17373-8_7","DOI":"10.1007\/978-3-642-17373-8_7"},{"key":"13_CR24","doi-asserted-by":"publisher","unstructured":"Veyrat-Charvillon, N., G\u00e9rard, B., Standaert, F.X.: Soft analytical side-channel attacks. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT\u00a02014, Part\u00a0I. LNCS, vol.\u00a08873, pp. 282\u2013296. Springer, Berlin, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45611-8_15","DOI":"10.1007\/978-3-662-45611-8_15"},{"key":"13_CR25","doi-asserted-by":"publisher","unstructured":"Waddle, J., Wagner, D.: Towards efficient second-order power analysis. In: Joye, M., Quisquater, J.J. (eds.) CHES\u00a02004. LNCS, vol.\u00a03156, pp. 1\u201315. Springer, Berlin, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-28632-5_1","DOI":"10.1007\/978-3-540-28632-5_1"},{"key":"13_CR26","unstructured":"Weissbart, L., Picek, S.: Lightweight but not easy: side-channel analysis of the ascon authenticated cipher on a 32-bit microcontroller. Cryptology ePrint Archive, Paper 2023\/1598 (2023). https:\/\/eprint.iacr.org\/2023\/1598"},{"key":"13_CR27","doi-asserted-by":"publisher","unstructured":"You, S.C., Kuhn, M.G., Sarkar, S., Hao, F.: Low trace-count template attacks on 32-bit implementations of ASCON AEAD. IACR TCHES 2023(4), 344\u2013366 (2023). https:\/\/doi.org\/10.46586\/tches.v2023.i4.344-366","DOI":"10.46586\/tches.v2023.i4.344-366"}],"container-title":["Lecture Notes in Computer Science","Constructive Approaches for Security Analysis and Design of Embedded Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-01405-4_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:24:39Z","timestamp":1760955879000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-01405-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,15]]},"ISBN":["9783032014047","9783032014054"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-01405-4_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,15]]},"assertion":[{"value":"15 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CASCADE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Constructive Approaches for Security Analysis and Design of Embedded Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Saint-Etienne","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cascade2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/cascade-conference.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}