{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T00:34:04Z","timestamp":1761006844419,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032014047","type":"print"},{"value":"9783032014054","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-01405-4_4","type":"book-chapter","created":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:24:30Z","timestamp":1760955870000},"page":"67-92","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Message-Recovery Horizontal Correlation Attack on\u00a0Classic McEliece"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6028-3028","authenticated-orcid":false,"given":"Brice","family":"Colombier","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3874-7527","authenticated-orcid":false,"given":"Vincent","family":"Grosso","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6708-868X","authenticated-orcid":false,"given":"Pierre-Louis","family":"Cayrel","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8673-9097","authenticated-orcid":false,"given":"Vlad-Florin","family":"Dr\u0103goi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,15]]},"reference":[{"key":"4_CR1","unstructured":"Albrecht, M.R., et al.: Classic McEliece: conservative code-based cryptography: cryptosystem specification. Technical report, National Institute of Standards and Technology (2022)"},{"issue":"4","key":"4_CR2","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/s13389-011-0024-9","volume":"1","author":"R Avanzi","year":"2011","unstructured":"Avanzi, R., Hoerder, S., Page, D., Tunstall, M.: Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems. J. Cryptogr. Eng. 1(4), 271\u2013281 (2011)","journal-title":"J. Cryptogr. Eng."},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Aydin, F., Aysu, A., Tiwari, M., Gerstlauer, A., Orshansky, M.: Horizontal side-channel vulnerabilities of post-quantum key exchange and encapsulation protocols. ACM Trans. Embed. Comput. Syst. 20(6), 110:1\u2013110:22 (2021)","DOI":"10.1145\/3476799"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Aysu, A., Tobah, Y., Tiwari, M., Gerstlauer, A., Orshansky, M.: Horizontal side-channel vulnerabilities of post-quantum key exchange protocols. In: IEEE International Symposium on Hardware Oriented Security and Trust, pp. 81\u201388. IEEE Computer Society, Washington (2018)","DOI":"10.1109\/HST.2018.8383894"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"520","DOI":"10.1007\/978-3-642-29011-4_31","volume-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"A Becker","year":"2012","unstructured":"Becker, A., Joux, A., May, A., Meurer, A.: Decoding random binary linear codes in $$2^{n\/20}$$: How 1 + 1 = 0 improves information set decoding. In: Pointcheval, D., Johansson, T. (eds.) Annual International Conference on the Theory and Applications of Cryptographic Techniques. Lecture Notes in Computer Science, vol. 7237, pp. 520\u2013536. Springer, Cambridge, UK (Apr (2012)"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Berlekamp, E.R., McEliece, R.J., van Tilborg, H.C.A.: On the inherent intractability of certain coding problems (corresp.). IEEE Trans. Inf. Theory 24(3), 384\u2013386 (1978)","DOI":"10.1109\/TIT.1978.1055873"},{"key":"4_CR7","doi-asserted-by":"publisher","unstructured":"Beullens, W., et al.: Post-quantum cryptography: current state and quantum mitigation. Publications Office of the European Union (2022). https:\/\/doi.org\/10.2824\/92307","DOI":"10.2824\/92307"},{"key":"4_CR8","unstructured":"Bhasin, S., Danger, J., Guilley, S., Najm, Z.: NICV: normalized inter-class variance for detection of side-channel leakage. IACR Cryptology ePrint Archive p.\u00a0717 (2013)"},{"issue":"2","key":"4_CR9","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/s13389-014-0070-1","volume":"4","author":"FP Biasi","year":"2014","unstructured":"Biasi, F.P., Barreto, P.S.L.M., Misoczki, R., Ruggiero, W.V.: Scaling efficient code-based cryptosystems for embedded platforms. J. Cryptogr. Eng. 4(2), 123\u2013134 (2014). https:\/\/doi.org\/10.1007\/s13389-014-0070-1","journal-title":"J. Cryptogr. Eng."},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"E Brier","year":"2004","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16\u201329. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-28632-5_2"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1007\/978-3-030-77886-6_15","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2021","author":"P-L Cayrel","year":"2021","unstructured":"Cayrel, P.-L., Colombier, B., Dr\u0103goi, V.-F., Menu, A., Bossuet, L.: Message-recovery laser fault injection attack on the Classic McEliece cryptosystem. In: Canteaut, A., Standaert, F.-X. (eds.) EUROCRYPT 2021. LNCS, vol. 12697, pp. 438\u2013467. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-77886-6_15"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Cayrel, P.L., Dusart, P.: McEliece\/Niederreiter PKC: sensitivity to fault injection. In: International Conference on Future Information Technology, Busan, South Korea (2010)","DOI":"10.1109\/FUTURETECH.2010.5482663"},{"issue":"6","key":"4_CR13","doi-asserted-by":"publisher","first-page":"1093","DOI":"10.1109\/TIFS.2015.2509944","volume":"11","author":"C Chen","year":"2016","unstructured":"Chen, C., Eisenbarth, T., Maurich, I., Steinwandt, R.: Horizontal and vertical side channel analysis of a McEliece cryptosystem. IEEE Trans. Inf. Forensics Secur. 11(6), 1093\u20131105 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"4_CR14","doi-asserted-by":"publisher","first-page":"125","DOI":"10.46586\/tches.v2021.i3.125-148","volume":"2021","author":"M Chen","year":"2021","unstructured":"Chen, M., Chou, T.: Classic McEliece on the ARM Cortex-M4. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3), 125\u2013148 (2021)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"issue":"3","key":"4_CR15","doi-asserted-by":"publisher","first-page":"71","DOI":"10.46586\/tches.v2022.i3.71-113","volume":"2022","author":"P Chen","year":"2022","unstructured":"Chen, P., et al.: Complete and improved FPGA implementation of Classic McEliece. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(3), 71\u2013113 (2022)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"4_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/978-3-642-17650-0_5","volume-title":"Information and Communications Security","author":"C Clavier","year":"2010","unstructured":"Clavier, C., Feix, B., Gagnerot, G., Roussellet, M., Verneuil, V.: Horizontal correlation analysis on exponentiation. In: Soriano, M., Qing, S., L\u00f3pez, J. (eds.) ICICS 2010. LNCS, vol. 6476, pp. 46\u201361. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-17650-0_5"},{"key":"4_CR17","doi-asserted-by":"publisher","first-page":"3407","DOI":"10.1109\/TIFS.2022.3198277","volume":"17","author":"B Colombier","year":"2022","unstructured":"Colombier, B., Dragoi, V.F., Cayrel, P.L., Grosso, V.: Profiled side-channel attack on cryptosystems based on the binary syndrome decoding problem. IEEE Trans. Inf. Forensics Secur. 17, 3407\u20133420 (2022). https:\/\/doi.org\/10.1109\/TIFS.2022.3198277","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4_CR18","unstructured":"Dumer, I.: On minimum distance decoding of linear codes. In: Joint Soviet-Swedish International Workshop on Information Theory, Moscow, Russia, pp. 50\u201352 (1991)"},{"key":"4_CR19","doi-asserted-by":"publisher","unstructured":"Grosso, V., Cayrel, P.L., Colombier, B., Dragoi, V.F.: Punctured syndrome decoding problem - efficient side-channel attacks against classic mceliece. In: Kavun, E.B., Pehl, M. (eds.) International Workshop on Constructive Side-Channel Analysis and Secure Design. Lecture Notes in Computer Science, vol. 13979, pp. 170\u2013192. Springer, Munich (2023). https:\/\/doi.org\/10.1007\/978-3-031-29497-6_9","DOI":"10.1007\/978-3-031-29497-6_9"},{"issue":"4","key":"4_CR20","doi-asserted-by":"publisher","first-page":"800","DOI":"10.46586\/tches.v2022.i4.800-827","volume":"2022","author":"Q Guo","year":"2022","unstructured":"Guo, Q., Johansson, A., Johansson, T.: A key-recovery side-channel attack on Classic McEliece implementations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4), 800\u2013827 (2022)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"4_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/978-3-642-12929-2_13","volume-title":"Post-Quantum Cryptography","author":"S Heyse","year":"2010","unstructured":"Heyse, S.: Low-reiter: niederreiter encryption scheme for embedded microcontrollers. In: Sendrier, N. (ed.) PQCrypto 2010. LNCS, vol. 6061, pp. 165\u2013181. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-12929-2_13"},{"key":"4_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-642-12929-2_9","volume-title":"Post-Quantum Cryptography","author":"S Heyse","year":"2010","unstructured":"Heyse, S., Moradi, A., Paar, C.: Practical power analysis attacks on software implementations of McEliece. In: Sendrier, N. (ed.) PQCrypto 2010. LNCS, vol. 6061, pp. 108\u2013125. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-12929-2_9"},{"key":"4_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_25"},{"key":"4_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"881","DOI":"10.1007\/978-3-030-64837-4_29","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2020","author":"N Lahr","year":"2020","unstructured":"Lahr, N., Niederhagen, R., Petri, R., Samardjiska, S.: Side channel information set decoding using iterative chunking. In: Moriai, S., Wang, H. (eds.) ASIACRYPT 2020. LNCS, vol. 12491, pp. 881\u2013910. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-64837-4_29"},{"key":"4_CR25","unstructured":"LaRacuente, N., Smith, K.N., Imany, P., Silverman, K.L., Chong, F.T.: Modeling short-range microwave networks to scale superconducting quantum computation (2023)"},{"issue":"9","key":"4_CR26","doi-asserted-by":"publisher","first-page":"1018","DOI":"10.1038\/s41567-021-01296-y","volume":"17","author":"MV Larsen","year":"2021","unstructured":"Larsen, M.V., Guo, X., Breum, C.R., Neergaard-Nielsen, J.S., Andersen, U.L.: Deterministic multi-mode gates on a scalable photonic quantum computing platform. Nat. Phys. 17(9), 1018\u20131023 (2021)","journal-title":"Nat. Phys."},{"key":"4_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/3-540-45961-8_25","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201988","author":"PJ Lee","year":"1988","unstructured":"Lee, P.J., Brickell, E.F.: An observation on the security of McEliece\u2019s public-key cryptosystem. In: Barstow, D., et al. (eds.) EUROCRYPT 1988. LNCS, vol. 330, pp. 275\u2013280. Springer, Heidelberg (1988). https:\/\/doi.org\/10.1007\/3-540-45961-8_25"},{"key":"4_CR28","doi-asserted-by":"crossref","unstructured":"May, A., Meurer, A., Thomae, E.: Decoding random linear codes in $$\\tilde \\cal{O}(2^{0.054n})$$. In: Lee, D.H., Wang, X. (eds.) International Conference on the Theory and Application of Cryptology and Information Security. Lecture Notes in Computer Science, vol.\u00a07073, pp. 107\u2013124. Springer, Seoul (2011)","DOI":"10.1007\/978-3-642-25385-0_6"},{"key":"4_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-3-662-46800-5_9","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2015","author":"A May","year":"2015","unstructured":"May, A., Ozerov, I.: On computing nearest neighbors with applications to decoding of binary linear codes. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9056, pp. 203\u2013228. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46800-5_9"},{"key":"4_CR30","unstructured":"McCann, D., Oswald, E., Whitnall, C.: Towards practical tools for side channel aware software engineering: \u2018grey box\u2019 modelling for instruction leakages. In: Kirda, E., Ristenpart, T. (eds.) USENIX Security Symposium, pp. 199\u2013216. USENIX Association, Vancouver (2017)"},{"key":"4_CR31","doi-asserted-by":"publisher","unstructured":"Molter, H.G., St\u00f6ttinger, M., Shoufan, A., Strenzke, F.: A simple power analysis attack on a mceliece cryptoprocessor. J. Cryptogr. Eng. 1(1), 29\u201336 (2011). https:\/\/doi.org\/10.1007\/s13389-011-0001-3","DOI":"10.1007\/s13389-011-0001-3"},{"issue":"2","key":"4_CR32","first-page":"159","volume":"15","author":"H Niederreiter","year":"1986","unstructured":"Niederreiter, H.: Knapsack-type cryptosystems and algebraic coding theory. Prob. Control Inf. Theory 15(2), 159\u2013166 (1986)","journal-title":"Prob. Control Inf. Theory"},{"key":"4_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-3-319-10175-0_17","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"C O\u2019Flynn","year":"2014","unstructured":"O\u2019Flynn, C., Chen, Z.D.: ChipWhisperer: an open-source platform for hardware embedded security research. In: Prouff, E. (ed.) COSADE 2014. LNCS, vol. 8622, pp. 243\u2013260. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10175-0_17"},{"issue":"1","key":"4_CR34","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.vlsi.2005.12.013","volume":"40","author":"E Peeters","year":"2007","unstructured":"Peeters, E., Standaert, F., Quisquater, J.: Power and electromagnetic analysis: improved model, consequences and comparisons. Integration 40(1), 52\u201360 (2007)","journal-title":"Integration"},{"issue":"5","key":"4_CR35","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/TIT.1962.1057777","volume":"8","author":"E Prange","year":"1962","unstructured":"Prange, E.: The use of information sets in decoding cyclic codes. IRE Trans. Inf. Theory 8(5), 5\u20139 (1962)","journal-title":"IRE Trans. Inf. Theory"},{"key":"4_CR36","doi-asserted-by":"publisher","first-page":"79","DOI":"10.22331\/q-2018-08-06-79","volume":"2","author":"J Preskill","year":"2018","unstructured":"Preskill, J.: Quantum computing in the nisq era and beyond. Quantum 2, 79 (2018)","journal-title":"Quantum"},{"key":"4_CR37","unstructured":"Ravi, P., Chattopadhyay, A., D\u2019Anvers, J.P., Baksi, A.: Side-channel and fault-injection attacks over lattice-based post-quantum schemes (kyber, dilithium): survey and new results. Cryptology ePrint Archive, Paper 2022\/737 (2022). https:\/\/eprint.iacr.org\/2022\/737"},{"key":"4_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-030-68487-7_3","volume-title":"Smart Card Research and Advanced Applications","author":"J Roth","year":"2021","unstructured":"Roth, J., Karatsiolis, E., Kr\u00e4mer, J.: Classic McEliece implementation with\u00a0low memory footprint. In: Liardet, P.-Y., Mentens, N. (eds.) CARDIS 2020. LNCS, vol. 12609, pp. 34\u201349. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-68487-7_3"},{"key":"4_CR39","doi-asserted-by":"publisher","unstructured":"Saarinen, M.J.O.: Wip: applicability of iso standard side-channel leakage tests to nist post-quantum cryptography. In: 2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 69\u201372 (2022). https:\/\/doi.org\/10.1109\/HOST54066.2022.9839849","DOI":"10.1109\/HOST54066.2022.9839849"},{"key":"4_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-642-14423-3_12","volume-title":"Information, Security and Cryptology \u2013 ICISC 2009","author":"A Shoufan","year":"2010","unstructured":"Shoufan, A., Strenzke, F., Molter, H.G., St\u00f6ttinger, M.: A timing attack against patterson algorithm in the McEliece PKC. In: Lee, D., Hong, S. (eds.) ICISC 2009. LNCS, vol. 5984, pp. 161\u2013175. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14423-3_12"},{"key":"4_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/BFb0019850","volume-title":"Coding Theory and Applications","author":"J Stern","year":"1989","unstructured":"Stern, J.: A method for finding codewords of small weight. In: Cohen, G., Wolfmann, J. (eds.) Coding Theory 1988. LNCS, vol. 388, pp. 106\u2013113. Springer, Heidelberg (1989). https:\/\/doi.org\/10.1007\/BFb0019850"},{"key":"4_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1007\/978-3-642-33383-5_8","volume-title":"Information Security","author":"F Strenzke","year":"2012","unstructured":"Strenzke, F.: Solutions for the storage problem of McEliece public and private keys on memory-constrained platforms. In: Gollmann, D., Freiling, F.C. (eds.) ISC 2012. LNCS, vol. 7483, pp. 120\u2013135. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33383-5_8"},{"key":"4_CR43","doi-asserted-by":"publisher","unstructured":"Sundaresan, N., Lauer, I., Pritchett, E., Magesan, E., Jurcevic, P., Gambetta, J.M.: Reducing unitary and spectator errors in cross resonance with optimized rotary echoes. PRX Quant. 1(2) (2020). https:\/\/doi.org\/10.1103\/prxquantum.1.020318","DOI":"10.1103\/prxquantum.1.020318"},{"issue":"6","key":"4_CR44","doi-asserted-by":"publisher","DOI":"10.1063\/1.5100160","volume":"4","author":"S Takeda","year":"2019","unstructured":"Takeda, S., Furusawa, A.: Toward large-scale fault-tolerant universal photonic quantum computing. APL Photon. 4(6), 060902 (2019)","journal-title":"APL Photon."},{"key":"4_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/3-540-44709-1_24","volume-title":"Cryptographic Hardware and Embedded Systems \u2014 CHES 2001","author":"CD Walter","year":"2001","unstructured":"Walter, C.D.: Sliding windows succumbs to big mac attack. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 286\u2013299. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44709-1_24"}],"container-title":["Lecture Notes in Computer Science","Constructive Approaches for Security Analysis and Design of Embedded Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-01405-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:24:36Z","timestamp":1760955876000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-01405-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,15]]},"ISBN":["9783032014047","9783032014054"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-01405-4_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,15]]},"assertion":[{"value":"15 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CASCADE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Constructive Approaches for Security Analysis and Design of Embedded Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Saint-Etienne","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cascade2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/cascade-conference.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}