{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T04:11:00Z","timestamp":1748664660098,"version":"3.41.0"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319241258"},{"type":"electronic","value":"9783319241265"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24126-5_13","type":"book-chapter","created":{"date-parts":[[2015,9,24]],"date-time":"2015-09-24T08:09:59Z","timestamp":1443082199000},"page":"210-227","source":"Crossref","is-referenced-by-count":14,"title":["Modified Transparency Order Property: Solution or Just Another Attempt"],"prefix":"10.1007","author":[{"given":"Stjepan","family":"Picek","sequence":"first","affiliation":[]},{"given":"Bodhisatwa","family":"Mazumdar","sequence":"additional","affiliation":[]},{"given":"Debdeep","family":"Mukhopadhyay","sequence":"additional","affiliation":[]},{"given":"Lejla","family":"Batina","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,13]]},"reference":[{"key":"13_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/3-540-38424-3_1","volume-title":"Advances in Cryptology - CRYPTO \u201990","author":"E. Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystems. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol.\u00a0537, pp. 2\u201321. Springer, Heidelberg (1991)"},{"key":"13_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/3-540-47555-9_7","volume-title":"Advances in Cryptology - EUROCRYPT \u201992","author":"M. Matsui","year":"1993","unstructured":"Matsui, M., Yamagishi, A.: A new method for known plaintext attack of FEAL cipher. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol.\u00a0658, pp. 81\u201391. Springer, Heidelberg (1993)"},{"key":"13_CR3","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security). Springer-Verlag New York, Inc (2007)"},{"key":"13_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-540-73074-3_13","volume-title":"Arithmetic of Finite Fields","author":"G. Leander","year":"2007","unstructured":"Leander, G., Poschmann, A.: On the Classification of 4 Bit S-Boxes. In: Carlet, C., Sunar, B. (eds.) WAIFI 2007. LNCS, vol.\u00a04547, pp. 159\u2013176. Springer, Heidelberg (2007)"},{"key":"13_CR5","volume-title":"Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)","author":"S. Mangard","year":"2007","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security). Springer-Verlag New York, Inc., Secaucus (2007)"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Guilley, S., Pacalet, R.: Differential Power Analysis Model and Some Results. In: Proceedings of CARDIS, pp. 127\u2013142. Kluwer Academic Publishers (2004)","DOI":"10.1007\/1-4020-8147-2_9"},{"key":"13_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1007\/11502760_29","volume-title":"Fast Software Encryption","author":"E. Prouff","year":"2005","unstructured":"Prouff, E.: DPA Attacks and S-Boxes. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol.\u00a03557, pp. 424\u2013441. Springer, Heidelberg (2005)"},{"key":"13_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P. Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"13_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/978-3-642-33027-8_14","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2012","author":"Y. Fei","year":"2012","unstructured":"Fei, Y., Luo, Q., Ding, A.A.: A statistical model for dpa with novel algorithmic confusion analysis. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol.\u00a07428, pp. 233\u2013250. Springer, Heidelberg (2012)"},{"key":"13_CR10","unstructured":"Fei, Y., Ding, A.A., Lao, J., Zhang, L.: A statistics-based fundamental model for side-channel attack analysis. IACR Cryptology ePrint Archive 2014, 152 (2014)"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Luo, Q., Fei, Y.: Algorithmic collision analysis for evaluating cryptographic systems and side-channel attacks. In: 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 75\u201380 (2011)","DOI":"10.1109\/HST.2011.5955000"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Ding, A.A., Zhang, L., Fei, Y., Luo, P.: A statistical model for higher order dpa on masked devices. IACR Cryptology ePrint Archive 2014, 433 (2014)","DOI":"10.1007\/978-3-662-44709-3_9"},{"key":"13_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"A. Bogdanov","year":"2007","unstructured":"Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J., Seurin, Y., Vikkelsoe, C.: PRESENT: An Ultra-Lightweight Block Cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 450\u2013466. Springer, Heidelberg (2007)"},{"key":"13_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-642-34961-4_14","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2012","author":"J. Borghoff","year":"2012","unstructured":"Borghoff, J., Canteaut, A., Gneysu, T., Kavun, E., Knezevic, M., Knudsen, L., Leander, G., Nikov, V., Paar, C., Rechberger, C., Rombouts, P., Thomsen, S., Yaln, T.: PRINCE: A Low-Latency Block Cipher for Pervasive Computing Applications. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol.\u00a07658, pp. 208\u2013225. Springer, Heidelberg (2012)"},{"key":"13_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael","author":"J. Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael. Springer-Verlag New York, Inc., Secaucus (2002)"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Daemen, J., Peeters, M., Assche, G.V., Rijmen, V.: Nessie proposal: the block cipher Noekeon. Nessie submission (2000), http:\/\/gro.noekeon.org\/","DOI":"10.1007\/10721064_26"},{"key":"13_CR17","unstructured":"Chakraborty, K., Sarkar, S., Maitra, S., Mazumdar, B., Mukhopadhyay, D., Prouff, E.: Redefining the transparency order. In: Coding and Cryptography, International Workshop, WCC 2015, Paris, France, April 13-17 (2015)"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Mazumdar, B., Mukhopadhyay, D., Sengupta, I.: Design and implementation of rotation symmetric S-boxes with high nonlinearity and high DPA resilience. In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 87\u201392 (2013)","DOI":"10.1109\/HST.2013.6581571"},{"issue":"12","key":"13_CR19","doi-asserted-by":"publisher","first-page":"2154","DOI":"10.1109\/TIFS.2013.2285522","volume":"8","author":"B. Mazumdar","year":"2013","unstructured":"Mazumdar, B., Mukhopadhyay, D., Sengupta, I.: Constrained search for a class of good bijective s-boxes with improved DPA resistivity. IEEE Transactions on Information Forensics and Security\u00a08(12), 2154\u20132163 (2013)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"13_CR20","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1145\/2556315.2556319","volume-title":"Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2 2014","author":"S. Picek","year":"2014","unstructured":"Picek, S., Ege, B., Batina, L., Jakobovic, D., Chmielewski, L., Golub, M.: On Using Genetic Algorithms for Intrinsic Side-channel Resistance: The Case of AES S-box. In: Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2 2014, pp. 13\u201318. ACM, New York (2014)"},{"key":"13_CR21","doi-asserted-by":"crossref","unstructured":"Picek, S., Ege, B., Papagiannopoulos, K., Batina, L., Jakobovic, D.: Optimality and beyond: The case of 4x4 s-boxes. In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014, Arlington, VA, USA, May 6-7, pp. 80\u201383 (2014)","DOI":"10.1109\/HST.2014.6855573"},{"key":"13_CR22","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"374","DOI":"10.1007\/978-3-319-13039-2_22","volume-title":"INDOCRYPT 2014","author":"S. Picek","year":"2014","unstructured":"Picek, S., Papagiannopoulos, K., Ege, B., Batina, L., Jakobovic, D.: Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes. In: INDOCRYPT 2014. LNCS, vol.\u00a08885, pp. 374\u2013390. Springer, Heidelberg (2014)"},{"key":"13_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1007\/978-3-319-09843-2_12","volume-title":"Advances in Information and Computer Security","author":"M.A. Evci","year":"2014","unstructured":"Evci, M.A., Kavut, S.: DPA Resilience of Rotation-Symmetric S-boxes. In: Yoshida, M., Mouri, K. (eds.) IWSEC 2014. LNCS, vol.\u00a08639, pp. 146\u2013157. Springer, Heidelberg (2014)"},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"Nguyen, C., Tran, L., Nguyen, K.: On the resistance of serpent-type 4 bit s-boxes against differential power attacks. In: 2014 IEEE Fifth International Conference on Communications and Electronics (ICCE), pp. 542\u2013547 (July 2014)","DOI":"10.1109\/CCE.2014.6916761"},{"key":"13_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-25286-0_1","volume-title":"RFID. Security and Privacy","author":"Z. Gong","year":"2012","unstructured":"Gong, Z., Nikova, S., Law, Y.: A new family of lightweight block ciphers. In: Juels, A., Paar, C. (eds.) RFIDSec 2011. LNCS, vol.\u00a07055, pp. 1\u201318. Springer, Heidelberg (2012)"},{"key":"13_CR26","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511780448","volume-title":"Boolean Models and Methods in Mathematics, Computer Science, and Engineering","author":"Y. Crama","year":"2010","unstructured":"Crama, Y., Hammer, P.L.: Boolean Models and Methods in Mathematics, Computer Science, and Engineering, vol.\u00a01. Cambridge University Press, New York (2010)"},{"key":"13_CR27","unstructured":"Braeken, A.: Cryptographic Properties of Boolean Functions and S-Boxes. PhD thesis, Katholieke Universiteit Leuven (2006)"},{"key":"13_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/11596219_5","volume-title":"Progress in Cryptology - INDOCRYPT 2005","author":"C. Carlet","year":"2005","unstructured":"Carlet, C.: On highly nonlinear S-boxes and their inability to thwart DPA attacks. In: Maitra, S., Veni Madhavan, C.E., Venkatesan, R. (eds.) INDOCRYPT 2005. LNCS, vol.\u00a03797, pp. 49\u201362. Springer, Heidelberg (2005)"},{"key":"13_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1007\/3-540-46416-6_32","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"K. Nyberg","year":"1991","unstructured":"Nyberg, K.: Perfect Nonlinear S-Boxes. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 378\u2013386. Springer, Heidelberg (1991)"},{"key":"13_CR30","doi-asserted-by":"crossref","unstructured":"Heuser, A., Rioul, O., Guilley, S.: A theoretical study of kolmogorov-smirnov distinguishers - side-channel analysis vs. differential cryptanalysis. In: Constructive Side-Channel Analysis and Secure Design - 5th International Workshop, COSADE 2014, Paris, France, April 13-15, pp. 9\u201328 (2014) (Revised Selected Papers)","DOI":"10.1007\/978-3-319-10175-0_2"},{"key":"13_CR31","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1145\/2556315.2556319","volume-title":"Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2 2014","author":"S. Picek","year":"2014","unstructured":"Picek, S., Ege, B., Batina, L., Jakobovic, D., Chmielewski, L., Golub, M.: On Using Genetic Algorithms for Intrinsic Side-channel Resistance: The Case of AES S-box. In: Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2 2014, pp. 13\u201318. ACM, New York (2014)"},{"key":"13_CR32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-05094-1","volume-title":"Introduction to Evolutionary Computing","author":"A.E. Eiben","year":"2003","unstructured":"Eiben, A.E., Smith, J.E.: Introduction to Evolutionary Computing. Springer, Heidelberg (2003)"},{"key":"13_CR33","unstructured":"Goldberg, D.E., Lingle, R.: Alleles, loci, and the traveling salesman problem. In: Proc. of the International Conference on Genetic Algorithms and their Applications, Pittsburgh, PA, pp. 154\u2013159 (1985)"},{"key":"13_CR34","unstructured":"Davis, L.: Applying adaptive algorithms to epistatic domains. In: Proceedings of the 9th International Joint Conference on Artificial Intelligence, IJCAI 1985, pp. 162\u2013164. Morgan Kaufmann Publishers Inc., San Francisco (1985)"},{"issue":"5","key":"13_CR35","first-page":"316","volume":"1","author":"X. Zhang","year":"1995","unstructured":"Zhang, X., Zheng, Y.: GAC-the criterion of global avalanche characteristics of cryptographic functions. Journal of Universal Computer Science\u00a01(5), 316\u2013333 (1995)","journal-title":"Journal of Universal Computer Science"},{"key":"13_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/978-3-642-01001-9_26","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"F.X. Standaert","year":"2009","unstructured":"Standaert, F.X., Malkin, T.G., Yung, M.: A unified framework for the analysis of side-channel key recovery attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol.\u00a05479, pp. 443\u2013461. Springer, Heidelberg (2009)"},{"key":"13_CR37","unstructured":"Kim, Y., Sugawara, T., Homma, N., Aoki, T., Satoh, A.: Biasing power traces to improve correlation in power analysis attacks. In: First International Workshop on Constructive Side-Channel Analysis and Secure Design COSADE 2010, pp. 77\u201380 (2010)"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Applied Cryptography Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24126-5_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T19:54:50Z","timestamp":1748634890000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24126-5_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319241258","9783319241265"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24126-5_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}