{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T03:10:22Z","timestamp":1775099422166,"version":"3.50.1"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319259147","type":"print"},{"value":"9783319259154","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25915-4_19","type":"book-chapter","created":{"date-parts":[[2015,12,29]],"date-time":"2015-12-29T04:43:45Z","timestamp":1451364225000},"page":"363-379","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Differential Power Analysis of HMAC SHA-1 and HMAC SHA-2 in the Hamming Weight Model"],"prefix":"10.1007","author":[{"given":"Sonia","family":"Bela\u00efd","sequence":"first","affiliation":[]},{"given":"Luk","family":"Bettale","sequence":"additional","affiliation":[]},{"given":"Emmanuelle","family":"Dottax","sequence":"additional","affiliation":[]},{"given":"Laurie","family":"Genelle","sequence":"additional","affiliation":[]},{"given":"Franck","family":"Rondepierre","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,30]]},"reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Arkko, J., Haverinen, H.: RFC 4187: Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA) (2006)","DOI":"10.17487\/rfc4187"},{"key":"19_CR2","first-page":"230","volume-title":"SECRYPT, SECRYPT is Part of ICETE - The International Joint Conference on e-Business and Telecommunications","author":"S Bela\u00efd","year":"2013","unstructured":"Bela\u00efd, S., Bettale, L., Dottax, E., Genelle, L., Rondepierre, F.: Differential power analysis of HMAC SHA-2 in the Hamming weight model. In: Samarati, P. (ed.) SECRYPT, SECRYPT is Part of ICETE - The International Joint Conference on e-Business and Telecommunications, pp. 230\u2013241. SciTePress, USA (2013)"},{"key":"19_CR3","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Advances in Cryptology - CRYPTO 1996","author":"M Bellare","year":"1996","unstructured":"Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1\u201315. Springer, Heidelberg (1996)"},{"key":"19_CR4","unstructured":"Bertoni, G., Daemen, J., Debande, N., Le, T.H., Peeters, M., Van Assche, G.: Power Analysis of Hardware Implementations Protected with Secret Sharing. IACR Cryptology ePrint Archive Report 2013\/67 (2013). \n                    http:\/\/eprint.iacr.org\/2013\/67\n                    \n                  . A preliminary version appeared at MICROW\u201912 [5]"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Bertoni, G., Daemen, J., Debande, N., Le, T. H., Peeters, M., Van Assche, G.: Power analysis of hardware implementations protected with secret sharing. In: 45th Annual IEEE\/ACM International Symposium on Microarchitecture Workshops (MICROW), pp. 9\u201316. IEEE Computer Society (2012)","DOI":"10.1109\/MICROW.2012.12"},{"key":"19_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/978-3-319-10175-0_10","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"L Bettale","year":"2014","unstructured":"Bettale, L., Dottax, E., Genelle, L., Piret, G.: Collision-correlation attack against a first-order masking scheme for MAC based on SHA-3. In: Prouff, E. (ed.) COSADE 2014. LNCS, vol. 8622, pp. 129\u2013143. Springer, Heidelberg (2014)"},{"key":"19_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-36400-5_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S Chari","year":"2002","unstructured":"Chari, S., Rao, J., Rohatgi, P.: Template attacks. In: Kaliski Jr., B., Ko\u00e7, \u00c7., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2002. LNCS, vol. 2523, pp. 13\u201329. Springer, Heidelberg (2002)"},{"key":"19_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1007\/0-387-34805-0_39","volume-title":"Advances in Cryptology - CRYPTO 1989","author":"IB Damg\u00e5rd","year":"1990","unstructured":"Damg\u00e5rd, I.B.: A design principle for hash functions. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 416\u2013427. Springer, Heidelberg (1990)"},{"key":"19_CR9","unstructured":"FIPS 198\u20131: The Keyed-Hash Message Authentication Code (HMAC). National Institute of Standards and Technology, July 2008"},{"key":"19_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/978-3-642-04138-9_6","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"P-A Fouque","year":"2009","unstructured":"Fouque, P.-A., Leurent, G., R\u00e9al, D., Valette, F.: Practical electromagnetic template attack on HMAC. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 66\u201380. Springer, Heidelberg (2009)"},{"key":"19_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/978-3-540-77026-8_31","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2007","author":"P Gauravaram","year":"2007","unstructured":"Gauravaram, P., Okeya, K.: An update on the side channel cryptanalysis of MACs based on cryptographic hash functions. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol. 4859, pp. 393\u2013403. Springer, Heidelberg (2007)"},{"key":"19_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-540-88625-9_8","volume-title":"Information and Communications Security","author":"P Gauravaram","year":"2008","unstructured":"Gauravaram, P., Okeya, K.: Side channel analysis of some hash based MACs: a response to SHA-3 requirements. In: Chen, L., Ryan, M.D., Wang, G. (eds.) ICICS 2008. LNCS, vol. 5308, pp. 111\u2013127. Springer, Heidelberg (2008)"},{"issue":"2","key":"19_CR13","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1109\/TCSI.2006.885974","volume":"54","author":"JD Goli\u0107","year":"2007","unstructured":"Goli\u0107, J.D.: Techniques for random masking in hardware. IEEE Trans. Circ. Syst. I 54(2), 291\u2013300 (2007)","journal-title":"IEEE Trans. Circ. Syst. I"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Haverinen, H., Salowey, J.: RFC 4186: Extensible Authentication Protocol Method for Global System for Mobile Communications (GSM) Subscriber Identity Modules (EAP-SIM) (2006)","DOI":"10.17487\/rfc4186"},{"key":"19_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO 1999","author":"PC Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"19_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/978-3-540-28632-5_15","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"K Lemke","year":"2004","unstructured":"Lemke, K., Schramm, K., Paar, C.: DPA on n-bit sized Boolean and arithmetic operations and its application to IDEA, RC6, and the HMAC-Construction. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 205\u2013219. Springer, Heidelberg (2004)"},{"key":"19_CR17","volume-title":"Power Analysis Attacks - Revealing the Secrets of Smartcards","author":"S Mangard","year":"2007","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks - Revealing the Secrets of Smartcards. Springer, US (2007)"},{"key":"19_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/978-3-540-77535-5_23","volume-title":"Information Security Applications","author":"R McEvoy","year":"2008","unstructured":"McEvoy, R., Tunstall, M., Murphy, C.C., Marnane, W.P.: Differential power analysis of HMAC based on SHA-2, and countermeasures. In: Kim, S., Yung, M., Lee, H.-W. (eds.) WISA 2007. LNCS, vol. 4867, pp. 317\u2013332. Springer, Heidelberg (2008)"},{"key":"19_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology - CRYPTO 1989","author":"RC Merkle","year":"1990","unstructured":"Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218\u2013238. Springer, Heidelberg (1990)"},{"key":"19_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/3-540-44499-8_19","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2000","author":"TS Messerges","year":"2000","unstructured":"Messerges, T.S.: Using second-order power analysis to attack DPA resistant software. In: Paar, C., Ko\u00e7, \u00c7.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 238\u2013251. Springer, Heidelberg (2000)"},{"key":"19_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1007\/11780656_36","volume-title":"Information Security and Privacy","author":"K Okeya","year":"2006","unstructured":"Okeya, K.: Side channel attacks against HMACs based on block-cipher based hash functions. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 432\u2013443. Springer, Heidelberg (2006)"},{"key":"19_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-642-04138-9_13","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"M Rivain","year":"2009","unstructured":"Rivain, M., Prouff, E., Doget, J.: Higher-order masking and shuffling for software implementations of block ciphers. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 171\u2013188. Springer, Heidelberg (2009)"},{"key":"19_CR23","doi-asserted-by":"crossref","unstructured":"Taha, M., Schaumont, P.: Side-channel analysis of MAC-Keccak. In: IEEE International Symposium on Hardware-Oriented Security and Trust - HOST 2013. IEEE Computer Society (2013)","DOI":"10.1109\/HST.2013.6581577"},{"key":"19_CR24","doi-asserted-by":"crossref","unstructured":"Zhang, F., Shi, Z. J.: Differential and correlation power analysis attacks on HMAC-Whirlpool. In: ITNG 2011, pp. 359\u2013365. IEEE Computer Society (2011)","DOI":"10.1109\/ITNG.2011.70"},{"key":"19_CR25","first-page":"1012","volume-title":"Design, Automation & Test in Europe Conference & Exhibition, DATE 2012","author":"M Zohner","year":"2012","unstructured":"Zohner, M., Kasper, M., St\u00f6ttinger, M., Huss, S.A.: Side channel analysis of the SHA-3 finalists. In: Rosenstiel, W., Thiele, L. (eds.) Design, Automation & Test in Europe Conference & Exhibition, DATE 2012, pp. 1012\u20131017. IEEE Computer Society, USA (2012)"}],"container-title":["Communications in Computer and Information Science","E-Business and Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25915-4_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T02:49:47Z","timestamp":1559357387000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25915-4_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319259147","9783319259154"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25915-4_19","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"30 December 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}