{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T00:13:51Z","timestamp":1742948031996,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319489643"},{"type":"electronic","value":"9783319489650"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48965-0_1","type":"book-chapter","created":{"date-parts":[[2016,10,27]],"date-time":"2016-10-27T13:55:25Z","timestamp":1477576525000},"page":"3-18","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Linear Regression Attack with F-test: A New SCARE Technique for Secret Block Ciphers"],"prefix":"10.1007","author":[{"given":"Si","family":"Gao","sequence":"first","affiliation":[]},{"given":"Hua","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Wenling","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Limin","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Jingyi","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Xiangliang","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,28]]},"reference":[{"key":"1_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/11496137_27","volume-title":"Applied Cryptography and Network Security","author":"R Daudigny","year":"2005","unstructured":"Daudigny, R., Ledig, H., Muller, F., Valette, F.: SCARE of the DES. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 393\u2013406. Springer, Heidelberg (2005). doi:10.1007\/11496137_27"},{"key":"1_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-540-85893-5_16","volume-title":"Smart Card Research and Advanced Applications","author":"D R\u00e9al","year":"2008","unstructured":"R\u00e9al, D., Dubois, V., Guilloux, A.-M., Valette, F., Drissi, M.: SCARE of an unknown hardware Feistel implementation. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol. 5189, pp. 218\u2013227. Springer, Heidelberg (2008). doi:10.1007\/978-3-540-85893-5_16"},{"key":"1_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/978-3-642-14712-8_17","volume-title":"Progress in Cryptology \u2013 LATINCRYPT 2010","author":"S Guilley","year":"2010","unstructured":"Guilley, S., Sauvage, L., Micolod, J., R\u00e9al, D., Valette, F.: Defeating any secret cryptography with SCARE attacks. In: Abdalla, M., Barreto, P.S.L.M. (eds.) LATINCRYPT 2010. LNCS, vol. 6212, pp. 273\u2013293. Springer, Heidelberg (2010). doi:10.1007\/978-3-642-14712-8_17"},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-3-319-03515-4_8","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2013","author":"C Clavier","year":"2013","unstructured":"Clavier, C., Isorez, Q., Wurcker, A.: Complete SCARE of AES-Like block ciphers by chosen plaintext collision power analysis. In: Paul, G., Vaudenay, S. (eds.) INDOCRYPT 2013. LNCS, vol. 8250, pp. 116\u2013135. Springer, Heidelberg (2013). doi:10.1007\/978-3-319-03515-4_8"},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"526","DOI":"10.1007\/978-3-642-42033-7_27","volume-title":"Advances in Cryptology - ASIACRYPT 2013","author":"M Rivain","year":"2013","unstructured":"Rivain, M., Roche, T.: SCARE of secret ciphers with SPN structures. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013. LNCS, vol. 8269, pp. 526\u2013544. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-42033-7_27"},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-540-77086-2_11","volume-title":"Information Systems Security","author":"C Clavier","year":"2007","unstructured":"Clavier, C.: An improved SCARE cryptanalysis against a secret A3\/A8 GSM algorithm. In: McDaniel, P., Gupta, S.K. (eds.) ICISS 2007. LNCS, vol. 4812, pp. 143\u2013155. Springer, Heidelberg (2007). doi:10.1007\/978-3-540-77086-2_11"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/978-3-540-45203-4_24","volume-title":"Applied Cryptography and Network Security","author":"R Novak","year":"2003","unstructured":"Novak, R.: Side-channel attack on substitution blocks. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol. 2846, pp. 307\u2013318. Springer, Heidelberg (2003). doi:10.1007\/978-3-540-45203-4_24"},{"issue":"2","key":"1_CR8","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/s13389-011-0010-2","volume":"1","author":"J Doget","year":"2011","unstructured":"Doget, J., Prouff, E., Rivain, M., Standaert, F.X.: Univariate side channel attacks and leakage modeling. J. Crypt. Eng. 1(2), 123\u2013144 (2011)","journal-title":"J. Crypt. Eng."},{"key":"1_CR9","unstructured":"Bhasin, S., Danger, J.L., Guilley, S., Najm, Z.: NICV: normalized inter-class variance for detection of side-channel leakage. In: 2014 International Symposium on Electromagnetic Compatibility, Tokyo (EMC 2014\/Tokyo), pp. 310\u2013313 (2014)"},{"key":"1_CR10","unstructured":"Wiki: Coefficient of determination. http:\/\/en.wikipedia.org\/wiki\/Coefficient_of_determination"},{"key":"1_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-36400-5_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S Chari","year":"2003","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski, B.S., Ko\u00e7, K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13\u201328. Springer, Heidelberg (2003). doi:10.1007\/3-540-36400-5_3"},{"issue":"1","key":"1_CR12","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/s13389-013-0051-9","volume":"3","author":"B G\u00e9rard","year":"2013","unstructured":"G\u00e9rard, B., Standaert, F.X.: Unified and optimized linear collision attacks and their application in a non-profiled setting: extended version. J. Crypt. Eng. 3(1), 45\u201358 (2013)","journal-title":"J. Crypt. Eng."},{"key":"1_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/11545262_3","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"W Schindler","year":"2005","unstructured":"Schindler, W., Lemke, K., Paar, C.: A stochastic model for differential side channel cryptanalysis. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 30\u201346. Springer, Heidelberg (2005). doi:10.1007\/11545262_3"},{"key":"1_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-319-04852-9_10","volume-title":"Topics in Cryptology \u2013 CT-RSA 2014","author":"C Whitnall","year":"2014","unstructured":"Whitnall, C., Oswald, E., Standaert, F.-X.: The myth of generic DPA$$\\ldots $$and the magic of learning. In: Benaloh, J. (ed.) CT-RSA 2014. LNCS, vol. 8366, pp. 183\u2013205. Springer, Heidelberg (2014). doi:10.1007\/978-3-319-04852-9_10"},{"key":"1_CR15","volume-title":"Understanding Regression Analysis","author":"MP Allen","year":"1997","unstructured":"Allen, M.P.: Understanding Regression Analysis. Springer Science & Business Media, New York (1997)"},{"issue":"4","key":"1_CR16","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/S0195-6698(85)80045-7","volume":"6","author":"P Frankl","year":"1985","unstructured":"Frankl, P., R\u00f6dl, V.: Near perfect coverings in graphs and hypergraphs. Eur. J. Comb. 6(4), 317\u2013326 (1985)","journal-title":"Eur. J. Comb."},{"key":"1_CR17","unstructured":"Gordon, D.: La Jolla Covering Repository. https:\/\/www.ccrwest.org\/cover.html"}],"container-title":["Lecture Notes in Computer Science","Cryptology and Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48965-0_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,11]],"date-time":"2024-03-11T15:18:43Z","timestamp":1710170323000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-48965-0_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319489643","9783319489650"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48965-0_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"28 October 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CANS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Milan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 November 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 November 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cans2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cans2016.di.unimi.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}