{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T08:20:00Z","timestamp":1769242800891,"version":"3.49.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319494449","type":"print"},{"value":"9783319494456","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49445-6_10","type":"book-chapter","created":{"date-parts":[[2016,11,17]],"date-time":"2016-11-17T07:50:31Z","timestamp":1479369031000},"page":"179-193","source":"Crossref","is-referenced-by-count":5,"title":["Decomposed S-Boxes and DPA Attacks: A Quantitative Case Study Using PRINCE"],"prefix":"10.1007","author":[{"given":"Ravikumar","family":"Selvam","sequence":"first","affiliation":[]},{"given":"Dillibabu","family":"Shanmugam","sequence":"additional","affiliation":[]},{"given":"Suganya","family":"Annadurai","sequence":"additional","affiliation":[]},{"given":"Jothi","family":"Rangasamy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,18]]},"reference":[{"key":"10_CR1","unstructured":"Bilgin, B.: Threshold Implementations: As Countermeasure Against Higher-Order Differential Power Analysis. Ph.D. thesis, KU Leuven and UTwente (2015). Pieter Hartel and Vincent Rijmen (promotors)"},{"key":"10_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-642-34961-4_14","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2012","author":"J Borghoff","year":"2012","unstructured":"Borghoff, J., Canteaut, A., G\u00fcneysu, T., Kavun, E.B., Knezevic, M., Knudsen, L.R., Leander, G., Nikov, V., Paar, C., Rechberger, C., Rombouts, P., Thomsen, S.S., Yal\u00e7\u0131n, T.: PRINCE \u2013 a low-latency block cipher for pervasive computing applications. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 208\u2013225. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-34961-4_14"},{"key":"10_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/11596219_5","volume-title":"Progress in Cryptology - INDOCRYPT 2005","author":"C Carlet","year":"2005","unstructured":"Carlet, C.: On highly nonlinear S-boxes and their inability to thwart DPA attacks. In: Maitra, S., Veni Madhavan, C.E., Venkatesan, R. (eds.) INDOCRYPT 2005. LNCS, vol. 3797, pp. 49\u201362. Springer, Heidelberg (2005). doi: 10.1007\/11596219_5"},{"key":"10_CR4","unstructured":"Chakraborty, K., Sarkar, S., Maitra, S., Mazumdar, B., Mukhopadhyay, D., Prouff, E.: Redefining the transparency order. In: WCC2015 - 9th International Workshop on Coding and Crypography 2015 (2015)"},{"key":"10_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2014 CRYPTO 1999","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999). doi: 10.1007\/3-540-48405-1_25"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-642-40026-1_7","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"S Kutzner","year":"2013","unstructured":"Kutzner, S., Nguyen, P.H., Poschmann, A., Wang, H.: On 3-share threshold implementations for 4-bit S-boxes. In: Prouff, E. (ed.) COSADE 2013. LNCS, vol. 7864, pp. 99\u2013113. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-40026-1_7"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-540-73074-3_13","volume-title":"Arithmetic of Finite Fields","author":"G Leander","year":"2007","unstructured":"Leander, G., Poschmann, A.: On the classification of 4 bit S-boxes. In: Carlet, C., Sunar, B. (eds.) WAIFI 2007. LNCS, vol. 4547, pp. 159\u2013176. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-73074-3_13"},{"issue":"12","key":"10_CR8","doi-asserted-by":"crossref","first-page":"2154","DOI":"10.1109\/TIFS.2013.2285522","volume":"8","author":"B Mazumdar","year":"2013","unstructured":"Mazumdar, B., Mukhopadhyay, D., Sengupta, I.: Constrained search for a class of good bijective S-boxes with improved DPA resistivity. IEEE Trans. Inf. Forensics Secur. 8(12), 2154\u20132163 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Mazumdar, B., Mukhopadhyay, D., Sengupta, I.: Design and implementation of rotation symmetric S-boxes with high nonlinearity and high DPA resilience. In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013, pp. 87\u201392. IEEE Computer Society (2013)","DOI":"10.1109\/HST.2013.6581571"},{"key":"10_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-642-00730-9_14","volume-title":"Information Security and Cryptology \u2013 ICISC 2008","author":"S Nikova","year":"2009","unstructured":"Nikova, S., Rijmen, V., Schl\u00e4ffer, M.: Secure hardware implementation of non-linear functions in the presence of glitches. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 218\u2013234. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-00730-9_14"},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1007\/11935308_38","volume-title":"Information and Communications Security","author":"S Nikova","year":"2006","unstructured":"Nikova, S., Rechberger, C., Rijmen, V.: Threshold implementations against side-channel attacks and glitches. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 529\u2013545. Springer, Heidelberg (2006). doi: 10.1007\/11935308_38"},{"key":"10_CR12","unstructured":"Petkova-Nikova, S.: TI Tools for the 3 x 3 and 4 x 4 S-boxes. http:\/\/homes.esat.kuleuven.be\/~snikova\/ti_tools.html . Accessed April 2016"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Picek, S., Ege, B., Batina, L., Jakobovic, D., Chmielewski, L., Golub, M.: On using genetic algorithms for intrinsic side-channel resistance: the case of AES s-box. In: Knoop, J., Salapura, V., Koren, I., Pelosi, G. (eds.), Proceedings of the First Workshop on Cryptography and Security in Computing Systems (CS2@HiPEAC) 2014, pp. 13\u201318. ACM (2014)","DOI":"10.1145\/2556315.2556319"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Picek, S., Ege, B., Papagiannopoulos, K., Batina, L., Jakobovic, D.: Optimality and beyond: the case of 4 * 4 s-boxes. In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014, pp. 80\u201383. IEEE Computer Society (2014)","DOI":"10.1109\/HST.2014.6855573"},{"issue":"2","key":"10_CR15","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1007\/s00145-010-9086-6","volume":"24","author":"A Poschmann","year":"2010","unstructured":"Poschmann, A., Moradi, A., Khoo, K., Lim, C.-W., Wang, H., Ling, S.: Side-channel resistant crypto for less than 2,300 GE. J. Cryptology 24(2), 322\u2013345 (2010)","journal-title":"J. Cryptology"},{"key":"10_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1007\/11502760_29","volume-title":"Fast Software Encryption","author":"E Prouff","year":"2005","unstructured":"Prouff, E.: DPA attacks and S-boxes. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 424\u2013441. Springer, Heidelberg (2005). doi: 10.1007\/11502760_29"},{"key":"10_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/978-3-642-28496-0_7","volume-title":"Selected Areas in Cryptography","author":"M-JO Saarinen","year":"2012","unstructured":"Saarinen, M.-J.O.: Cryptographic analysis of all 4 $$\\times $$ 4-bit S-boxes. In: Miri, A., Vaudenay, S. (eds.) SAC 2011. LNCS, vol. 7118, pp. 118\u2013133. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-28496-0_7"},{"key":"10_CR18","unstructured":"Sasdrich, P., Moradi, A., G\u00fcneysu, T.: Affine equivalence and its application to tightening threshold implementations. Cryptology ePrint Archive, Report 2015\/749 (2015). http:\/\/eprint.iacr.org\/"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Selvam, R., Shanmugam, D., Annadurai, S.: Vulnerability analysis of prince and rectangle using CPA. In: Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, CPSS 2015, pp. 81\u201387. ACM (2015)","DOI":"10.1145\/2732198.2732207"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Applied Cryptography Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49445-6_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T23:50:42Z","timestamp":1498348242000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49445-6_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319494449","9783319494456"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49445-6_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}