{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T14:33:12Z","timestamp":1742999592843,"version":"3.40.3"},"publisher-location":"Cham","reference-count":67,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319494449"},{"type":"electronic","value":"9783319494456"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49445-6_20","type":"book-chapter","created":{"date-parts":[[2016,11,17]],"date-time":"2016-11-17T07:50:31Z","timestamp":1479369031000},"page":"353-362","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Towards Fair and Efficient Evaluations of Leaking Cryptographic Devices"],"prefix":"10.1007","author":[{"given":"Fran\u00e7ois-Xavier","family":"Standaert","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,18]]},"reference":[{"key":"20_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11894063_1","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"C Archambeau","year":"2006","unstructured":"Archambeau, C., Peeters, E., Standaert, F.-X., Quisquater, J.-J.: Template attacks in principal subspaces. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 1\u201314. Springer, Heidelberg (2006). doi:\n                      10.1007\/11894063_1"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Balasch, J., Gierlichs, B., Reparaz, O., Verbauwhede, I.: DPA, bitslicing and masking at 1 GHz. In: G\u00fcneysu, T., Handschuh, H. (eds.) [28], pp. 599\u2013619","DOI":"10.1007\/978-3-662-48324-4_30"},{"issue":"2","key":"20_CR3","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/s00145-010-9084-8","volume":"24","author":"L Batina","year":"2011","unstructured":"Batina, L., Gierlichs, B., Prouff, E., Rivain, M., Standaert, F.-X., Veyrat-Charvillon, N.: Mutual information analysis: a comprehensive study. J. Cryptology 24(2), 269\u2013291 (2011)","journal-title":"J. Cryptology"},{"key":"20_CR4","series-title":"Lecture Notes in Computer Science","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2014","year":"2014","unstructured":"Batina, L., Robshaw, M. (eds.): CHES 2014. LNCS, vol. 8731. Springer, Heidelberg (2014)"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Battistello, A., Coron, J.-S., Prouff, E., Zeitoun, R.: Horizontal side-channel attacks and countermeasures on the ISW masking scheme. In: Gierlichs, B., Poschmann, A.Y. (eds.) [25], pp. 23\u201339","DOI":"10.1007\/978-3-662-53140-2_2"},{"key":"20_CR6","unstructured":"Bernstein, D.J., Lange, T., van Vredendaal, C.: Tighter, faster, simpler side-channel security evaluations beyond computing power. IACR Cryptology ePrint Archive 2015:221 (2015)"},{"issue":"8","key":"20_CR7","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/TC.2011.140","volume":"61","author":"A Bogdanov","year":"2012","unstructured":"Bogdanov, A., Kizhvatov, I.: Beyond the limits of DPA: combined side-channel collision attacks. IEEE Trans. Comput. 61(8), 1153\u20131164 (2012)","journal-title":"IEEE Trans. Comput."},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Bruneau, N., Guilley, S., Heuser, A., Marion, D., Rioul, O.: Less is more - dimensionality reduction from a theoretical perspective. In: G\u00fcneysu, T., Handschuh, H. (eds.) [28], pp. 22\u201341","DOI":"10.1007\/978-3-662-48324-4_2"},{"key":"20_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/978-3-662-45608-8_19","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2014","author":"N Bruneau","year":"2014","unstructured":"Bruneau, N., Guilley, S., Heuser, A., Rioul, O.: Masks will fall off. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014. LNCS, vol. 8874, pp. 344\u2013365. Springer, Heidelberg (2014). doi:\n                      10.1007\/978-3-662-45608-8_19"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Cagli, E., Dumas, C., Prouff, E.: Enhancing dimensionality reduction methods for side-channel attacks. In: Homma, N., Medwed, M. (eds.) [30], pp. 15\u201333","DOI":"10.1007\/978-3-319-31271-2_2"},{"key":"20_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-319-08302-5_17","volume-title":"Smart Card Research and Advanced Applications","author":"O Choudary","year":"2014","unstructured":"Choudary, O., Kuhn, M.G.: Efficient template attacks. In: Francillon, A., Rohatgi, P. (eds.) CARDIS 2013. LNCS, vol. 8419, pp. 253\u2013270. Springer, Heidelberg (2014). doi:\n                      10.1007\/978-3-319-08302-5_17"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Choudary, O., Kuhn, M.G.: Template attacks on different devices. In: Prouff, E. (ed.) [49], pp. 179\u2013198","DOI":"10.1007\/978-3-319-10175-0_13"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Adam Ding, A., Zhang, L., Fei, Y., Luo, P.: A statistical model for higher order DPA on masked devices. In: Batina, L., Robshaw, M. (eds.) [4], pp. 147\u2013169","DOI":"10.1007\/978-3-662-44709-3_9"},{"issue":"2","key":"20_CR14","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/s13389-011-0010-2","volume":"1","author":"J Doget","year":"2011","unstructured":"Doget, J., Prouff, E., Rivain, M., Standaert, F.-X.: Univariate side channel attacks and leakage modeling. J. Cryptographic Eng. 1(2), 123\u2013144 (2011)","journal-title":"J. Cryptographic Eng."},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Duc, A., Dziembowski, S., Faust, S., Unifying leakage models: from probing attacks to noisy leakage. In: Nguyen, P.Q., Oswald, E. (eds.) [43], pp. 423\u2013440","DOI":"10.1007\/978-3-642-55220-5_24"},{"key":"20_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/978-3-662-46800-5_16","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2015","author":"A Duc","year":"2015","unstructured":"Duc, A., Faust, S., Standaert, F.-X.: Making masking security proofs concrete. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9056, pp. 401\u2013429. Springer, Heidelberg (2015). doi:\n                      10.1007\/978-3-662-46800-5_16"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Duc, A., Faust, S., Standaert, F.-X.: Making masking security proofs concrete or how to evaluate the security of any leaking device (extended version). IACR Cryptology ePrint Archive 2015:119 (2015)","DOI":"10.1007\/978-3-662-46800-5_16"},{"key":"20_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-642-37288-9_9","volume-title":"Smart Card Research and Advanced Applications","author":"F Durvaux","year":"2013","unstructured":"Durvaux, F., Renauld, M., Standaert, F.-X., Oldeneel tot Oldenzeel, L., Veyrat-Charvillon, N.: Efficient removal of random delays from embedded software implementations using Hidden Markov Models. In: Mangard, S. (ed.) CARDIS 2012. LNCS, vol. 7771, pp. 123\u2013140. Springer, Heidelberg (2013). doi:\n                      10.1007\/978-3-642-37288-9_9"},{"key":"20_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1007\/978-3-662-49890-3_10","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2016","author":"F Durvaux","year":"2016","unstructured":"Durvaux, F., Standaert, F.-X.: From improved leakage detection to the detection of points of interests in leakage traces. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9665, pp. 240\u2013262. Springer, Heidelberg (2016). doi:\n                      10.1007\/978-3-662-49890-3_10"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Durvaux, F., Standaert, F.-X., Del Pozo, S.M.: Towards easy leakage certification. In: Gierlichs, B., Poschmann, A.Y. (eds.) [25], pp. 40\u201360","DOI":"10.1007\/978-3-662-53140-2_3"},{"key":"20_CR21","doi-asserted-by":"crossref","unstructured":"Durvaux, F., Standaert, F.-X., Veyrat-Charvillon, N.: How to certify the leakage of a chip? In: Nguyen, P.Q., Oswald, E. (eds.) [43], pp. 459\u2013476","DOI":"10.1007\/978-3-642-55220-5_26"},{"key":"20_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-319-21476-4_3","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"F Durvaux","year":"2015","unstructured":"Durvaux, F., Standaert, F.-X., Veyrat-Charvillon, N., Mairy, J.-B., Deville, Y.: Efficient selection of time samples for higher-order DPA with projection pursuits. In: Mangard, S., Poschmann, A.Y. (eds.) COSADE 2014. LNCS, vol. 9064, pp. 34\u201350. Springer, Heidelberg (2015). doi:\n                      10.1007\/978-3-319-21476-4_3"},{"issue":"1","key":"20_CR23","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s13389-012-0030-6","volume":"2","author":"M Abdelaziz Elaabid","year":"2012","unstructured":"Abdelaziz Elaabid, M., Guilley, S.: Portability of templates. J. Cryptographic Eng. 2(1), 63\u201374 (2012)","journal-title":"J. Cryptographic Eng."},{"issue":"1","key":"20_CR24","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/s13389-013-0051-9","volume":"3","author":"B G\u00e9rard","year":"2013","unstructured":"G\u00e9rard, B., Standaert, F.-X.: Unified and optimized linear collision attacks and their application in a non-profiled setting: extended version. J. Cryptographic Eng. 3(1), 45\u201358 (2013)","journal-title":"J. Cryptographic Eng."},{"key":"20_CR25","series-title":"Lecture Notes in Computer Science","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2016","year":"2016","unstructured":"Gierlichs, B., Poschmann, A.Y. (eds.): CHES 2016. LNCS, vol. 9813. Springer, Heidelberg (2016)"},{"key":"20_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-3-662-48116-5_6","volume-title":"Fast Software Encryption","author":"C Glowacz","year":"2015","unstructured":"Glowacz, C., Grosso, V., Poussier, R., Sch\u00fcth, J., Standaert, F.-X.: Simpler and more efficient rank estimation for side-channel security assessment. In: Leander, G. (ed.) FSE 2015. LNCS, vol. 9054, pp. 117\u2013129. Springer, Heidelberg (2015). doi:\n                      10.1007\/978-3-662-48116-5_6"},{"key":"20_CR27","doi-asserted-by":"crossref","unstructured":"Grosso, V., Standaert, F.-X.: ASCA, SASCA and DPA with enumeration: which one beats the other and when? In: Iwata, T., Cheon, J.H. (eds.) [32], pp. 291\u2013312","DOI":"10.1007\/978-3-662-48800-3_12"},{"key":"20_CR28","series-title":"Lecture Notes in Computer Science","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2015","year":"2015","unstructured":"G\u00fcneysu, T., Handschuh, H. (eds.): CHES 2015. LNCS, vol. 9293. Springer, Heidelberg (2015)"},{"key":"20_CR29","doi-asserted-by":"crossref","unstructured":"Heuser, A., Rioul, O., Guilley, S.: Good is not good enough - deriving optimal distinguishers from communication theory. In: Batina, L., Robshaw, M. (eds.) [4], pp. 55\u201374","DOI":"10.1007\/978-3-662-44709-3_4"},{"key":"20_CR30","series-title":"Lecture Notes in Computer Science","volume-title":"Smart Card Research and Advanced Applications","year":"2016","unstructured":"Homma, N., Medwed, M. (eds.): CARDIS 2015. LNCS, vol. 9514. Springer, Heidelberg (2016)"},{"key":"20_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1007\/978-3-540-45146-4_27","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"Y Ishai","year":"2003","unstructured":"Ishai, Y., Sahai, A., Wagner, D.: Private circuits: securing hardware against probing attacks. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 463\u2013481. Springer, Heidelberg (2003). doi:\n                      10.1007\/978-3-540-45146-4_27"},{"key":"20_CR32","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2015","year":"2015","unstructured":"Iwata, T., Cheon, J.H. (eds.): ASIACRYPT 2015. LNCS, vol. 9453. Springer, Heidelberg (2015)"},{"key":"20_CR33","doi-asserted-by":"crossref","unstructured":"Lomn\u00e9, V., Prouff, E., Rivain, M., Roche, T., Thillard, A.: How to estimate the success rate of higher-order side-channel attacks. In: Batina, L., Robshaw, M. (eds.) [4], pp. 35\u201354","DOI":"10.1007\/978-3-662-44709-3_3"},{"key":"20_CR34","doi-asserted-by":"crossref","unstructured":"Lomn\u00e9, V., Prouff, E., Roche, T.: Behind the scene of side channel attacks. In: Sako, K., Sarkar, P. (eds.) [55], pp. 506\u2013525","DOI":"10.1007\/978-3-642-42033-7_26"},{"key":"20_CR35","doi-asserted-by":"crossref","unstructured":"Longo, J., De Mulder, E., Page, D., Tunstall, M.: SoC It to EM: electromagnetic side-channel attacks on a complex system-on-chip. In: G\u00fcneysu, T., Handschuh, H. (eds.) [28], pp. 620\u2013640","DOI":"10.1007\/978-3-662-48324-4_31"},{"issue":"2","key":"20_CR36","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1049\/iet-ifs.2010.0096","volume":"5","author":"S Mangard","year":"2011","unstructured":"Mangard, S., Oswald, E., Standaert, F.-X.: One for all - all for one: unifying standard differential power analysis attacks. IET Inf. Secur. 5(2), 100\u2013110 (2011)","journal-title":"IET Inf. Secur."},{"key":"20_CR37","doi-asserted-by":"crossref","unstructured":"Martin, D.P., O\u2019Connell, J.F., Oswald, E., Stam, M.: Counting keys in parallel after a side channel attack. In: Iwata, T., Cheon, J.H. (eds.) [32], pp. 313\u2013337","DOI":"10.1007\/978-3-662-48800-3_13"},{"key":"20_CR38","doi-asserted-by":"crossref","unstructured":"Mather, L., Oswald, E., Bandenburg, J., W\u00f3jcik, M.: Does my device leak information? An a priori statistical power analysis of leakage detection tests. In: Sako, K., Sarkar, P. (eds.) [55], pp. 486\u2013505","DOI":"10.1007\/978-3-642-42033-7_25"},{"key":"20_CR39","doi-asserted-by":"crossref","unstructured":"Mather, L., Oswald, E., Whitnall, C.: Multi-target DPA attacks: pushing DPA beyond the limits of a desktop computer. In: Sarkar, P., Iwata, T. (eds.) [56], pp. 243\u2013261","DOI":"10.1007\/978-3-662-45611-8_13"},{"key":"20_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1007\/978-3-642-29011-4_26","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2012","author":"A Moradi","year":"2012","unstructured":"Moradi, A.: Statistical tools flavor side-channel collision attacks. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 428\u2013445. Springer, Heidelberg (2012). doi:\n                      10.1007\/978-3-642-29011-4_26"},{"key":"20_CR41","doi-asserted-by":"crossref","unstructured":"Moradi, A.: Side-channel leakage through static power - should we care about in practice? In: Batina, L., Robshaw, M. (eds.) [4], pp. 562\u2013579","DOI":"10.1007\/978-3-662-44709-3_31"},{"key":"20_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-642-15031-9_9","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"A Moradi","year":"2010","unstructured":"Moradi, A., Mischke, O., Eisenbarth, T.: Correlation-enhanced power analysis collision attack. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 125\u2013139. Springer, Heidelberg (2010). doi:\n                      10.1007\/978-3-642-15031-9_9"},{"key":"20_CR43","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2014","year":"2014","unstructured":"Nguyen, P.Q., Oswald, E. (eds.): EUROCRYPT 2014. LNCS, vol. 8441. Springer, Heidelberg (2014)"},{"key":"20_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-642-33027-8_9","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2012","author":"Y Oren","year":"2012","unstructured":"Oren, Y., Renauld, M., Standaert, F.-X., Wool, A.: Algebraic side-channel attacks beyond the hamming weight leakage model. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol. 7428, pp. 140\u2013154. Springer, Heidelberg (2012). doi:\n                      10.1007\/978-3-642-33027-8_9"},{"key":"20_CR45","doi-asserted-by":"crossref","unstructured":"Poussier, R., Grosso, V., Standaert, F.-X.: Comparing approaches to rank estimation for side-channel security evaluations. In: Homma, N., Medwed, M. (eds.) [30], pp. 125\u2013142","DOI":"10.1007\/978-3-319-31271-2_8"},{"key":"20_CR46","doi-asserted-by":"crossref","unstructured":"Poussier, R., Standaert, F.-X., Grosso, V., Simple key enumeration (and rank estimation) using histograms: an integrated approach. In: Gierlichs, B., Poschmann, A.Y. (eds.) [25], pp. 61\u201381","DOI":"10.1007\/978-3-662-53140-2_4"},{"key":"20_CR47","unstructured":"Del Pozo, S.M., Standaert, F.-X.: Blind source separation from single measurements using singular spectrum analysis. In: G\u00fcneysu, T., Handschuh, H. (eds.) [28], pp. 42\u201359"},{"key":"20_CR48","doi-asserted-by":"crossref","unstructured":"Del Pozo, S.M., Standaert, F.X., Kamel, D., Moradi, A.: Side-channel attacks from static power: when should we care? In: Nebel, W., Atienza, D. (eds.) Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, DATE 2015, Grenoble, France, 9\u201313 March 2015, pp. 145\u2013150. ACM (2015)","DOI":"10.7873\/DATE.2015.0712"},{"key":"20_CR49","series-title":"Lecture Notes in Computer Science","volume-title":"Constructive Side-Channel Analysis and Secure Design","year":"2014","unstructured":"Prouff, E. (ed.): COSADE 2014. LNCS, vol. 8622. Springer, Heidelberg (2014)"},{"key":"20_CR50","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1007\/978-3-642-38348-9_9","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2013","author":"E Prouff","year":"2013","unstructured":"Prouff, E., Rivain, M.: Masking against side-channel attacks: a formal security proof. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 142\u2013159. Springer, Heidelberg (2013). doi:\n                      10.1007\/978-3-642-38348-9_9"},{"key":"20_CR51","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/978-3-642-16342-5_29","volume-title":"Information Security and Cryptology","author":"M Renauld","year":"2010","unstructured":"Renauld, M., Standaert, F.-X.: Algebraic side-channel attacks. In: Bao, F., Yung, M., Lin, D., Jing, J. (eds.) Inscrypt 2009. LNCS, vol. 6151, pp. 393\u2013410. Springer, Heidelberg (2010). doi:\n                      10.1007\/978-3-642-16342-5_29"},{"key":"20_CR52","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-642-04138-9_8","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"M Renauld","year":"2009","unstructured":"Renauld, M., Standaert, F.-X., Veyrat-Charvillon, N.: Algebraic side-channel attacks on the AES: why time also matters in DPA. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 97\u2013111. Springer, Heidelberg (2009). doi:\n                      10.1007\/978-3-642-04138-9_8"},{"key":"20_CR53","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-642-20465-4_8","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2011","author":"M Renauld","year":"2011","unstructured":"Renauld, M., Standaert, F.-X., Veyrat-Charvillon, N., Kamel, D., Flandre, D.: A formal study of power variability issues and side-channel attacks for nanoscale devices. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 109\u2013128. Springer, Heidelberg (2011). doi:\n                      10.1007\/978-3-642-20465-4_8"},{"key":"20_CR54","doi-asserted-by":"crossref","unstructured":"Reparaz, O., Gierlichs, B., Verbauwhede, I.: Generic DPA attacks: curse or blessing? In: Prouff, E. (ed.) [49], pp. 98\u2013111","DOI":"10.1007\/978-3-319-10175-0_8"},{"key":"20_CR55","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology - ASIACRYPT 2013","year":"2013","unstructured":"Sako, K., Sarkar, P. (eds.): ASIACRYPT 2013. LNCS, vol. 8269. Springer, Heidelberg (2013)"},{"key":"20_CR56","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2014","year":"2014","unstructured":"Sarkar, P., Iwata, T. (eds.): ASIACRYPT 2014. LNCS, vol. 8873. Springer, Heidelberg (2014)"},{"issue":"2","key":"20_CR57","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s13389-016-0120-y","volume":"6","author":"T Schneider","year":"2016","unstructured":"Schneider, T., Moradi, A.: Leakage assessment methodology - extended version. J. Cryptographic Eng. 6(2), 85\u201399 (2016)","journal-title":"J. Cryptographic Eng."},{"key":"20_CR58","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/978-3-540-85053-3_26","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"F-X Standaert","year":"2008","unstructured":"Standaert, F.-X., Archambeau, C.: Using subspace-based template attacks to compare and combine power and electromagnetic information leakages. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 411\u2013425. Springer, Heidelberg (2008). doi:\n                      10.1007\/978-3-540-85053-3_26"},{"key":"20_CR59","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/978-3-642-17373-8_7","volume-title":"Advances in Cryptology - ASIACRYPT 2010","author":"F-X Standaert","year":"2010","unstructured":"Standaert, F.-X., Veyrat-Charvillon, N., Oswald, E., Gierlichs, B., Medwed, M., Kasper, M., Mangard, S.: The world is not enough: another look on second-order DPA. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 112\u2013129. Springer, Heidelberg (2010). doi:\n                      10.1007\/978-3-642-17373-8_7"},{"key":"20_CR60","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1007\/978-3-642-35999-6_25","volume-title":"Selected Areas in Cryptography","author":"N Veyrat-Charvillon","year":"2013","unstructured":"Veyrat-Charvillon, N., G\u00e9rard, B., Renauld, M., Standaert, F.-X.: An optimal key enumeration algorithm and its application to side-channel attacks. In: Knudsen, L.R., Wu, H. (eds.) SAC 2012. LNCS, vol. 7707, pp. 390\u2013406. Springer, Heidelberg (2013). doi:\n                      10.1007\/978-3-642-35999-6_25"},{"key":"20_CR61","doi-asserted-by":"crossref","unstructured":"Veyrat-Charvillon, N., G\u00e9rard, B., Standaert, F.-X.: Soft analytical side-channel attacks. In: Sarkar, P., Iwata, T. (eds.) [56], pp. 282\u2013296","DOI":"10.1007\/978-3-662-45611-8_15"},{"key":"20_CR62","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1007\/978-3-642-34961-4_44","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2012","author":"N Veyrat-Charvillon","year":"2012","unstructured":"Veyrat-Charvillon, N., Medwed, M., Kerckhof, S., Standaert, F.-X.: Shuffling against side-channel attacks: a comprehensive study with cautionary note. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 740\u2013757. Springer, Heidelberg (2012). doi:\n                      10.1007\/978-3-642-34961-4_44"},{"key":"20_CR63","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/978-3-642-22792-9_20","volume-title":"Advances in Cryptology \u2013 CRYPTO 2011","author":"N Veyrat-Charvillon","year":"2011","unstructured":"Veyrat-Charvillon, N., Standaert, F.-X.: Generic side-channel distinguishers: improvements and limitations. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 354\u2013372. Springer, Heidelberg (2011). doi:\n                      10.1007\/978-3-642-22792-9_20"},{"key":"20_CR64","doi-asserted-by":"crossref","unstructured":"Wang, W., Yu, Y., Liu, J., Guo, Z., Standaert, F.-X., Gu, D., Xu, S., Fu, R.: Evaluation and improvement of generic-emulating DPA attacks. In: G\u00fcneysu, T., Handschuh, H. (eds.) [28], pp. 416\u2013432","DOI":"10.1007\/978-3-662-48324-4_21"},{"key":"20_CR65","doi-asserted-by":"crossref","unstructured":"Whitnall, C., Oswald, E.: Robust profiling for DPA-style attacks. In: G\u00fcneysu, T., Handschuh, H. (eds.) [28], pp. 3\u201321","DOI":"10.1007\/978-3-662-48324-4_1"},{"key":"20_CR66","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/978-3-642-27257-8_15","volume-title":"Smart Card Research and Advanced Applications","author":"C Whitnall","year":"2011","unstructured":"Whitnall, C., Oswald, E., Mather, L.: An exploration of the Kolmogorov-Smirnov test as a competitor to mutual information analysis. In: Prouff, E. (ed.) CARDIS 2011. LNCS, vol. 7079, pp. 234\u2013251. Springer, Heidelberg (2011). doi:\n                      10.1007\/978-3-642-27257-8_15"},{"key":"20_CR67","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-319-04852-9_10","volume-title":"Topics in Cryptology \u2013 CT-RSA 2014","author":"C Whitnall","year":"2014","unstructured":"Whitnall, C., Oswald, E., Standaert, F.-X.: The myth of generic DPA\n                      \n                        \n                      \n                      $$\\ldots $$\n                    and the magic of learning. In: Benaloh, J. (ed.) CT-RSA 2014. LNCS, vol. 8366, pp. 183\u2013205. Springer, Heidelberg (2014). doi:\n                      10.1007\/978-3-319-04852-9_10"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Applied Cryptography Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49445-6_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T01:27:00Z","timestamp":1558315620000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49445-6_20"}},"subtitle":["Overview of the ERC Project CRASH, Part I (Invited Talk)"],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319494449","9783319494456"],"references-count":67,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49445-6_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"18 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPACE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy, and Applied Cryptography Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hyderabad","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"space2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}