{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T11:34:59Z","timestamp":1725881699756},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319546681"},{"type":"electronic","value":"9783319546698"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-54669-8_3","type":"book-chapter","created":{"date-parts":[[2017,3,6]],"date-time":"2017-03-06T01:21:12Z","timestamp":1488763272000},"page":"39-56","source":"Crossref","is-referenced-by-count":0,"title":["Side-Channel Analysis of the TUAK Algorithm Used for Authentication and Key Agreement in 3G\/4G Networks"],"prefix":"10.1007","author":[{"given":"Houssem","family":"Maghrebi","sequence":"first","affiliation":[]},{"given":"Julien","family":"Bringer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,7]]},"reference":[{"key":"3_CR1","unstructured":"ETSI TS 133 105; universal mobile telelecommunications system (UMTS); LTE; 3G security; cryptographic algorithm requirements (2016). 3GPP TS 33.105 version 13.0.0 release 13, 01\/2016"},{"key":"3_CR2","unstructured":"ETSI, TS 133 202; universal mobile telelecommunications system (UMTS); LTE; 3G security; specification of the 3GPP. Confidentiality, integrety algorithms; document 2: Kasumi specification (2016). 3GPP TS 35.202 version 13.0.0 release 13, 01\/2016"},{"key":"3_CR3","unstructured":"ETSI, TS 135 201; universal mobile telelecommunications system (UMTS); LTE; 3G security; specification of the 3GPP. Confidentiality, integrety algorithms; document 1: $$f_8$$ and $$f_9$$ specification (2016). 3GPP TS 35.201 version 13.0.0 release 13, 01\/2016"},{"key":"3_CR4","unstructured":"3GPP specification: 135.206 (2016). Specification of the Milenage algorithm set, V13.0.0, 01\/2016"},{"key":"3_CR5","unstructured":"3GPP specification: 135.231 (2016). Specification of the Tuak algorithm set, V13.0.0, 01\/2016"},{"key":"3_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/3-540-44709-1_26","volume-title":"Cryptographic Hardware and Embedded Systems \u2014 CHES 2001","author":"M-L Akkar","year":"2001","unstructured":"Akkar, M.-L., Giraud, C.: An implementation of DES and AES, secure against some attacks. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 309\u2013318. Springer, Heidelberg (2001). doi: 10.1007\/3-540-44709-1_26"},{"key":"3_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-319-39555-5_2","volume-title":"Applied Cryptography and Network Security","author":"S Alt","year":"2016","unstructured":"Alt, S., Fouque, P.-A., Macario-rat, G., Onete, C., Richard, B.: A cryptographic analysis of UMTS\/LTE AKA. In: Manulis, M., Sadeghi, A.-R., Schneider, S. (eds.) ACNS 2016. LNCS, vol. 9696, pp. 18\u201335. Springer, Heidelberg (2016). doi: 10.1007\/978-3-319-39555-5_2"},{"key":"3_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1007\/978-3-540-45146-4_35","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"E Barkan","year":"2003","unstructured":"Barkan, E., Biham, E., Keller, N.: Instant ciphertext-only cryptanalysis of GSM encrypted communication. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 600\u2013616. Springer, Heidelberg (2003). doi: 10.1007\/978-3-540-45146-4_35"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Bertoni, G., Daemen, J., Debande, N., Le, T., Peeters, M., Assche, G.V.: Power analysis of hardware implementations protected with secret sharing. In: 45th Annual IEEE\/ACM, MICRO 2012, Workshops Proceedings, Vancouver, BC, Canada, 1\u20135 December 2012, pp. 9\u201316 (2012)","DOI":"10.1109\/MICROW.2012.12"},{"key":"3_CR10","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Assche, G.V.: Note on side-channel attacks and their countermeasures. In: Comment on the NIST Hash Competition Forum, May 2009"},{"key":"3_CR11","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Assche, G.V.: The Keccak reference, January 2011"},{"key":"3_CR12","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Assche, G.V.: Keccak implementation overview, Version 3.2, 29 May 2012"},{"key":"3_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"E Brier","year":"2004","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16\u201329. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-28632-5_2"},{"key":"3_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1007\/3-540-48405-1_26","volume-title":"Advances in Cryptology \u2014 Crypto\u201999","author":"S Chari","year":"1999","unstructured":"Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards sound approaches to counteract power-analysis attacks. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 398\u2013412. Springer, Heidelberg (1999). doi: 10.1007\/3-540-48405-1_26 . ISBN: 3-540-66347-9"},{"key":"3_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-36400-5_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S Chari","year":"2003","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski, B.S., Ko\u00e7, K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13\u201328. Springer, Heidelberg (2003). doi: 10.1007\/3-540-36400-5_3"},{"key":"3_CR16","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael: AES - The Advanced Encryption Standard","author":"J Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael: AES - The Advanced Encryption Standard. Springer, Heidelberg (2002)"},{"issue":"2","key":"3_CR17","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/s13389-011-0010-2","volume":"1","author":"J Doget","year":"2011","unstructured":"Doget, J., Prouff, E., Rivain, M., Standaert, F.-X.: Univariate side channel attacks and leakage modeling. J. Cryptogr. Eng. 1(2), 123\u2013144 (2011)","journal-title":"J. Cryptogr. Eng."},{"key":"3_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/978-3-540-85053-3_27","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"B Gierlichs","year":"2008","unstructured":"Gierlichs, B., Batina, L., Tuyls, P., Preneel, B.: Mutual information analysis. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 426\u2013442. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-85053-3_27"},{"key":"3_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/3-540-48059-5_15","volume-title":"Cryptographic Hardware and Embedded Systems","author":"L Goubin","year":"1999","unstructured":"Goubin, L., Patarin, J.: DES and differential power analysis the \u201cDuplication\u201d method. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 158\u2013172. Springer, Heidelberg (1999). doi: 10.1007\/3-540-48059-5_15"},{"key":"3_CR20","doi-asserted-by":"publisher","unstructured":"Homma, N., Nagashima, S., Sugawara, T., Aoki, T., Satoh, A.: A high-resolution phase-based waveform matching and its application to side-channel attacks. IEICE Trans. 91-A(1): 193\u2013202. New Orleans. Louisiana, USA (2008). doi: 10.1109\/ISCAS.2007.378024","DOI":"10.1109\/ISCAS.2007.378024"},{"key":"3_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology \u2014 CRYPTO\u201996","author":"PC Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104\u2013113. Springer, Heidelberg (1996). doi: 10.1007\/3-540-68697-5_9"},{"key":"3_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2014 CRYPTO\u201999","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999). doi: 10.1007\/3-540-48405-1_25"},{"key":"3_CR23","unstructured":"Liu, J., Yu, Y., Standaert, F.-X., Guo, Z., Gu, D., Sun, W., Ge, Y., Xie, X.: Cloning 3G\/4G sim cards with a pc and an oscilloscope: lessons learned in physical security. In: BlackHat (2015)"},{"key":"3_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"468","DOI":"10.1007\/978-3-319-24174-6_24","volume-title":"Computer Security \u2013 ESORICS 2015","author":"J Liu","year":"2015","unstructured":"Liu, J., Yu, Y., Standaert, F.-X., Guo, Z., Gu, D., Sun, W., Ge, Y., Xie, X.: Small tweaks do not help: differential power analysis of MILENAGE implementations in 3G\/4G USIM cards. In: Pernul, G., Ryan, P.Y.A., Weippl, E. (eds.) ESORICS 2015. LNCS, vol. 9326, pp. 468\u2013480. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-24174-6_24"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Luo, P., Fei, Y., Fang, X., Ding, A.A., Kaeli, D.R., Leeser, M.: Side-channel analysis of MAC-Keccak hardware implementations. In: Proceedings of the Fourth HASP, pp. 1:1\u20131:8. ACM, New York, NY, USA (2015)","DOI":"10.1145\/2768566.2768567"},{"key":"3_CR26","unstructured":"Mayes, K., Babbage, S., Maximov, A.: Performance evaluation of the new Tuak mobile authentication algorithm. In: The Eleventh International Conference on Systems ICONS 2016, pp. 38\u201344 (2016). Related to work done in support of the ETSI SAGE group for mobile authentication standards"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Messerges, T.S.: Securing the AES finalists against power analysis attacks. In: FSE 2000, pp. 150\u2013164. Springer, New York (2000)","DOI":"10.1007\/3-540-44706-7_11"},{"key":"3_CR28","doi-asserted-by":"crossref","unstructured":"Rao, J.R., Rohatgi, P., Scherzer, H., Tinguely, S.: Partitioning attacks: or how to rapidly clone some GSM cards. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, SP 2002, p. 31, Washington, DC, USA (2002)","DOI":"10.1109\/SECPRI.2002.1004360"},{"key":"3_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-642-04138-9_13","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"M Rivain","year":"2009","unstructured":"Rivain, M., Prouff, E., Doget, J.: Higher-order masking and shuffling for software implementations of block ciphers. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 171\u2013188. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-04138-9_13"},{"issue":"3","key":"3_CR30","first-page":"291","volume":"2","author":"W Schindler","year":"2008","unstructured":"Schindler, W.: Advanced stochastic methods in side channel analysis on block ciphers in the presence of masking. J. Math. Crypt. 2(3), 291\u2013310 (2008)","journal-title":"J. Math. Crypt."},{"key":"3_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/11545262_3","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"W Schindler","year":"2005","unstructured":"Schindler, W., Lemke, K., Paar, C.: A stochastic model for differential side channel cryptanalysis. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 30\u201346. Springer, Heidelberg (2005). doi: 10.1007\/11545262_3"},{"key":"3_CR32","doi-asserted-by":"crossref","unstructured":"Taha, M.M.I., Schaumont, P.: Side-channel analysis of MAC-Keccak. In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013, Austin, TX, USA, 2\u20133 June 2013, pp. 125\u2013130 (2013)","DOI":"10.1109\/HST.2013.6581577"},{"key":"3_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1007\/978-3-642-34961-4_44","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2012","author":"N Veyrat-Charvillon","year":"2012","unstructured":"Veyrat-Charvillon, N., Medwed, M., Kerckhof, S., Standaert, F.-X.: Shuffling against side-channel attacks: a comprehensive study with cautionary note. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 740\u2013757. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-34961-4_44"},{"key":"3_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"526","DOI":"10.1007\/BFb0052260","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201997","author":"D Wagner","year":"1997","unstructured":"Wagner, D., Schneier, B., Kelsey, J.: Cryptanalysis of the cellular message encryption algorithm. In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 526\u2013537. Springer, Heidelberg (1997). doi: 10.1007\/BFb0052260"},{"key":"3_CR35","first-page":"1012","volume":"2012","author":"M Zohner","year":"2012","unstructured":"Zohner, M., Kasper, M., Stottinger, M., Huss, S.: Side channel analysis of the SHA-3 finalists. DATE 2012, 1012\u20131017 (2012)","journal-title":"DATE"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-54669-8_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T09:25:09Z","timestamp":1568885109000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-54669-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319546681","9783319546698"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-54669-8_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}