{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T04:09:24Z","timestamp":1751083764209,"version":"3.41.0"},"publisher-location":"Cham","reference-count":59,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319706931"},{"type":"electronic","value":"9783319706948"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-70694-8_26","type":"book-chapter","created":{"date-parts":[[2017,11,29]],"date-time":"2017-11-29T08:53:53Z","timestamp":1511945633000},"page":"755-780","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["The First Thorough Side-Channel Hardware Trojan"],"prefix":"10.1007","author":[{"given":"Maik","family":"Ender","sequence":"first","affiliation":[]},{"given":"Samaneh","family":"Ghandali","sequence":"additional","affiliation":[]},{"given":"Amir","family":"Moradi","sequence":"additional","affiliation":[]},{"given":"Christof","family":"Paar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,30]]},"reference":[{"key":"26_CR1","unstructured":"Side-channel AttacK User Reference Architecture. http:\/\/satoh.cs.uec.ac.jp\/SAKURA\/index.html"},{"key":"26_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-642-40349-1_12","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2013","author":"GT Becker","year":"2013","unstructured":"Becker, G.T., Regazzoni, F., Paar, C., Burleson, W.P.: Stealthy dopant-level hardware trojans. In: Bertoni, G., Coron, J.-S. (eds.) CHES 2013. LNCS, vol. 8086, pp. 197\u2013214. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40349-1_12"},{"key":"26_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-319-69453-5_5","volume-title":"Selected Areas in Cryptography","author":"T Beyne","year":"2017","unstructured":"Beyne, T., Bilgin, B.: Uniform first-order threshold implementations. In: Avanzi, R., Heys, H. (eds.) SAC 2016. LNCS, vol. 10532, pp. 79\u201398. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-69453-5_5"},{"key":"26_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/978-3-540-85174-5_13","volume-title":"Advances in Cryptology \u2013 CRYPTO 2008","author":"E Biham","year":"2008","unstructured":"Biham, E., Carmeli, Y., Shamir, A.: Bug attacks. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 221\u2013240. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85174-5_13"},{"issue":"4","key":"26_CR5","doi-asserted-by":"publisher","first-page":"775","DOI":"10.1007\/s00145-015-9209-1","volume":"29","author":"E Biham","year":"2016","unstructured":"Biham, E., Carmeli, Y., Shamir, A.: Bug attacks. J. Cryptol. 29(4), 775\u2013805 (2016)","journal-title":"J. Cryptol."},{"key":"26_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1007\/978-3-642-40349-1_9","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2013","author":"B Bilgin","year":"2013","unstructured":"Bilgin, B., Bogdanov, A., Kne\u017eevi\u0107, M., Mendel, F., Wang, Q.: Fides: lightweight authenticated cipher with side-channel resistance for constrained hardware. In: Bertoni, G., Coron, J.-S. (eds.) CHES 2013. LNCS, vol. 8086, pp. 142\u2013158. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40349-1_9"},{"key":"26_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/978-3-319-08302-5_13","volume-title":"Smart Card Research and Advanced Applications","author":"B Bilgin","year":"2014","unstructured":"Bilgin, B., Daemen, J., Nikov, V., Nikova, S., Rijmen, V., Van Assche, G.: Efficient and first-order DPA resistant implementations of Keccak. In: Francillon, A., Rohatgi, P. (eds.) CARDIS 2013. LNCS, vol. 8419, pp. 187\u2013199. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-08302-5_13"},{"key":"26_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/978-3-319-06734-6_17","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2014","author":"B Bilgin","year":"2014","unstructured":"Bilgin, B., Gierlichs, B., Nikova, S., Nikov, V., Rijmen, V.: A more efficient AES threshold implementation. In: Pointcheval, D., Vergnaud, D. (eds.) AFRICACRYPT 2014. LNCS, vol. 8469, pp. 267\u2013284. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-06734-6_17"},{"key":"26_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-662-45608-8_18","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2014","author":"B Bilgin","year":"2014","unstructured":"Bilgin, B., Gierlichs, B., Nikova, S., Nikov, V., Rijmen, V.: Higher-order threshold implementations. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014. LNCS, vol. 8874, pp. 326\u2013343. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45608-8_18"},{"issue":"7","key":"26_CR10","doi-asserted-by":"publisher","first-page":"1188","DOI":"10.1109\/TCAD.2015.2419623","volume":"34","author":"B Bilgin","year":"2015","unstructured":"Bilgin, B., Gierlichs, B., Nikova, S., Nikov, V., Rijmen, V.: Trade-offs for threshold implementations illustrated on AES. IEEE Trans. CAD Integr. Circuits Syst. 34(7), 1188\u20131200 (2015)","journal-title":"IEEE Trans. CAD Integr. Circuits Syst."},{"key":"26_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1007\/978-3-642-33027-8_5","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2012","author":"B Bilgin","year":"2012","unstructured":"Bilgin, B., Nikova, S., Nikov, V., Rijmen, V., St\u00fctz, G.: Threshold implementations of all $$3 \\times 3$$ and $$4 \\times 4$$ S-boxes. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol. 7428, pp. 76\u201391. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33027-8_5"},{"issue":"1","key":"26_CR12","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s12095-014-0104-7","volume":"7","author":"B Bilgin","year":"2015","unstructured":"Bilgin, B., Nikova, S., Nikov, V., Rijmen, V., Tokareva, N., Vitkup, V.: Threshold implementations of small S-boxes. Cryptogr. Commun. 7(1), 3\u201333 (2015)","journal-title":"Cryptogr. Commun."},{"key":"26_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/3-540-39200-9_3","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2003","author":"A Biryukov","year":"2003","unstructured":"Biryukov, A., De Canni\u00e8re, C., Braeken, A., Preneel, B.: A toolbox for cryptanalysis: linear and affine equivalence algorithms. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 33\u201350. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-39200-9_3"},{"key":"26_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"A Bogdanov","year":"2007","unstructured":"Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450\u2013466. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74735-2_31"},{"issue":"1","key":"26_CR15","doi-asserted-by":"crossref","first-page":"398","DOI":"10.46586\/tosc.v2017.i1.398-404","volume":"2017","author":"D Bozilov","year":"2017","unstructured":"Bozilov, D., Bilgin, B., Sahin, H.A.: A note on 5-bit quadratic permutations\u2019 classification. IACR Trans. Symmetric Cryptol. 2017(1), 398\u2013404 (2017)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"26_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1007\/978-3-540-68914-0_27","volume-title":"Applied Cryptography and Network Security","author":"D Canright","year":"2008","unstructured":"Canright, D., Batina, L.: A very compact \u201cperfectly masked\u201d S-box for AES. In: Bellovin, S.M., Gennaro, R., Keromytis, A., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 446\u2013459. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-68914-0_27"},{"key":"26_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1007\/978-3-642-34931-7_8","volume-title":"Progress in Cryptology - INDOCRYPT 2012","author":"C Carlet","year":"2012","unstructured":"Carlet, C., Danger, J.-L., Guilley, S., Maghrebi, H.: Leakage squeezing of order two. In: Galbraith, S., Nandi, M. (eds.) INDOCRYPT 2012. LNCS, vol. 7668, pp. 120\u2013139. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34931-7_8"},{"key":"26_CR18","doi-asserted-by":"crossref","unstructured":"Chakraborty, R.S., Narasimhan, S., Bhunia, S.: Hardware Trojan: threats and emerging solutions. In: HLDVT 2009, pp. 166\u2013171. IEEE Computer Society (2009)","DOI":"10.1109\/HLDVT.2009.5340158"},{"key":"26_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1007\/978-3-642-04138-9_28","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"RS Chakraborty","year":"2009","unstructured":"Chakraborty, R.S., Wolff, F., Paul, S., Papachristou, C., Bhunia, S.: MERO: a statistical approach for hardware Trojan detection. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 396\u2013410. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04138-9_28"},{"issue":"8","key":"26_CR20","doi-asserted-by":"publisher","first-page":"1429","DOI":"10.1109\/TVLSI.2014.2339892","volume":"23","author":"S Endo","year":"2015","unstructured":"Endo, S., Li, Y., Homma, N., Sakiyama, K., Ohta, K., Fujimoto, D., Nagata, M., Katashita, T., Danger, J., Aoki, T.: A silicon-level countermeasure against fault sensitivity analysis and its evaluation. IEEE Trans. VLSI Syst. 23(8), 1429\u20131438 (2015)","journal-title":"IEEE Trans. VLSI Syst."},{"key":"26_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1007\/978-3-662-53140-2_30","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2016","author":"S Ghandali","year":"2016","unstructured":"Ghandali, S., Becker, G.T., Holcomb, D., Paar, C.: A Design methodology for stealthy parametric Trojans and its application to bug attacks. In: Gierlichs, B., Poschmann, A.Y. (eds.) CHES 2016. LNCS, vol. 9813, pp. 625\u2013647. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53140-2_30"},{"key":"26_CR22","unstructured":"Goodwill, G., Jun, B., Jaffe, J., Rohatgi, P.: A testing methodology for side channel resistance validation. In: NIST Non-invasive Attack Testing Workshop (2011). http:\/\/csrc.nist.gov\/news_events\/non-invasive-attack-testing-workshop\/papers\/08_Goodwill.pdf"},{"key":"26_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-3-319-52153-4_6","volume-title":"Topics in Cryptology \u2013 CT-RSA 2017","author":"H Gross","year":"2017","unstructured":"Gross, H., Mangard, S., Korak, T.: An efficient side-channel protected AES implementation with arbitrary protection order. In: Handschuh, H. (ed.) CT-RSA 2017. LNCS, vol. 10159, pp. 95\u2013112. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-52153-4_6"},{"key":"26_CR24","doi-asserted-by":"crossref","unstructured":"Gro\u00df, H., Wenger, E., Dobraunig, C., Ehrenh\u00f6fer, C.: Suit up! - made-to-measure hardware implementations of ASCON. In: DSD 2015, pp. 645\u2013652. IEEE Computer Society (2015)","DOI":"10.1109\/DSD.2015.14"},{"key":"26_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-642-23951-9_3","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"T G\u00fcneysu","year":"2011","unstructured":"G\u00fcneysu, T., Moradi, A.: Generic side-channel countermeasures for reconfigurable devices. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 33\u201348. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23951-9_3"},{"issue":"8","key":"26_CR26","doi-asserted-by":"publisher","first-page":"1475","DOI":"10.1109\/TCAD.2005.857313","volume":"25","author":"P Gupta","year":"2006","unstructured":"Gupta, P., Kahng, A.B., Sharma, P., Sylvester, D.: Gate-length biasing for runtime-leakage control. IEEE Trans. CAD Integr. Circuits Syst. 25(8), 1475\u20131485 (2006)","journal-title":"IEEE Trans. CAD Integr. Circuits Syst."},{"key":"26_CR27","doi-asserted-by":"crossref","unstructured":"Jin, Y., Makris, Y.: Hardware Trojan detection using path delay fingerprint. In: HOST 2008, pp. 51\u201357. IEEE Computer Society (2008)","DOI":"10.1109\/HST.2008.4559049"},{"issue":"1","key":"26_CR28","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MDT.2010.21","volume":"27","author":"Y Jin","year":"2010","unstructured":"Jin, Y., Makris, Y.: Hardware Trojans in wireless cryptographic ICs. IEEE Des. Test Comput. 27(1), 26\u201335 (2010)","journal-title":"IEEE Des. Test Comput."},{"issue":"10","key":"26_CR29","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/MC.2010.299","volume":"43","author":"R Karri","year":"2010","unstructured":"Karri, R., Rajendran, J., Rosenfeld, K., Tehranipoor, M.: Trustworthy hardware: identifying and classifying hardware trojans. IEEE Comput. 43(10), 39\u201346 (2010)","journal-title":"IEEE Comput."},{"issue":"3","key":"26_CR30","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s13389-012-0040-4","volume":"2","author":"M Kasper","year":"2012","unstructured":"Kasper, M., Moradi, A., Becker, G.T., Mischke, O., G\u00fcneysu, T., Paar, C., Burleson, W.: Side channels as building blocks. J. Cryptogr. Eng. 2(3), 143\u2013159 (2012)","journal-title":"J. Cryptogr. Eng."},{"key":"26_CR31","doi-asserted-by":"crossref","unstructured":"King, S.T., Tucek, J., Cozzie, A., Grier, C., Jiang, W., Zhou, Y.: Designing and implementing malicious hardware. In: USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET 2008. USENIX Association (2008)","DOI":"10.1145\/1346281.2181012"},{"key":"26_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology \u2014 CRYPTO 1996","author":"PC Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104\u2013113. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-68697-5_9"},{"key":"26_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2014 CRYPTO 1999","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_25"},{"key":"26_CR34","doi-asserted-by":"crossref","unstructured":"Kumar, R., Jovanovic, P., Burleson, W.P., Polian, I.: Parametric Trojans for fault-injection attacks on cryptographic hardware. In: FDTC 2014, pp. 18\u201328. IEEE Computer Society (2014)","DOI":"10.1109\/FDTC.2014.12"},{"key":"26_CR35","doi-asserted-by":"crossref","unstructured":"Lin, L., Burleson, W., Paar, C.: MOLES: malicious off-chip leakage enabled by side-channels. In: ICCAD 2009, pp. 117\u2013122. ACM (2009)","DOI":"10.1145\/1687399.1687425"},{"key":"26_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1007\/978-3-642-04138-9_27","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"L Lin","year":"2009","unstructured":"Lin, L., Kasper, M., G\u00fcneysu, T., Paar, C., Burleson, W.: Trojan side-channels: lightweight hardware Trojans through side-channel engineering. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 382\u2013395. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04138-9_27"},{"key":"26_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-642-21040-2_14","volume-title":"Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication","author":"H Maghrebi","year":"2011","unstructured":"Maghrebi, H., Guilley, S., Danger, J.-L.: Leakage Squeezing countermeasure against high-order attacks. In: Ardagna, C.A., Zhou, J. (eds.) WISTP 2011. LNCS, vol. 6633, pp. 208\u2013223. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-21040-2_14"},{"key":"26_CR38","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-38162-6","volume-title":"Power Analysis Attacks: Revealing the Secrets of Smart Cards","author":"S Mangard","year":"2007","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-0-387-38162-6"},{"key":"26_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/11545262_12","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"S Mangard","year":"2005","unstructured":"Mangard, S., Pramstaller, N., Oswald, E.: Successfully attacking masked AES hardware implementations. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 157\u2013171. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11545262_12"},{"issue":"9","key":"26_CR40","doi-asserted-by":"publisher","first-page":"1578","DOI":"10.1109\/TVLSI.2011.2160375","volume":"20","author":"A Moradi","year":"2012","unstructured":"Moradi, A., Kirschbaum, M., Eisenbarth, T., Paar, C.: Masked dual-rail precharge logic encounters state-of-the-art power analysis methods. IEEE Trans. VLSI Syst. 20(9), 1578\u20131589 (2012). https:\/\/doi.org\/10.1109\/TVLSI.2011.2160375","journal-title":"IEEE Trans. VLSI Syst."},{"key":"26_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-642-15031-9_9","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"A Moradi","year":"2010","unstructured":"Moradi, A., Mischke, O., Eisenbarth, T.: Correlation-enhanced power analysis collision attack. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 125\u2013139. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15031-9_9"},{"key":"26_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-642-20465-4_6","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2011","author":"A Moradi","year":"2011","unstructured":"Moradi, A., Poschmann, A., Ling, S., Paar, C., Wang, H.: Pushing the limits: a very compact and a threshold implementation of AES. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 69\u201388. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-20465-4_6"},{"key":"26_CR43","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1007\/978-3-662-53887-6_19","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2016","author":"A Moradi","year":"2016","unstructured":"Moradi, A., Schneider, T.: Side-channel analysis protection and low-latency in action \u2013 case study of PRINCE and Midori. In: Cheon, J.H., Takagi, T. (eds.) ASIACRYPT 2016. LNCS, vol. 10031, pp. 517\u2013547. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53887-6_19"},{"key":"26_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/978-3-662-48324-4_23","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2015","author":"A Moradi","year":"2015","unstructured":"Moradi, A., Wild, A.: Assessment of hiding the higher-order leakages in hardware \u2013 what are the achievements versus overheads? In: G\u00fcneysu, T., Handschuh, H. (eds.) CHES 2015. LNCS, vol. 9293, pp. 453\u2013474. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48324-4_23"},{"issue":"2","key":"26_CR45","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/s00145-010-9085-7","volume":"24","author":"S Nikova","year":"2011","unstructured":"Nikova, S., Rijmen, V., Schl\u00e4ffer, M.: Secure hardware implementation of nonlinear functions in the presence of glitches. J. Cryptol. 24(2), 292\u2013321 (2011)","journal-title":"J. Cryptol."},{"key":"26_CR46","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/11502760_28","volume-title":"Fast Software Encryption","author":"E Oswald","year":"2005","unstructured":"Oswald, E., Mangard, S., Pramstaller, N., Rijmen, V.: A side-channel analysis resistant description of the AES S-box. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 413\u2013423. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11502760_28"},{"key":"26_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-3-540-74735-2_6","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"T Popp","year":"2007","unstructured":"Popp, T., Kirschbaum, M., Zefferer, T., Mangard, S.: Evaluation of the masked logic style MDPL on a prototype chip. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 81\u201394. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74735-2_6"},{"issue":"2","key":"26_CR48","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/s00145-010-9086-6","volume":"24","author":"A Poschmann","year":"2011","unstructured":"Poschmann, A., Moradi, A., Khoo, K., Lim, C., Wang, H., Ling, S.: Side-channel resistant crypto for less than 2, 300 GE. J. Cryptol. 24(2), 322\u2013345 (2011)","journal-title":"J. Cryptol."},{"key":"26_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1007\/978-3-319-64647-3_16","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"S Merino del Pozo","year":"2017","unstructured":"Merino del Pozo, S., Standaert, F.-X.: Getting the most out of leakage detection. In: Guilley, S. (ed.) COSADE 2017. LNCS, vol. 10348, pp. 264\u2013281. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-64647-3_16"},{"issue":"6","key":"26_CR50","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1109\/TC.2009.15","volume":"58","author":"E Prouff","year":"2009","unstructured":"Prouff, E., Rivain, M., Bevan, R.: Statistical analysis of second order differential power analysis. IEEE Trans. Comput. 58(6), 799\u2013811 (2009)","journal-title":"IEEE Trans. Comput."},{"key":"26_CR51","doi-asserted-by":"crossref","unstructured":"Rajendran, J., Jyothi, V., Karri, R.: Blue team red team approach to hardware trust assessment. In: ICCD 2011, pp. 285\u2013288. IEEE Computer Society (2011)","DOI":"10.1109\/ICCD.2011.6081410"},{"key":"26_CR52","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"764","DOI":"10.1007\/978-3-662-47989-6_37","volume-title":"Advances in Cryptology \u2013 CRYPTO 2015","author":"O Reparaz","year":"2015","unstructured":"Reparaz, O., Bilgin, B., Nikova, S., Gierlichs, B., Verbauwhede, I.: Consolidating masking schemes. In: Gennaro, R., Robshaw, M. (eds.) CRYPTO 2015. LNCS, vol. 9215, pp. 764\u2013783. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-47989-6_37"},{"key":"26_CR53","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1007\/978-3-662-48324-4_29","volume-title":"Cryptographic Hardware and Embedded Systems","author":"S Saha","year":"2015","unstructured":"Saha, S., Chakraborty, R.S., Nuthakki, S.S., Anshul, Mukhopadhyay, D.: Improved test pattern generation for hardware Trojan detection using genetic algorithm and boolean satisfiability. In: G\u00fcneysu, T., Handschuh, H. (eds.) CHES 2015. LNCS, vol. 9293, pp. 577\u2013596. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48324-4_29"},{"key":"26_CR54","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/978-3-319-31301-6_16","volume-title":"Selected Areas in Cryptography - SAC 2015","author":"P Sasdrich","year":"2016","unstructured":"Sasdrich, P., Moradi, A., G\u00fcneysu, T.: Affine equivalence and its application to tightening threshold implementations. In: Dunkelman, O., Keliher, L. (eds.) SAC 2015. LNCS, vol. 9566, pp. 263\u2013276. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-31301-6_16"},{"key":"26_CR55","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/978-3-319-52153-4_8","volume-title":"Topics in Cryptology \u2013 CT-RSA 2017","author":"P Sasdrich","year":"2017","unstructured":"Sasdrich, P., Moradi, A., G\u00fcneysu, T.: Hiding higher-order side-channel leakage \u2013 randomizing cryptographic implementations in reconfigurable hardware. In: Handschuh, H. (ed.) CT-RSA 2017. LNCS, vol. 10159, pp. 131\u2013146. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-52153-4_8"},{"key":"26_CR56","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/978-3-662-48324-4_25","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2015","author":"T Schneider","year":"2015","unstructured":"Schneider, T., Moradi, A.: Leakage assessment methodology \u2013 a clear roadmap for side-channel evaluations. In: G\u00fcneysu, T., Handschuh, H. (eds.) CHES 2015. LNCS, vol. 9293, pp. 495\u2013513. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48324-4_25"},{"key":"26_CR57","doi-asserted-by":"crossref","unstructured":"Shiyanovskii, Y., Wolff, F.G., Rajendran, A., Papachristou, C.A., Weyer, D.J., Clay, W.: Process reliability based Trojans through NBTI and HCI effects. In: Adaptive Hardware and Systems AHS 2010, pp. 215\u2013222. IEEE (2010)","DOI":"10.1109\/AHS.2010.5546257"},{"key":"26_CR58","unstructured":"Smith, G.L.: Model for delay faults based upon paths. In: International Test Conference 1985, pp. 342\u2013351. IEEE Computer Society (1985)"},{"key":"26_CR59","doi-asserted-by":"crossref","unstructured":"Wang, X., Salmani, H., Tehranipoor, M., Plusquellic, J.F.: Hardware Trojan detection and isolation using current integration and localized current analysis. In: DFT 2008, pp. 87\u201395. IEEE Computer Society (2008)","DOI":"10.1109\/DFT.2008.61"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2017"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-70694-8_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T19:43:03Z","timestamp":1751053383000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-70694-8_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319706931","9783319706948"],"references-count":59,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-70694-8_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"30 November 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASIACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Application of Cryptology and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hong Kong","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asiacrypt2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/asiacrypt.iacr.org\/2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}