{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:37:28Z","timestamp":1725514648362},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540681595"},{"type":"electronic","value":"9783540681649"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-68164-9_15","type":"book-chapter","created":{"date-parts":[[2008,5,30]],"date-time":"2008-05-30T10:48:34Z","timestamp":1212144514000},"page":"221-235","source":"Crossref","is-referenced-by-count":0,"title":["Yet Another Attack on Vest"],"prefix":"10.1007","author":[{"given":"Pascal","family":"Delaunay","sequence":"first","affiliation":[]},{"given":"Antoine","family":"Joux","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/3-540-36400-5_4","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"D. Agrawal","year":"2003","unstructured":"Agrawal, D., Archambeault, B., Rao, J., Rohatgi, P.: The EM Side-Channel(s). In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 29\u201345. Springer, Heidelberg (2003)"},{"key":"15_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"E. Brier","year":"2004","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 16\u201329. Springer, Heidelberg (2004)"},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/11967668_17","volume-title":"Topics in Cryptology \u2013 CT-RSA 2007","author":"W. Fischer","year":"2006","unstructured":"Fischer, W., Gammel, B.M., Kniffler, O., Velten, J.: Differential Power Analysis of Stream Ciphers. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol.\u00a04377, pp. 257\u2013270. Springer, Heidelberg (2006)"},{"key":"15_CR4","unstructured":"Gittins, B., Landman, H., O\u2019Neil, S., Kelson, R.: VEST, a presentation on VEST Hardware Performance, Chip Area Measurements, Power Consumption Estimates (2005)"},{"key":"15_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/3-540-36288-6_15","volume-title":"Public Key Cryptography - PKC 2003","author":"L. Goubin","year":"2002","unstructured":"Goubin, L.: A refined power analysis attack on elliptic curve cryptosystems. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol.\u00a02567, pp. 199\u2013210. Springer, Heidelberg (2002)"},{"key":"15_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1007\/11941378_31","volume-title":"Progress in Cryptology - INDOCRYPT 2006","author":"A. Joux","year":"2006","unstructured":"Joux, A., Delaunay, P.: Galois LFSR, Embedded Devices and Side Channel Weaknesses. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol.\u00a04329, pp. 436\u2013451. Springer, Heidelberg (2006)"},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/978-3-540-74619-5_4","volume-title":"Fast Software Encryption","author":"A. Joux","year":"2007","unstructured":"Joux, A., Reinhard, J.-R.: Overtaking Vest. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol.\u00a04593, pp. 60\u201375. Springer, Heidelberg (2007)"},{"key":"15_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P. Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"15_CR9","series-title":"Lecture Notes in Computer Science","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2001","year":"2001","unstructured":"Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.): CHES 2001. LNCS, vol.\u00a02162. Springer, Heidelberg (2001)"},{"key":"15_CR10","series-title":"Lecture Notes in Computer Science","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2000","year":"2000","unstructured":"Paar, C., Ko\u00e7, \u00c7.K. (eds.): CHES 2000. LNCS, vol.\u00a01965. Springer, Heidelberg (2000)"},{"key":"15_CR11","unstructured":"Lano, J., Mentens, N., Preneel, B., Verbauwhede, I.: Power Analysis of Synchronous Stream Ciphers with Resynchronization Mechanism. In: The State of the Art of Stream Ciphers (2004)"},{"key":"15_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/11545262_12","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"S. Mangard","year":"2005","unstructured":"Mangard, S., Pramstaller, N., Oswald, E.: Successfully Attacking Masked AES Hardware Implementations. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol.\u00a03659, pp. 157\u2013171. Springer, Heidelberg (2005)"},{"key":"15_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/3-540-48059-5_14","volume-title":"Cryptographic Hardware and Embedded Systems","author":"T. Messerges","year":"1999","unstructured":"Messerges, T., Dabbish, E., Sloan, R.: Power analysis on modular exponentiation in smartcards. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol.\u00a01717, pp. 144\u2013157. Springer, Heidelberg (1999)"},{"key":"15_CR14","unstructured":"O\u2019Neil, S., Gittins, B., Landman, H.: VEST. Hardware-Dedicated Stream Ciphers (2005)"},{"key":"15_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/978-3-540-45238-6_4","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"S.B. Ors","year":"2003","unstructured":"Ors, S.B., Oswald, E., Preneel, B.: Power-analysis attacks on an FPGA - first experimental results. In: D.Walter, C., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 35\u201350. Springer, Heidelberg (2003)"},{"key":"15_CR16","unstructured":"Rechberger, C., Oswald, E.: Stream ciphers and side channel analysis. In: SASC 2004, pp. 320\u2013327 (2004)"},{"key":"15_CR17","unstructured":"Rechberger, C.: Side Channel Analysis of Stream Ciphers. Master\u2019s thesis, Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Austria (2004)"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 AFRICACRYPT 2008"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-68164-9_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T04:38:50Z","timestamp":1620016730000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-68164-9_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540681595","9783540681649"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-68164-9_15","relation":{},"subject":[]}}