{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,14]],"date-time":"2025-02-14T05:24:33Z","timestamp":1739510673213,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642108679"},{"type":"electronic","value":"9783642108686"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10868-6_26","type":"book-chapter","created":{"date-parts":[[2009,12,2]],"date-time":"2009-12-02T05:17:15Z","timestamp":1259731035000},"page":"433-445","source":"Crossref","is-referenced-by-count":14,"title":["Cache Timing Analysis of LFSR-Based Stream Ciphers"],"prefix":"10.1007","author":[{"given":"Gregor","family":"Leander","sequence":"first","affiliation":[]},{"given":"Erik","family":"Zenner","sequence":"additional","affiliation":[]},{"given":"Philip","family":"Hawkes","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","unstructured":"Berbain, C., Billet, O., Canteaut, A., Courtois, N., Gilbert, H., Goubin, L., Gouget, A., Granboulan, L., Lauradoux, C., Minier, M., Pornin, T., Sibert, H.: SOSEMANUK, a fast software-oriented stream cipher. eStream submission (2005), http:\/\/www.ecrypt.eu.org\/stream\/sosemanuk.html"},{"key":"26_CR2","unstructured":"Bernstein, D.: Cache timing attacks on AES (2005), http:\/\/cr.yp.to\/papers.html#cachetiming"},{"key":"26_CR3","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1109\/ITCC.2005.62","volume-title":"International Symposium on Information Technology: Coding and Computing (ITCC 2005)","author":"G. Bertoni","year":"2005","unstructured":"Bertoni, G., Zaccaria, V., Breveglieri, L., Monchiero, M., Palermo, G.: AES power attack based on induced cache miss and countermeasure. In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), vol.\u00a01, pp. 586\u2013591. IEEE Computer Society, Los Alamitos (2005)"},{"key":"26_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/978-3-540-77360-3_7","volume-title":"Selected Areas in Cryptography","author":"J. Bl\u00f6mer","year":"2007","unstructured":"Bl\u00f6mer, J., Krummel, V.: Analysis of countermeasures against access driven cache attacks on AES. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, vol.\u00a04876, pp. 96\u2013109. Springer, Heidelberg (2007)"},{"key":"26_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/11894063_16","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"J. Bonneau","year":"2006","unstructured":"Bonneau, J., Mironov, I.: Cache-collision timing attacks against AES. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol.\u00a04249, pp. 201\u2013215. Springer, Heidelberg (2006)"},{"key":"26_CR6","unstructured":"Brickell, E., Graunke, G., Neve, M., Seifert, S.: Software mitigations to hedge AES against cache-based software side-channel vulnerabilities (2006), http:\/\/eprint.iacr.org\/2006\/052.pdf"},{"key":"26_CR7","unstructured":"Canteaut, A., Lauradoux, C., Seznec, A.: Understanding cache attacks. Technical Report 5881, INRIA (2006)"},{"key":"26_CR8","unstructured":"Ekdahl, P., Johansson, T.: SNOW - a new stream cipher. NESSIE project submission, http:\/\/www.it.lth.se\/cryptology\/snow\/"},{"key":"26_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-36492-7_5","volume-title":"Selected Areas in Cryptography","author":"P. Ekdahl","year":"2003","unstructured":"Ekdahl, P., Johansson, T.: A new version of the stream cipher SNOW. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol.\u00a02595, pp. 47\u201361. Springer, Heidelberg (2003)"},{"key":"26_CR10","unstructured":"Gierlichs, B., Batina, L., Clavier, C., Eisenbarth, T., Gouget, A., Handschuh, H., Kasper, T., Lemke-Rust, K., Mangard, S., Moradi, A., Oswald, E.: Susceptibility of eSTREAM candidates towards side channel analysis. In: de Canni\u00e8re, C., Dunkelmann, O. (eds.) SASC 2008 Workshop Record, pp. 123\u2013150 (2008)"},{"key":"26_CR11","unstructured":"Hawkes, P., Rose, G.: Primitive specification for Sober-128, http:\/\/www.qualcomm.com.au\/Sober128.html"},{"key":"26_CR12","volume-title":"Finite Fields","author":"R. Lidl","year":"1997","unstructured":"Lidl, R., Niederreiter, H.: Finite Fields. Cambridge University Press, Cambridge (1997)"},{"key":"26_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-540-74462-7_11","volume-title":"Selected Areas in Cryptography","author":"M. Neve","year":"2007","unstructured":"Neve, M., Seifert, J.: Advances on access-driven cache attacks on AES. In: Biham, E., Youssef, A.M. (eds.) SAC 2006. LNCS, vol.\u00a04356, pp. 147\u2013162. Springer, Heidelberg (2007)"},{"key":"26_CR14","unstructured":"Neve, M., Seifert, J., Wang, Z.: Cache time-behavior analysis on AES (2006), http:\/\/www.cryptologie.be\/document\/Publications\/AsiaCSS_full_06.pdf"},{"key":"26_CR15","first-page":"369","volume-title":"Proc. AsiaCSS 2006","author":"M. Neve","year":"2006","unstructured":"Neve, M., Seifert, J., Wang, Z.: A refined look at bernstein\u2019s AES side-channel analysis. In: Proc. AsiaCSS 2006, p. 369. ACM, New York (2006)"},{"key":"26_CR16","unstructured":"O\u2019Hanlon, M., Tonge, A.: Investigation of cache-timing attacks on AES (2005), http:\/\/www.computing.dcu.ie\/research\/papers\/2005\/0105.pdf"},{"key":"26_CR17","doi-asserted-by":"crossref","unstructured":"Osvik, D., Shamir, A., Tromer, E.: Cache attacks and countermeasures: The case of AES (2005), http:\/\/eprint.iacr.org\/2005\/271.pdf","DOI":"10.1007\/11605805_1"},{"key":"26_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11605805_1","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"D. Osvik","year":"2006","unstructured":"Osvik, D., Shamir, A., Tromer, E.: Cache attacks and countermeasures: The case of AES. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol.\u00a03860, pp. 1\u201320. Springer, Heidelberg (2006)"},{"key":"26_CR19","unstructured":"Page, D.: Theoretical use of cache memory as a cryptanalytic side-channel. Technical Report CSTR-02-003, University of Bristol (June 2002), http:\/\/www.cs.bris.ac.uk\/Publications\/pub_info.jsp?id=1000625"},{"key":"26_CR20","unstructured":"Percival, C.: Cache missing for fun and profit. Paper accompanying a talk at BSDCan 2005 (2005), http:\/\/www.daemonology.net\/papers\/htt.pdf"},{"key":"26_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1007\/978-3-540-39887-5_22","volume-title":"Fast Software Encryption","author":"G. Rose","year":"2003","unstructured":"Rose, G., Hawkes, P.: Turing: A fast stream cipher. In: Johansson, T. (ed.) FSE 2003. LNCS, vol.\u00a02887, pp. 290\u2013306. Springer, Heidelberg (2003)"},{"key":"26_CR22","unstructured":"Salembier, R.: Analysis of cache timing attacks against AES. Scholarly Paper, ECE Department, George Mason University, Virginia (May 2006), http:\/\/ece.gmu.edu\/courses\/ECE746\/project\/F06_Project_resources\/Salembier_Cache_Timing_Attack.pdf"},{"key":"26_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1007\/978-3-540-45238-6_6","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"Y. Tsunoo","year":"2003","unstructured":"Tsunoo, Y., Saito, T., Suzaki, T., Shigeri, M., Miayuchi, H.: Cryptanalysis of DES implemented on computers with cache. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 62\u201376. Springer, Heidelberg (2003)"},{"key":"26_CR24","unstructured":"Tsunoo, Y., Tsujihara, E., Minematsu, K., Miayuchi, H.: Cryptanalysis of block ciphers implemented on computers with cache. In: Proc. ISITA 2002 (2002)"},{"key":"26_CR25","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1145\/1250662.1250723","volume-title":"Proc. ISCA 2007","author":"Z. Wang","year":"2007","unstructured":"Wang, Z., Lee, R.: New cache designs for thwarting software cache-based side channel attacks. In: Proc. ISCA 2007, June 2007, pp. 494\u2013505. ACM, New York (2007)"},{"key":"26_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1007\/978-3-642-04159-4_13","volume-title":"SAC 2008","author":"E. Zenner","year":"2009","unstructured":"Zenner, E.: A cache timing analysis of HC-256. In: Avanzi, R., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol.\u00a05381, pp. 199\u2013213. Springer, Heidelberg (2009)"}],"container-title":["Lecture Notes in Computer Science","Cryptography and Coding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10868-6_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T15:24:39Z","timestamp":1739460279000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10868-6_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642108679","9783642108686"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10868-6_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}