{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2020,6,27]],"date-time":"2020-06-27T18:43:48Z","timestamp":1593283428474},"publisher-location":"Berlin, Heidelberg","reference-count":49,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642144516","type":"print"},{"value":"9783642144523","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14452-3_5","type":"book-chapter","created":{"date-parts":[[2010,11,2]],"date-time":"2010-11-02T16:30:15Z","timestamp":1288715415000},"page":"99-134","source":"Crossref","is-referenced-by-count":49,"title":["Leakage Resilient Cryptography in Practice"],"prefix":"10.1007","author":[{"given":"Fran\u00e7ois-Xavier","family":"Standaert","sequence":"first","affiliation":[]},{"given":"Olivier","family":"Pereira","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Jean-Jacques","family":"Quisquater","sequence":"additional","affiliation":[]},{"given":"Moti","family":"Yung","sequence":"additional","affiliation":[]},{"given":"Elisabeth","family":"Oswald","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,10,12]]},"reference":[{"key":"5_CR1","author":"A. Akavia","first-page":"474","year":"2009","unstructured":"A. Akavia, S. Goldwasser, V. Vaikuntanathan, in Simultaneous Hardcore Bits and Cryptography Against Memory Attacks. Proceedings of TCC 2009, San Francisco, CA, USA. Lecture Notes in Computer Science, vol. 5444 (Springer, Berlin, Heidelberg, Mar 2009), pp. 474\u2013495","volume-title":"Simultaneous Hardcore Bits and Cryptography Against Memory Attacks"},{"key":"5_CR2","author":"M.L. Akkar","first-page":"489","year":"2001","unstructured":"M.L. Akkar, R. B\u00e9van, P. Dischamp, D. Moyart, in Power Analysis, What Is Now Possible.... Proceedings of ASIACRYPT 2001, Kyoto, Japan. Lecture Notes in Computer Science, vol. 1976 (Springer, Berlin, Heidelberg, New York, Dec 2001), pp. 489\u2013502","volume-title":"Power Analysis, What Is Now Possible..."},{"key":"5_CR3","author":"R. Anderson","first-page":"1","year":"1996","unstructured":"R. Anderson, M. Kuhn, in Tamper Resistance - A Cautionary Note, USENIX Workshop on Electronic Commerce, Oakland, CA, USA, Nov 1996, pp 1\u201311","volume-title":"Tamper Resistance - A Cautionary Note"},{"key":"5_CR4","author":"M. Bellare","first-page":"394","year":"1997","unstructured":"M. Bellare, A. Desai, E. Jokipii, P. Rogaway, in A Concrete Security Treatment of Symmetric Encryption. Proceedings of FOCS 1997, Miami, FL, USA, Oct 1997, pp. 394\u2013403.","volume-title":"A Concrete Security Treatment of Symmetric Encryption"},{"key":"5_CR5","author":"M. Bellare","first-page":"1","year":"2003","unstructured":"M. Bellare, B. Yee, in Forward-Security in Private-Key Cryptography. Proceedings of CT-RSA 03, San Francisco, CA, USA. Lecture Notes in Computer Science, vol. 2612 (Springer, Heidelberg, Apr 2003), pp. 1\u201318","volume-title":"Forward-Security in Private-Key Cryptography"},{"issue":"4","key":"5_CR6","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1137\/0213053","volume":"13","author":"M. Blum","year":"1984","unstructured":"M. Blum, S. Micali, How to generate cryptographically strong sequences of pseudo-random bits. SIAM J. Comput. 13(4), 850\u2013863 (1984)","journal-title":"SIAM J. Comput."},{"key":"5_CR7","unstructured":"C. Cachin, Entropy Measures and Unconditional Security in Cryptography. Ph.D. thesis, ETH Dissertation, num 12187, 1997"},{"key":"5_CR8","author":"S. Chari","first-page":"398","year":"1999","unstructured":"S. Chari, C.S. Jutla, J.R. Rao, P. Rohatgi, in Towards Sound Approaches to Counteract Power-Analysis Attacks. Proceedings of CRYPTO 1999, Santa Barbara, CA, USA. Lecture Notes in Computer Science, vol. 1666 (Springer, Berlin, Heidelberg, New York, Aug 1999), pp. 398\u2013412","volume-title":"Towards Sound Approaches to Counteract Power-Analysis Attacks"},{"key":"5_CR9","author":"J. Daemen","first-page":"222","year":"2001","unstructured":"J. Daemen, V. Rijmen, in The Wide Trail Design Strategy. Proceedings of Cryptography and Coding, 8th IMA International Conference, Cirencester, UK. Lecture Notes in Computer Science, vol. 2260 (Springer, Berlin, Dec 2001), pp. 222\u2013238","volume-title":"The Wide Trail Design Strategy"},{"key":"5_CR10","unstructured":"Y. Dodis, Y. Tauman Kalai, S. Lovett, On Cryptography with Auxiliary Input, in the proceedings of STOC 2009, pp 621-630, Bethesda, Maryland, USA, June 2009.","DOI":"10.1145\/1536414.1536498","doi-asserted-by":"crossref"},{"key":"5_CR11","unstructured":"T\u00e9l\u00e9com ParisTech, The DPA Contest, http:\/\/www.dpacontest.org\/"},{"key":"5_CR12","author":"S. Dziembowski","first-page":"293","year":"2008","unstructured":"S. Dziembowski, K. Pietrzak, in Leakage-Resilient Cryptography. Proceedings of FOCS 2008, Washington, DC, USA, Oct 2008, pp. 293\u2013302","volume-title":"Leakage-Resilient Cryptography"},{"key":"5_CR13","author":"T. Eisenbarth","first-page":"203","year":"2008","unstructured":"T. Eisenbarth, T. Kasper, A. Moradi, C. Paar, M. Salmasizadeh, M.T. Manzuri Shalmani, in On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme. Proceedings of CRYPTO 2008, Santa Barbara, CA, USA. Lecture Notes in Computer Science, vol. 5157 (Springer, Berlin, Heidelberg, Aug 2008), pp. 203\u2013220","volume-title":"On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme"},{"key":"5_CR14","unstructured":"ECRYPT Network of Excellence in Cryptology, The Side-Channel Cryptanalysis Lounge, http:\/\/www.crypto.ruhr-uni-bochum.de\/ensclounge.html"},{"key":"5_CR15","unstructured":"ECRYPT Network of Excellence in Cryptology, The eSTREAM Project, http:\/\/www.ecrypt.eu.org\/stream\/ , http:\/\/www.ecrypt.eu.org\/stream\/call\/"},{"key":"5_CR16","unstructured":"S. Faust, L. Reyzin, E. Tromer, Protecting Circuits from Computationally-Bounded Leakage, Cryptology ePrint Archive, Report 2009\/379","DOI":"10.1007\/978-3-642-13190-5_7","doi-asserted-by":"crossref"},{"key":"5_CR17","author":"R. Gennaro","first-page":"258","year":"2004","unstructured":"R. Gennaro, A. Lysyanskaya, T. Malkin, S. Micali, T. Rabin, in Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering. Proceedings of TCC 2004, Cambridge, MA, USA. Lecture Notes in Computer Science, vol. 2951 (Springer, Berlin, Feb 2004), pp. 258\u2013277","volume-title":"Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering"},{"issue":"4","key":"5_CR18","doi-asserted-by":"publisher","first-page":"792","DOI":"10.1145\/6490.6503","volume":"33","author":"O. Goldreich","year":"1986","unstructured":"O. Goldreich, S. Goldwasser, S. Micali, How to construct random functions. J. ACM 33(4), 792\u2013807 (1986)","journal-title":"J. ACM"},{"key":"5_CR19","author":"L. Goubin","first-page":"158","year":"1999","unstructured":"L. Goubin, J. Patarin, in DES and Differential Power Analysis. Proceedings of CHES 1999, Worcester, MA, USA. Lecture Notes in Computer Science, vol. 1717 (Springer, Berlin, Aug 1999), pp. 158\u2013172","volume-title":"DES and Differential Power Analysis"},{"key":"5_CR20","author":"J.A. Halderman","first-page":"45","year":"2008","unstructured":"J.A Halderman, S.D. Schoen, N. Heninger, W. Clarkson, J.A. Calandrino, A.J. Feldman, J. Appelbaum, E.W. Felten, in Lest We Remember: Cold Boot Attacks on Encryption Keys. Proceedings of the USENIX Security Symposium 2008, San Jose, CA, USA, Aug 2008, pp. 45\u201360","volume-title":"Lest We Remember: Cold Boot Attacks on Encryption Keys"},{"key":"5_CR21","author":"C. Hsiao","first-page":"169","year":"2007","unstructured":"C. Hsiao, C. Lu, L. Reyzin, in Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility. Proceedings of EUROCRYPT 2007, Barcelona, Spain. Lecture Notes in Computer Science, vol. 4515 (Springer, Berlin, May 2007), pp. 169\u2013186","volume-title":"Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility"},{"key":"5_CR22","author":"Y. Ishai","first-page":"463","year":"2003","unstructured":"Y. Ishai, A. Sahai, D. Wagner, in Private Circuits: Securing Hardware against Probing Attacks. Proceedings of Crypto 2003, Santa Barbara, CA, USA. Lecture Notes in Computer Science, vol. 2729 (Springer, Berlin, Aug 2003), pp. 463\u2013481","volume-title":"Private Circuits: Securing Hardware against Probing Attacks"},{"key":"5_CR23","author":"P. Junod","first-page":"114","year":"2004","unstructured":"P. Junod, S. Vaudenay, in FOX: A New Family of Block Ciphers. Proceedings of SAC 2004, Waterloo, Canada. Lecture Notes in Computer Science, vol. 3357, (Springer, Heidelberg, Aug 2004), pp. 114\u2013129","volume-title":"FOX: A New Family of Block Ciphers"},{"key":"5_CR24","author":"J. Katz","first-page":"115","year":"2007","unstructured":"J. Katz, in Universally Composable Multi-Party Computation Using Tamper-Proof Hardware. Proceedings of EUROCRYPT 2007, Barcelona, Spain. Lecture Notes in Computer Science, vol. 4515 (Springer, Berlin, Heidelberg, May 2007), pp. 115\u2013128","volume-title":"Universally Composable Multi-Party Computation Using Tamper-Proof Hardware"},{"key":"5_CR25","author":"L.R. Knudsen","first-page":"211","year":"1993","unstructured":"L.R. Knudsen, in Practically Secure Feistel Ciphers. Proceedings FSE 1993, Cambridge, UK. Lecture Notes in Computer Science, vol. 809 (Springer, Berlin, Heidelberg, Dec 1993), pp. 211\u2013221","volume-title":"Practically Secure Feistel Ciphers"},{"key":"5_CR26","author":"P. Kocher","first-page":"398","year":"1999","unstructured":"P. Kocher, J. Jaffe, B. Jun, in Differential Power Analysis. Proceedings of Crypto 1999, Santa Barbara, CA, USA. Lecture Notes in Computer Science, vol. 1666 (Springer, Berlin, Heidelberg, New York, Aug 1999), pp. 398\u2013412","volume-title":"Differential Power Analysis"},{"key":"5_CR27","unstructured":"P. Kocher, Leak Resistant Cryptographic Indexed Key Update, U.S. Patent 6539092, 2003"},{"key":"5_CR28","author":"P. Kocher","year":"2005","unstructured":"P. Kocher, in Design and Validation Strategies for Obtaining Assurance in Countermeasures to Power Analysis and Related Attacks. Proceedings of the NIST Physical Security Workshop, Honolulu, HI, USA, Sept 2005","volume-title":"Design and Validation Strategies for Obtaining Assurance in Countermeasures to Power Analysis and Related Attacks"},{"key":"5_CR29","author":"B. K\u00f6pf","first-page":"286","year":"2007","unstructured":"B. K\u00f6pf, D. Basin, in An Information Theoretic Model for Adaptive Side-Channel Attacks. Proceedings of the ACM Conference on Computer and Communications Security 2007, Alexandria, VA, USA, Oct 2007, pp. 286\u2013296","volume-title":"An Information Theoretic Model for Adaptive Side-Channel Attacks"},{"issue":"2","key":"5_CR30","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1137\/0217022","volume":"17","author":"M. Luby","year":"1988","unstructured":"M. Luby, C. Rackoff, How to construct pseudorandom permutations from pseudorandom functions. SIAM J. Comput. 17(2), 373\u2013386 (1988)","journal-title":"SIAM J. Comput."},{"key":"5_CR31","author":"S. Micali","first-page":"278","year":"2004","unstructured":"S. Micali, L. Reyzin, in Physically Observable Cryptography. Proceedings of TCC 2004, Cambridge, MA, USA. Lecture Notes in Computer Science, vol. 2951 (Springer, Heidelberg, Feb 2004), pp. 278\u2013296","volume-title":"Physically Observable Cryptography"},{"key":"5_CR32","author":"T.S. Messerges","first-page":"238","year":"2000","unstructured":"T.S. Messerges, in Using Second-Order Power Analysis to Attack DPA Resistant Software. Proceedings of CHES 2000, Worcester, MA, USA. Lecture Notes in Computer Science, vol. 2523 (Springer, Berlin, Heidelberg, New York, Aug 2000), pp. 238\u2013251","volume-title":"Using Second-Order Power Analysis to Attack DPA Resistant Software"},{"key":"5_CR33","author":"C. Petit","first-page":"56","year":"2008","unstructured":"C. Petit, F.-X. Standaert, O. Pereira, T.G. Malkin, M. Yung, in A Block Cipher Based PRNG Secure Against Side-Channel Key Recovery. Proceedings of ASIACCS 2008, Tokyo, Japan, Mar 2008, pp. 56\u201365","volume-title":"A Block Cipher Based PRNG Secure Against Side-Channel Key Recovery"},{"key":"5_CR34","author":"K. Pietrzak","first-page":"462","year":"2009","unstructured":"K. Pietrzak, in A Leakage-Resilient Mode of Operation. Proceedings of Eurocrypt 2009, Cologne, Germany. Lecture Notes in Computer Science, vol. 5479 (Springer, Berlin, Heidelberg, Apr 2009), pp. 462\u2013482","volume-title":"A Leakage-Resilient Mode of Operation"},{"key":"5_CR35","author":"K. Pietrzak","year":"2009","unstructured":"K. Pietrzak, in Provable Security for Physical Cryptography, invited talk. Proceedings of WEWORC 2009, Graz, Austria, July 2009","volume-title":"Provable Security for Physical Cryptography, invited talk"},{"key":"5_CR36","unstructured":"M. Renauld, F.-X. Standaert, Algebraic Side-Channel Attacks, Cryptology ePrint Archive: Report 2009\/279","DOI":"10.1007\/978-3-642-16342-5_29","doi-asserted-by":"crossref"},{"key":"5_CR37","author":"M. Renauld","first-page":"97","year":"2009","unstructured":"M. Renauld, F.-X. Standaert, N. Veyrat-Charvillon, in Algebraic Side-Channel Attacks on the AES: Why Time Also Matters in DPA. Proceedings of CHES 2009, Lausanne, Switzerland. Lecture Notes in Computer Science, vol. 5746 (Springer, Berlin, Sept 2009), pp. 97\u2013111","volume-title":"Algebraic Side-Channel Attacks on the AES: Why Time Also Matters in DPA"},{"key":"5_CR38","unstructured":"RCIS (Research Center for Information Security), SASEBO (Side-Channel Attack Standard Evaluation Boards), http:\/\/www.rcis.aist.go.jp\/special\/SASEBO\/"},{"key":"5_CR39","author":"W. Schindler","first-page":"30","year":"2005","unstructured":"W. Schindler, K. Lemke, C. Paar, in A Stochastic Model for Differential Side-Channel Cryptanalysis. Proceedings of CHES 2005, Edinburgh, Scotland. Lecture Notes in Computer Science, vol. 3659 (Springer, Berlin, Sept 2005), pp. 30\u201346","volume-title":"A Stochastic Model for Differential Side-Channel Cryptanalysis"},{"key":"5_CR40","author":"K. Schramm","first-page":"206","year":"2003","unstructured":"K. Schramm, T.J. Wollinger, C. Paar, in A New Class of Collision Attacks and Its Application to DES. Proceedings of FSE 2003, Lund, Sweden. Lecture Notes in Computer Science, vol. 2887 (Springer, Heidelberg, Feb 2003), pp. 206\u2013222","volume-title":"A New Class of Collision Attacks and Its Application to DES"},{"issue":"2","key":"5_CR41","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1049\/iet-ifs:20070017","volume":"2","author":"N. Smart","year":"2008","unstructured":"N. Smart, D. Page, E. Oswald, Randomised representations. IET Inf. Secur. 2(2), 19\u201327 (June 2008)","journal-title":"IET Inf. Secur."},{"key":"5_CR42","unstructured":"F.-X. Standaert, T.G. Malkin, M. Yung, in A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks. Proceedings of Eurocrypt 2009, Cologne, Germany. Lecture Notes in Computer Science, vol. 5479 (Springer, Berlin, Heidelberg, Apr 2009), pp. 443\u2013461, extended version available on the Cryptology ePrint Archive, Report 2006\/139, http:\/\/eprint.iacr.org\/2006\/139","DOI":"10.1007\/978-3-642-01001-9_26","doi-asserted-by":"crossref"},{"key":"5_CR43","author":"F.-X. Standaert","first-page":"30","year":"2006","unstructured":"F.-X. Standaert, E. Peeters, C. Archambeau, J.-J. Quisquater, in Towards Security Limits in Side-Channel Attacks. Proceedings of CHES 2006, Yokohama, Japan, Oct 2006. Lecture Notes in Computer Science, vol. 4249 (Springer, Heidelberg, 2006), pp. 30\u201345, latest version available on the Cryptology ePrint Archive, Report 2007\/222, http:\/\/eprint.iacr.org\/2007\/222 .","volume-title":"Towards Security Limits in Side-Channel Attacks"},{"key":"5_CR44","author":"F.-X. Standaert","first-page":"411","year":"2008","unstructured":"F.-X. Standaert, C. Archambeau, in Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages. Proceedings of CHES 2008, Washington, DC, USA. Lecture Notes in Computer Science, vol. 5154 (Springer, Berlin, Heidelberg, Aug 2008), pp. 411\u2013425","volume-title":"Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages"},{"key":"5_CR45","author":"F.-X. Standaert","first-page":"253","year":"2008","unstructured":"F.-X. Standaert, B. Gierlichs, I. Verbauwhede, in Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks. Proceedings of ICISC 2008, Seoul, Korea. Lecture Notes in Computer Science, vol. 5461 (Springer, Berlin, Dec 2008), pp. 253\u2013267","volume-title":"Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks"},{"key":"5_CR46","unstructured":"F.-X. Standaert, P. Bulens, G. de Meulenaer, N. Veyrat-Charvillon, Improving the Rules of the DPA Contest, Cryptology ePrint Archive, Report 2006\/139, http:\/\/eprint.iacr.org\/2006\/139"},{"key":"5_CR47","author":"K. Tiri","year":"2003","unstructured":"K. Tiri, M. Akmal, I. Verbauwhede, A Dynamic and Differential CMOS Logic with Signal Independent Power Consumption to Withstand Differential Power Analysis on Smart Cards, ESSCIRC 2003, Estoril, Portugal, September 2003","volume-title":"A Dynamic and Differential CMOS Logic with Signal Independent Power Consumption to Withstand Differential Power Analysis on Smart Cards"},{"issue":"4","key":"5_CR48","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/s00145-003-0220-6","volume":"16","author":"S. Vaudenay","year":"2003","unstructured":"S. Vaudenay, Decorrelation: a theory for block cipher security. J. Cryptol. 16(4), 249\u2013286 (2003)","journal-title":"J. Cryptol."},{"key":"5_CR49","author":"A.C. Yao","first-page":"80","year":"1982","unstructured":"A.C. Yao, in Theory and Applications of Trapdoor Functions (Extended Abstract). Proceedings of FOCS 1982, Chicago, IL, USA, Nov 1982, pp. 80\u201391","volume-title":"Theory and Applications of Trapdoor Functions (Extended Abstract)"}],"container-title":["Information Security and Cryptography","Towards Hardware-Intrinsic Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14452-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T01:30:03Z","timestamp":1559784603000},"score":1.0,"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642144516","9783642144523"],"references-count":49,"URL":"http:\/\/dx.doi.org\/10.1007\/978-3-642-14452-3_5","relation":{"cites":[]},"ISSN":["1619-7100"],"issn-type":[{"value":"1619-7100","type":"print"}]}}