{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:31:45Z","timestamp":1725568305343},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642168246"},{"type":"electronic","value":"9783642168253"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16825-3_19","type":"book-chapter","created":{"date-parts":[[2010,11,2]],"date-time":"2010-11-02T13:30:44Z","timestamp":1288704644000},"page":"285-300","source":"Crossref","is-referenced-by-count":11,"title":["Mutual Information Analysis under the View of Higher-Order Statistics"],"prefix":"10.1007","author":[{"given":"Thanh-Ha","family":"Le","sequence":"first","affiliation":[]},{"given":"Mael","family":"Berthier","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P. Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"issue":"5","key":"19_CR2","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"T.S. Messerges","year":"2002","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining Smart-Card Security under the Threat of Power Analysis Attacks. IEEE Transactions on Computer\u00a051(5), 541\u2013552 (2002)","journal-title":"IEEE Transactions on Computer"},{"key":"19_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/3-540-36552-4_23","volume-title":"Information Security and Cryptology - ICISC 2002","author":"R. Bevan","year":"2003","unstructured":"Bevan, R., Knudsen, E.: Ways to Enhance DPA. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol.\u00a02587, pp. 327\u2013342. Springer, Heidelberg (2003)"},{"key":"19_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/3-540-44499-8_6","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2000","author":"R. Mayer-Sommer","year":"2000","unstructured":"Mayer-Sommer, R.: Smartly analysing the simplicity and the power of simple power analysis on smartcards. In: Paar, C., Ko\u00e7, \u00c7.K. (eds.) CHES 2000. LNCS, vol.\u00a01965, pp. 78\u201392. Springer, Heidelberg (2000)"},{"key":"19_CR5","series-title":"Lecture Notes in Artificial Intelligence","first-page":"157","volume-title":"Engineering Societies in the Agents World","author":"J.S. Coron","year":"2000","unstructured":"Coron, J.S., Kocher, P., Naccache, D.: Statistics and Secret Leakage. In: Omicini, A., Tolksdorf, R., Zambonelli, F. (eds.) ESAW 2000. LNCS (LNAI), vol.\u00a01972, pp. 157\u2013173. Springer, Heidelberg (2000)"},{"key":"19_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"E. Brier","year":"2004","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 16\u201329. Springer, Heidelberg (2004)"},{"key":"19_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/978-3-540-85053-3_27","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"B. Gierlichs","year":"2008","unstructured":"Gierlichs, B., Batina, L., Tuyls, P., Preneel, B.: Mutual Information Analysis: A Generic Side-Channel Distinguisher. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol.\u00a05154, pp. 426\u2013442. Springer, Heidelberg (2008)"},{"key":"19_CR8","unstructured":"Aumonier, S.: Generalized Correlation Power Analysis. In: Proceedings of the Ecrypt Workshop Tools For Cryptanalysis 2007, Poland (September 2007)"},{"key":"19_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/978-3-642-01957-9_31","volume-title":"Applied Cryptography and Network Security","author":"E. Prouff","year":"2009","unstructured":"Prouff, E., Rivain, M.: Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol.\u00a05536, pp. 499\u2013518. Springer, Heidelberg (2009)"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Prouff, E., Rivain, M., Bevan, R.: Statistical Analysis of Second Order Differential Power Analysis. In: IEEE Transaction on Computers. LNCS, vol.\u00a05536, pp. 499\u2013518. Springer, Heidelberg","DOI":"10.1109\/TC.2009.15"},{"key":"19_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/978-3-642-04138-9_30","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"N. Veyrat-Charvillon","year":"2009","unstructured":"Veyrat-Charvillon, N., Standaert, F.-X.: Mutual Information Analysis: How, When and Why. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol.\u00a05747, pp. 429\u2013443. Springer, Heidelberg (2009)"},{"key":"19_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/978-3-642-10838-9_15","volume-title":"Information Security Applications","author":"A. Moradi","year":"2009","unstructured":"Moradi, A., Mousavi, N., Paar, C., Salmasizadeh, M.: A Comparative Study of Mutual Information Analysis under a Gaussian Assumption. In: Youm, H.Y., Yung, M. (eds.) WISA 2009. LNCS, vol.\u00a05932, pp. 193\u2013205. Springer, Heidelberg (2009)"},{"key":"19_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1007\/978-3-642-11925-5_16","volume-title":"CT-RSA 2010","author":"B. Gierlichs","year":"2010","unstructured":"Gierlichs, B., Batina, L., Preneel, B., Verbauwhede, I.: Revisiting Higher-Order DPA Attacks: Multivariate Mutual Information Analysis. In: Pieprzyk, J. (ed.) CT-RSA 2010. LNCS, vol.\u00a05985, pp. 221\u2013234. Springer, Heidelberg (2010)"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Daub, C.O., Steuer, R., Selbig, J., Kloska, S.: Estimating mutual information using B-spline functions - an improved similarity measure for analysing gene expression data. In: BMC Bioinformatics 2004 (2004), http:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC516800\/","DOI":"10.1186\/1471-2105-5-118"},{"issue":"3","key":"19_CR15","first-page":"287","volume":"36","author":"P. Comon","year":"1994","unstructured":"Comon, P.: Independent Component Analysis, A new concept? Special Issue on High-Order Statistics, Signal Processing\u00a036(3), 287\u2013314 (1994)","journal-title":"Special Issue on High-Order Statistics, Signal Processing"},{"key":"19_CR16","unstructured":"McCullagh, P.: Tensor methods in statistics, ch. 5. Chapman and Hall, London, http:\/\/www.stat.uchicago.edu\/~pmcc\/tensorbook\/"},{"key":"19_CR17","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1016\/j.jspi.2006.06.034","volume":"137","author":"P. Georgiev","year":"2006","unstructured":"Georgiev, P., Relescu, A., Ralescu, D.: Cross-cumulants measure for independence. Journal of Statistical Planning and Inference\u00a0137, 1085\u20131098 (2006)","journal-title":"Journal of Statistical Planning and Inference"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Dempster, A., Laird, N., Rubin, D.: Maximum likelihood for incomplete data via the EM algorithm. J. Roy. Statist. Soc., Ser., B\u00a039(1), 1\u201338 (1977)","DOI":"10.1111\/j.2517-6161.1977.tb01600.x"},{"key":"19_CR19","unstructured":"Flament, F., Guilley, S., Danger, J.-L., Elaabid, M.A., Maghrebi, H., Sauvage, L.: About Probability Density Function Estimation for Side Channel Analysis. In: Proceedings of First International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2010), Darmstadt, Germany (February 2010)"},{"key":"19_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1007\/3-540-48405-1_26","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"S. Chari","year":"1999","unstructured":"Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Toward sound approaches to counteract power analysis attacks. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 398\u2013412. Springer, Heidelberg (1999)"},{"key":"19_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/3-540-44499-8_19","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2000","author":"T.S. Messerges","year":"2000","unstructured":"Messerges, T.S.: Using second-order power analysis to attack DPA resistant software. In: Paar, C., Ko\u00e7, \u00c7.K. (eds.) CHES 2000. LNCS, vol.\u00a01965, pp. 238\u2013251. Springer, Heidelberg (2000)"},{"key":"19_CR22","unstructured":"DPA Contest 2008\/2009, http:\/\/projets.comelec.enst.fr\/dpacontest\/index.php"},{"key":"19_CR23","volume-title":"The advanced theory of statistics","author":"M.G. Kendall","year":"1963","unstructured":"Kendall, M.G., Stuart, A.: The advanced theory of statistics, 2nd edn. Charles Griffin & Company Limited, London (1963)","edition":"2"},{"key":"19_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-642-12368-9_2","volume-title":"Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices","author":"A. Venelli","year":"2010","unstructured":"Venelli, A.: Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines. In: Samarati, P., Tunstall, M., Posegga, J., Markantonakis, K., Sauveron, D. (eds.) WISTP 2010. LNCS, vol.\u00a06033, pp. 17\u201330. Springer, Heidelberg (2010)"}],"container-title":["Lecture Notes in Computer Science","Advances in Information and Computer Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16825-3_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,31]],"date-time":"2024-03-31T23:03:02Z","timestamp":1711926182000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16825-3_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642168246","9783642168253"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16825-3_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}