{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T21:57:27Z","timestamp":1767995847026,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642272561","type":"print"},{"value":"9783642272578","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-27257-8_8","type":"book-chapter","created":{"date-parts":[[2011,12,11]],"date-time":"2011-12-11T19:50:42Z","timestamp":1323633042000},"page":"115-132","source":"Crossref","is-referenced-by-count":26,"title":["Fresh Re-keying II: Securing Multiple Parties against Side-Channel and Fault Attacks"],"prefix":"10.1007","author":[{"given":"Marcel","family":"Medwed","sequence":"first","affiliation":[]},{"given":"Christoph","family":"Petit","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Regazzoni","sequence":"additional","affiliation":[]},{"given":"Mathieu","family":"Renauld","sequence":"additional","affiliation":[]},{"given":"Fran\u00e7ois-Xavier","family":"Standaert","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"The Department of Computer Science at Duke University, Discrete Mathematics for Computer Science lecture, Chapter 18: Probability in hashing (2009), \n                    \n                      http:\/\/www.cs.duke.edu\/courses\/cps102\/spring09\/Lectures\/L-18.pdf"},{"issue":"4","key":"8_CR2","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1109\/TC.2003.1190590","volume":"52","author":"G. Bertoni","year":"2003","unstructured":"Bertoni, G., Breveglieri, L., Koren, I., Maistri, P., Piuri, V.: Error Analysis and Detection Procedures for a Hardware Implementation of the Advanced Encryption Standard. IEEE Trans. Computers\u00a052(4), 492\u2013505 (2003)","journal-title":"IEEE Trans. Computers"},{"key":"8_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-540-77360-3_6","volume-title":"Selected Areas in Cryptography","author":"A. Bogdanov","year":"2007","unstructured":"Bogdanov, A.: Improved Side-Channel Collision Attacks on AES. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, vol.\u00a04876, pp. 84\u201395. Springer, Heidelberg (2007)"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1007\/3-540-48405-1_26","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"S. Chari","year":"1999","unstructured":"Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards Sound Approaches to Counteract Power-Analysis Attacks. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 398\u2013412. Springer, Heidelberg (1999)"},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/978-3-642-14623-7_2","volume-title":"Advances in Cryptology \u2013 CRYPTO 2010","author":"Y. Dodis","year":"2010","unstructured":"Dodis, Y., Pietrzak, K.: Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol.\u00a06223, pp. 21\u201340. Springer, Heidelberg (2010)"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Dziembowski, S., Pietrzak, K.: Leakage-Resilient Cryptography. In: FOCS, pp. 293\u2013302. IEEE Computer Society (2008)","DOI":"10.1109\/FOCS.2008.56"},{"key":"8_CR7","unstructured":"Feldhofer, M., Popp, T.: Power Analysis Resistant AES Implementation for Passive RFID Tags. In: Lackner, C., Ostermann, T., Sams, M., Spilka, R. (eds.) Proceedings of Austrochip 2008, Linz, Austria, October 8, pp. 1\u20136 (2008) ISBN 978-3-200-01330-8"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-642-21969-6_10","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2011","author":"L. Genelle","year":"2011","unstructured":"Genelle, L., Prouff, E., Quisquater, M.: Montgomery\u2019s Trick and Fast Implementation of Masked AES. In: Nitaj, A., Pointcheval, D. (eds.) AFRICACRYPT 2011. LNCS, vol.\u00a06737, pp. 153\u2013169. Springer, Heidelberg (2011)"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1007\/3-540-36400-5_16","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"J.D. Golic","year":"2003","unstructured":"Golic, J.D., Tymen, C.: Multiplicative Masking and Power Analysis of AES. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 198\u2013212. Springer, Heidelberg (2003)"},{"key":"8_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/3-540-48059-5_15","volume-title":"Cryptographic Hardware and Embedded Systems","author":"L. Goubin","year":"1999","unstructured":"Goubin, L., Patarin, J.: DES and Differential Power Analysis (The \u201dDuplication\u201d Method). In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol.\u00a01717, pp. 158\u2013172. Springer, Heidelberg (1999)"},{"key":"8_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/11767480_16","volume-title":"Applied Cryptography and Network Security","author":"C. Herbst","year":"2006","unstructured":"Herbst, C., Oswald, E., Mangard, S.: An AES Smart Card Implementation Resistant to Power Analysis Attacks. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol.\u00a03989, pp. 239\u2013252. Springer, Heidelberg (2006)"},{"issue":"12","key":"8_CR12","doi-asserted-by":"publisher","first-page":"1509","DOI":"10.1109\/TCAD.2002.804378","volume":"21","author":"R. Karri","year":"2002","unstructured":"Karri, R., Wu, K., Mishra, P., Kim, Y.: Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphers. IEEE Trans. on CAD of Integrated Circuits and Systems\u00a021(12), 1509\u20131517 (2002)","journal-title":"IEEE Trans. on CAD of Integrated Circuits and Systems"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S.: Experimental Security Analysis of a Modern Automobile. In: IEEE Symposium on Security and Privacy, pp. 447\u2013462. IEEE Computer Society (2010)","DOI":"10.1109\/SP.2010.34"},{"key":"8_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-540-28632-5_13","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"H. Ledig","year":"2004","unstructured":"Ledig, H., Muller, F., Valette, F.: Enhancing Collision Attacks. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 176\u2013190. Springer, Heidelberg (2004)"},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/3-540-36552-4_24","volume-title":"Information Security and Cryptology - ICISC 2002","author":"S. Mangard","year":"2003","unstructured":"Mangard, S.: A Simple Power-Analysis (SPA) Attackon Implementations of the AES Key Expansion. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol.\u00a02587, pp. 343\u2013358. Springer, Heidelberg (2003)"},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","year":"2010","unstructured":"Mangard, S., Standaert, F.-X. (eds.): CHES 2010. LNCS, vol.\u00a06225. Springer, Heidelberg (2010)"},{"key":"8_CR17","unstructured":"McEvoy, R.P., Tunstall, M., Whelan, C., Murphy, C.C., Marnane, W.P.: All-or-Nothing Transforms as a Countermeasure to Differential Side-Channel Analysis. Cryptology ePrint Archive, Report 2009\/185 (2009), \n                    \n                      http:\/\/eprint.iacr.org\/"},{"key":"8_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1007\/978-3-642-23951-9_17","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"M. Medwed","year":"2011","unstructured":"Medwed, M., Standaert, F.-X.: Extractors against Side-Channel Attacks: Weak or Strong? In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol.\u00a06917, pp. 256\u2013272. Springer, Heidelberg (2011)"},{"key":"8_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/978-3-642-12678-9_17","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2010","author":"M. Medwed","year":"2010","unstructured":"Medwed, M., Standaert, F.-X., Gro\u00dfsch\u00e4dl, J., Regazzoni, F.: Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol.\u00a06055, pp. 279\u2013296. Springer, Heidelberg (2010)"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Oren, Y., Kirschbaum, M., Popp, T., Wool, A.: Algebraic Side-Channel Analysis in the Presence of Errors. In: Mangard, Standaert (eds.) [16], pp. 428\u2013442","DOI":"10.1007\/978-3-642-15031-9_29"},{"key":"8_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1007\/978-3-642-01001-9_27","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"K. Pietrzak","year":"2009","unstructured":"Pietrzak, K.: A Leakage-Resilient Mode of Operation. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol.\u00a05479, pp. 462\u2013482. Springer, Heidelberg (2009)"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Plos, T., Feldhofer, M.: Hardware Implementation of a Flexible Tag Platform for Passive RFID Devices. In: Proceedings of the 14th Euromicro Conference on Digital System Design Architectures, Methods and Tools (DSD 2011), Oulu, Finland, August 2010, pp. xxx\u2013xxx. IEEE Computer Society (2011)","DOI":"10.1109\/DSD.2011.43"},{"key":"8_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-642-04138-9_8","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"M. Renauld","year":"2009","unstructured":"Renauld, M., Standaert, F.-X., Veyrat-Charvillon, N.: Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol.\u00a05747, pp. 97\u2013111. Springer, Heidelberg (2009)"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Rivain, M., Prouff, E.: Provably Secure Higher-Order Masking of AES. In: Mangard, Standaert (eds.) [16], pp. 413\u2013427","DOI":"10.1007\/978-3-642-15031-9_28"},{"key":"8_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/978-3-540-39887-5_16","volume-title":"Fast Software Encryption","author":"K. Schramm","year":"2003","unstructured":"Schramm, K., Wollinger, T., Paar, C.: A New Class of Collision Attacks and Its Application to DES. In: Johansson, T. (ed.) FSE 2003. LNCS, vol.\u00a02887, pp. 206\u2013222. Springer, Heidelberg (2003)"},{"key":"8_CR26","unstructured":"Standaert, F.-X.: Leakage Resilient Cryptography: a Practical Overview. Invited talk, ECRYPT Workshop on Symmetric Encryption (SKEW 2011), Copenhagen, Denmark (February 2011), \n                    \n                      http:\/\/perso.uclouvain.be\/fstandae\/PUBLIS\/96_slides.pdf"},{"key":"8_CR27","first-page":"105","volume-title":"Towards Hardware Intrinsic Security: Foundation and Practice (book chapter)","author":"F.-X. Standaert","year":"2010","unstructured":"Standaert, F.-X., Pereira, O., Yu, Y., Quisquater, J.-J., Yung, M., Oswald, E.: Leakage Resilient Cryptography in Practice. In: Towards Hardware Intrinsic Security: Foundation and Practice (book chapter), pp. 105\u2013139. Springer, Heidelberg (2010)"},{"key":"8_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-540-45238-6_11","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"K. Tiri","year":"2003","unstructured":"Tiri, K., Verbauwhede, I.: Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 125\u2013136. Springer, Heidelberg (2003)"},{"key":"8_CR29","doi-asserted-by":"crossref","unstructured":"Tiri, K., Verbauwhede, I.: A Logic Level Design Methodology for a Secure DPA Resistant ASIC or FPGA Implementation. In: DATE, pp. 246\u2013251. IEEE Computer Society (2004)","DOI":"10.1109\/DATE.2004.1268856"},{"key":"8_CR30","first-page":"577","volume-title":"SEC","author":"J. VanLaven","year":"2005","unstructured":"VanLaven, J., Brehob, M., Compton, K.J.: Side Channel Analysis, Fault Injection and Applications - A Computationally Feasible SPA Attack on AES via Optimized Search. In: Sasaki, R., Qing, S., Okamoto, E., Yoshiura, H. (eds.) SEC, pp. 577\u2013588. Springer, Heidelberg (2005)"},{"key":"8_CR31","doi-asserted-by":"crossref","unstructured":"Yu, Y., Standaert, F.-X., Pereira, O., Yung, M.: Practical leakage-resilient pseudorandom generators. In: Al-Shaer, E., Keromytis, A.D., Shmatikov, V. (eds.) ACM Conference on Computer and Communications Security, pp. 141\u2013151. ACM (2010)","DOI":"10.1145\/1866307.1866324"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27257-8_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:59:21Z","timestamp":1606168761000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27257-8_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642272561","9783642272578"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27257-8_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}