{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T14:44:48Z","timestamp":1725461088270},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642372872"},{"type":"electronic","value":"9783642372889"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37288-9_16","type":"book-chapter","created":{"date-parts":[[2013,3,5]],"date-time":"2013-03-05T13:37:43Z","timestamp":1362490663000},"page":"234-247","source":"Crossref","is-referenced-by-count":2,"title":["SCA with Magnitude Squared Coherence"],"prefix":"10.1007","author":[{"given":"Sebastien","family":"Tiran","sequence":"first","affiliation":[]},{"given":"Philippe","family":"Maurine","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/3-540-36552-4_23","volume-title":"Information Security and Cryptology - ICISC 2002","author":"R. B\u00e9van","year":"2003","unstructured":"B\u00e9van, R., Knudsen, E.: Ways to enhance differential power analysis. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol.\u00a02587, pp. 327\u2013342. Springer, Heidelberg (2003)"},{"unstructured":"Bohl, E., Hayek, J., Schimmel, O., Duplys, P., Rosenstiel, W.: Correlation power analysis in frequency domain. In: COSADE, Darmstadt, Germany (2010)","key":"16_CR2"},{"key":"16_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"E. Brier","year":"2004","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 16\u201329. Springer, Heidelberg (2004)"},{"unstructured":"Dehbaoui, A., Tiran, S., Maurine, P., Standaert, F.-X., Veyrat-Charvillon, N.: Spectral coherence analysis - first experimental results -. Cryptology ePrint Archive, Report 2011\/056 (2011), \n                    \n                      http:\/\/eprint.iacr.org\/","key":"16_CR4"},{"key":"16_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/11545262_19","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"C.H. Gebotys","year":"2005","unstructured":"Gebotys, C.H., Ho, S., Tiu, C.C.: EM Analysis of rijndael and ECC on a wireless java-based PDA. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol.\u00a03659, pp. 250\u2013264. Springer, Heidelberg (2005)"},{"key":"16_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/978-3-540-85053-3_27","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"B. Gierlichs","year":"2008","unstructured":"Gierlichs, B., Batina, L., Tuyls, P., Preneel, B.: Mutual information analysis \u2013 A generic side-channel distinguisher. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol.\u00a05154, pp. 426\u2013442. Springer, Heidelberg (2008)"},{"key":"16_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P.C. Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"doi-asserted-by":"crossref","unstructured":"Mateos, E., Gebotys, C.H.: A new correlation frequency analysis of the side channel. In: WESS, p. 4 (2010)","key":"16_CR8","DOI":"10.1145\/1873548.1873552"},{"key":"16_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/978-3-642-21518-6_33","volume-title":"Information Security and Cryptology","author":"O. Meynard","year":"2011","unstructured":"Meynard, O., R\u00e9al, D., Guilley, S., Flament, F., Danger, J.-L., Valette, F.: Characterization of the electromagnetic side channel in frequency domain. In: Lai, X., Yung, M., Lin, D. (eds.) Inscrypt 2010. LNCS, vol.\u00a06584, pp. 471\u2013486. Springer, Heidelberg (2011)"},{"key":"16_CR10","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/TAU.1967.1161901","volume":"15","author":"P.D. Welch","year":"1967","unstructured":"Welch, P.D.: The use of fast fourier transform for the estimation of power spectra: A method based on time averaging over short. IEEE Trans. Audio Electroacoustics\u00a015, 70\u201373 (1967)","journal-title":"IEEE Trans. Audio Electroacoustics"},{"key":"16_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-642-00730-9_16","volume-title":"Information Security and Cryptology \u2013 ICISC 2008","author":"F.-X. Standaert","year":"2009","unstructured":"Standaert, F.-X., Gierlichs, B., Verbauwhede, I.: Partition vs. Comparison side-channel distinguishers: An empirical evaluation of statistical tests for univariate side-channel attacks against two unprotected CMOS devices. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol.\u00a05461, pp. 253\u2013267. Springer, Heidelberg (2009)"},{"key":"16_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/978-3-642-01001-9_26","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"F.-X. Standaert","year":"2009","unstructured":"Standaert, F.-X., Malkin, T.G., Yung, M.: A unified framework for the analysis of side-channel key recovery attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol.\u00a05479, pp. 443\u2013461. Springer, Heidelberg (2009)"},{"unstructured":"Tiran, S., Dehbaoui, A., Maurine, P.: Magnitude squared coherence based SCA. Cryptology ePrint Archive, Report 2012\/077 (2012), \n                    \n                      http:\/\/eprint.iacr.org\/","key":"16_CR13"},{"key":"16_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/978-3-642-04138-9_30","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"N. Veyrat-Charvillon","year":"2009","unstructured":"Veyrat-Charvillon, N., Standaert, F.-X.: Mutual information analysis: How, when and why? In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol.\u00a05747, pp. 429\u2013443. Springer, Heidelberg (2009)"},{"key":"16_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/978-3-642-27257-8_15","volume-title":"Smart Card Research and Advanced Applications","author":"C. Whitnall","year":"2011","unstructured":"Whitnall, C., Oswald, E., Mather, L.: An exploration of the kolmogorov-smirnov test as a competitor to mutual information analysis. In: Prouff, E. (ed.) CARDIS 2011. LNCS, vol.\u00a07079, pp. 234\u2013251. Springer, Heidelberg (2011)"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37288-9_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T14:49:19Z","timestamp":1557586159000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37288-9_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642372872","9783642372889"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37288-9_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}