{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:25:32Z","timestamp":1725899132446},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642385186"},{"type":"electronic","value":"9783642385193"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38519-3_3","type":"book-chapter","created":{"date-parts":[[2013,5,2]],"date-time":"2013-05-02T07:59:28Z","timestamp":1367481568000},"page":"29-45","source":"Crossref","is-referenced-by-count":6,"title":["Improved Differential Cache Attacks on SMS4"],"prefix":"10.1007","author":[{"given":"Phuong Ha","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Chester","family":"Rebeiro","sequence":"additional","affiliation":[]},{"given":"Debdeep","family":"Mukhopadhyay","sequence":"additional","affiliation":[]},{"given":"Huaxiong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Specification of SMS4, Block Cipher for WLAN Products- SMS4 (in Chinese), http:\/\/www.oscca.gov.cn\/UpFile\/2006210116423197990.pdf"},{"key":"3_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/11935308_9","volume-title":"Information and Communications Security","author":"O. Ac\u0131i\u00e7mez","year":"2006","unstructured":"Ac\u0131i\u00e7mez, O., Ko\u00e7, \u00c7.K.: Trace-Driven Cache Attacks on AES (Short Paper). In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol.\u00a04307, pp. 112\u2013121. Springer, Heidelberg (2006)"},{"key":"3_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/11967668_18","volume-title":"Topics in Cryptology \u2013 CT-RSA 2007","author":"O. Ac\u0131i\u00e7mez","year":"2006","unstructured":"Ac\u0131i\u00e7mez, O., Schindler, W., Ko\u00e7, \u00c7.K.: Cache Based Remote Timing Attack on the AES. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol.\u00a04377, pp. 271\u2013286. Springer, Heidelberg (2006)"},{"key":"3_CR4","unstructured":"Bernstein, D.J.: Cache-timing Attacks on AES. Tech. rep. (2005)"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Bertoni, G., Zaccaria, V., Breveglieri, L., Monchiero, M., Palermo, G.: AES Power Attack Based on Induced Cache Miss and Countermeasure. In: ITCC (1), pp. 586\u2013591. IEEE Computer Society (2005)","DOI":"10.1109\/ITCC.2005.62"},{"issue":"5","key":"3_CR6","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1016\/j.comnet.2005.01.010","volume":"48","author":"D. Brumley","year":"2005","unstructured":"Brumley, D., Boneh, D.: Remote Timing Attacks are Practical. Computer Networks\u00a048(5), 701\u2013716 (2005)","journal-title":"Computer Networks"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Crosby, S.A., Wallach, D.S., Riedi, R.H.: Opportunities and Limits of Remote Timing Attacks. ACM Trans. Inf. Syst. Secur.\u00a012(3) (2009)","DOI":"10.1145\/1455526.1455530"},{"key":"3_CR8","unstructured":"Diffie, W., Ledin, G.: SMS4 Encryption Algorithm for Wireless Networks (translated). Cryptology ePrint Archive, Report 2008\/329 (2008), http:\/\/eprint.iacr.org\/"},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/11780656_2","volume-title":"Information Security and Privacy","author":"J.J.A. Fournier","year":"2006","unstructured":"Fournier, J.J.A., Tunstall, M.: Cache Based Power Analysis Attacks on AES. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol.\u00a04058, pp. 17\u201328. Springer, Heidelberg (2006)"},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-3-642-17955-6_18","volume-title":"Information Security Applications","author":"J.F. Gallais","year":"2011","unstructured":"Gallais, J.F., Kizhvatov, I., Tunstall, M.: Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations. In: Chung, Y., Yung, M. (eds.) WISA 2010. LNCS, vol.\u00a06513, pp. 243\u2013257. Springer, Heidelberg (2011)"},{"issue":"2,3","key":"3_CR11","doi-asserted-by":"crossref","first-page":"141","DOI":"10.3233\/JCS-2000-82-304","volume":"8","author":"J. Kelsey","year":"2000","unstructured":"Kelsey, J., Schneier, B., Wagner, D., Hall, C.: Side Channel Cryptanalysis of Product Ciphers. J. Comput. Secur.\u00a08(2,3), 141\u2013158 (2000)","journal-title":"J. Comput. Secur."},{"issue":"4","key":"3_CR12","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/j.ipl.2010.11.011","volume":"111","author":"R. Li","year":"2011","unstructured":"Li, R., Sun, B., Li, C., You, J.: Differential Fault Analysis on SMS4 using a single fault. Inf. Process. Lett.\u00a0111(4), 156\u2013163 (2011)","journal-title":"Inf. Process. Lett."},{"key":"3_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-540-73458-1_13","volume-title":"Information Security and Privacy","author":"F. Liu","year":"2007","unstructured":"Liu, F., Ji, W., Hu, L., Ding, J., Lv, S., Pyshkin, A., Weinmann, R.P.: Analysis of the SMS4 Block Cipher. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol.\u00a04586, pp. 158\u2013170. Springer, Heidelberg (2007)"},{"key":"3_CR14","first-page":"169","volume":"2002","author":"D. Page","year":"2002","unstructured":"Page, D.: Theoretical use of cache memory as a cryptanalytic side-channel. IACR Cryptology ePrint Archive\u00a02002, 169 (2002)","journal-title":"IACR Cryptology ePrint Archive"},{"key":"3_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-642-24586-2_13","volume-title":"Security Aspects in Information Technology","author":"R. Poddar","year":"2011","unstructured":"Poddar, R., Datta, A., Rebeiro, C.: A Cache Trace Attack on CAMELLIA. In: Joye, M., Mukhopadhyay, D., Tunstall, M. (eds.) InfoSecHiComNet 2011. LNCS, vol.\u00a07011, pp. 144\u2013156. Springer, Heidelberg (2011)"},{"key":"3_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/978-3-642-19074-2_7","volume-title":"Topics in Cryptology \u2013 CT-RSA 2011","author":"C. Rebeiro","year":"2011","unstructured":"Rebeiro, C., Mukhopadhyay, D.: Cryptanalysis of CLEFIA Using Differential Methods with Cache Trace Patterns. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol.\u00a06558, pp. 89\u2013103. Springer, Heidelberg (2011)"},{"key":"3_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/978-3-642-10628-6_7","volume-title":"Progress in Cryptology - INDOCRYPT 2009","author":"C. Rebeiro","year":"2009","unstructured":"Rebeiro, C., Mukhopadhyay, D., Takahashi, J., Fukunaga, T.: Cache Timing Attacks on CLEFIA. In: Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. LNCS, vol.\u00a05922, pp. 104\u2013118. Springer, Heidelberg (2009)"},{"key":"3_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/978-3-642-25578-6_6","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2011","author":"C. Rebeiro","year":"2011","unstructured":"Rebeiro, C., Poddar, R., Datta, A., Mukhopadhyay, D.: An Enhanced Differential Cache Attack on CLEFIA for Large Cache Lines. In: Bernstein, D.J., Chatterjee, S. (eds.) INDOCRYPT 2011. LNCS, vol.\u00a07107, pp. 58\u201375. Springer, Heidelberg (2011)"},{"key":"3_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/978-3-540-74619-5_25","volume-title":"Fast Software Encryption","author":"K. Tiri","year":"2007","unstructured":"Tiri, K., Ac\u0131i\u00e7mez, O., Neve, M., Andersen, F.: An analytical model for time-driven cache attacks. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol.\u00a04593, pp. 399\u2013413. Springer, Heidelberg (2007)"},{"key":"3_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-540-45238-6_6","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"Y. Tsunoo","year":"2003","unstructured":"Tsunoo, Y., Saito, T., Suzaki, T., Shigeri, M., Miyauchi, H.: Cryptanalysis of DES Implemented on Computers with Cache. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 62\u201376. Springer, Heidelberg (2003)"},{"key":"3_CR21","unstructured":"Tsunoo, Y., Tsujihara, E., Minematsu, K., Miyauchi, H.: Cryptanalysis of Block Ciphers Implemented on Computers with Cache. In: International Symposium on Information Theory and Its Applications, pp. 803\u2013806 (2002)"},{"issue":"3","key":"3_CR22","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/s10207-005-0079-7","volume":"5","author":"Y. Tsunoo","year":"2006","unstructured":"Tsunoo, Y., Tsujihara, E., Shigeri, M., Kubo, H., Minematsu, K.: Improving Cache Attacks by Considering Cipher Structure. Int. J. Inf. Sec.\u00a05(3), 166\u2013176 (2006)","journal-title":"Int. J. Inf. Sec."},{"key":"3_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1007\/978-3-642-32946-3_23","volume-title":"Financial Cryptography and Data Security","author":"M. Wei\u00df","year":"2012","unstructured":"Wei\u00df, M., Heinz, B., Stumpf, F.: A cache timing attack on AES in virtualization environments. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol.\u00a07397, pp. 314\u2013328. Springer, Heidelberg (2012)"},{"key":"3_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/978-3-540-70500-0_16","volume-title":"Information Security and Privacy","author":"L. Zhang","year":"2008","unstructured":"Zhang, L., Zhang, W., Wu, W.: Cryptanalysis of Reduced-Round SMS4 Block Cipher. In: Mu, Y., Susilo, W., Seberry, J. (eds.) ACISP 2008. LNCS, vol.\u00a05107, pp. 216\u2013229. Springer, Heidelberg (2008)"},{"key":"3_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-642-29912-4_17","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"X. Zhao","year":"2012","unstructured":"Zhao, X., Zhang, F., Guo, S., Wang, T., Shi, Z., Liu, H., Ji, K.: MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation. In: Schindler, W., Huss, S.A. (eds.) COSADE 2012. LNCS, vol.\u00a07275, pp. 231\u2013248. Springer, Heidelberg (2012)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38519-3_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,13]],"date-time":"2019-07-13T08:40:18Z","timestamp":1563007218000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38519-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642385186","9783642385193"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38519-3_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}