{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T20:49:14Z","timestamp":1762375754032},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642403910"},{"type":"electronic","value":"9783642403927"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40392-7_3","type":"book-chapter","created":{"date-parts":[[2013,8,19]],"date-time":"2013-08-19T20:58:40Z","timestamp":1376945920000},"page":"28-42","source":"Crossref","is-referenced-by-count":1,"title":["Related-Key Slide Attacks on Block Ciphers with Secret Components"],"prefix":"10.1007","author":[{"given":"Meltem","family":"S\u00f6nmez Turan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1049\/ip-ifs:20055006","volume":"152","author":"M. Feldhofer","year":"2005","unstructured":"Feldhofer, M., Wolkerstorfer, J., Rijmen, V.: AES Implementation on a Grain of Sand. IEE Proceedings \/ Information Security\u00a0152, 13\u201320 (2005)","journal-title":"IEE Proceedings \/ Information Security"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Hamalainen, P., Alho, T., Hannikainen, M., Hamalainen, T.D.: Design and Implementation of Low-Area and Low-Power AES Encryption Hardware Core. In: Proceedings of the 9th EUROMICRO Conference on Digital System Design, DSD 2006, pp. 577\u2013583. IEEE Computer Society, Washington, DC (2006)","DOI":"10.1109\/DSD.2006.40"},{"key":"3_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-642-20465-4_6","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2011","author":"A. Moradi","year":"2011","unstructured":"Moradi, A., Poschmann, A., Ling, S., Paar, C., Wang, H.: Pushing the Limits: A Very Compact and a Threshold Implementation of AES. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol.\u00a06632, pp. 69\u201388. Springer, Heidelberg (2011)"},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"A. Bogdanov","year":"2007","unstructured":"Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M., Seurin, Y., Vikkelsoe, C.: PRESENT: An Ultra-Lightweight Block Cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 450\u2013466. Springer, Heidelberg (2007)"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/11894063_4","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"D. Hong","year":"2006","unstructured":"Hong, D., Sung, J., Hong, S., Lim, J., Lee, S., Koo, B., Lee, C., Chang, D., Lee, J., Jeong, K., Kim, H., Kim, J., Chee, S.: HIGHT: A New Block Cipher Suitable for Low-Resource Device. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol.\u00a04249, pp. 46\u201359. Springer, Heidelberg (2006)"},{"key":"3_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/978-3-540-74619-5_13","volume-title":"Fast Software Encryption","author":"G. Leander","year":"2007","unstructured":"Leander, G., Paar, C., Poschmann, A., Schramm, K.: New Lightweight DES Variants. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol.\u00a04593, pp. 196\u2013210. Springer, Heidelberg (2007)"},{"key":"3_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-642-15031-9_2","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"L.R. Knudsen","year":"2010","unstructured":"Knudsen, L.R., Leander, G., Poschmann, A., Robshaw, M.J.B.: PRINTcipher: A Block Cipher for IC-Printing. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol.\u00a06225, pp. 16\u201332. Springer, Heidelberg (2010)"},{"key":"3_CR8","unstructured":"Wagner, D., Briceno, M., Goldberg, I.: A Pedagogical Implementation of the GSM A5\/1 and A5\/2 \u201dvoice privacy\u201d encryption algorithms, \n                    \n                      http:\/\/www.scard.org\/gsm\/a51.html\n                    \n                    \n                   (accessed January 23, 2013)"},{"key":"3_CR9","unstructured":"4C\u00a0Entity. C2 Block Cipher Specification, Revision 1.0, \n                    \n                      http:\/\/www.4centity.com\/"},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/978-3-642-03356-8_15","volume-title":"Advances in Cryptology - CRYPTO 2009","author":"J. Borghoff","year":"2009","unstructured":"Borghoff, J., Knudsen, L.R., Leander, G., Matusiewicz, K.: Cryptanalysis of C2. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol.\u00a05677, pp. 250\u2013266. Springer, Heidelberg (2009)"},{"key":"3_CR11","unstructured":"NRS 009-6-7:2002. Rationalized User Specification, Electricity Sales Systems, Part 6: Interface standards Section 7: Standard Transfer Specification\/Credit Dispensing Unit \u2013 Electricity dispenser \u2013 Token Encoding and Data Encryption and Decryption (2002)"},{"key":"3_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/978-3-642-21702-9_16","volume-title":"Fast Software Encryption","author":"J. Borghoff","year":"2011","unstructured":"Borghoff, J., Knudsen, L.R., Leander, G., Thomsen, S.S.: Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes. In: Joux, A. (ed.) FSE 2011. LNCS, vol.\u00a06733, pp. 270\u2013289. Springer, Heidelberg (2011)"},{"issue":"1","key":"3_CR13","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/s00145-011-9111-4","volume":"26","author":"J. Borghoff","year":"2013","unstructured":"Borghoff, J., Knudsen, L.R., Leander, G., Thomsen, S.S.: Slender-Set Differential Cryptanalysis. J. Cryptology\u00a026(1), 11\u201338 (2013)","journal-title":"J. Cryptology"},{"key":"3_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/3-540-48519-8_18","volume-title":"Fast Software Encryption","author":"A. Biryukov","year":"1999","unstructured":"Biryukov, A., Wagner, D.: Slide Attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol.\u00a01636, pp. 245\u2013259. Springer, Heidelberg (1999)"}],"container-title":["Lecture Notes in Computer Science","Lightweight Cryptography for Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40392-7_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T21:49:25Z","timestamp":1558302565000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40392-7_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642403910","9783642403927"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40392-7_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}