{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T18:16:10Z","timestamp":1725732970733},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642387081"},{"type":"electronic","value":"9783642387098"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44709-3_2","type":"book-chapter","created":{"date-parts":[[2014,9,12]],"date-time":"2014-09-12T07:03:00Z","timestamp":1410505380000},"page":"17-34","source":"Crossref","is-referenced-by-count":7,"title":["A New Framework for Constraint-Based Probabilistic Template Side Channel Attacks"],"prefix":"10.1007","author":[{"given":"Yossef","family":"Oren","sequence":"first","affiliation":[]},{"given":"Ofir","family":"Weisse","sequence":"additional","affiliation":[]},{"given":"Avishai","family":"Wool","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Description of the masked AES of the DPA contest v4, \n                    \n                      http:\/\/www.dpacontest.org\/v4\/data\/rsm\/aes-rsm.pdf"},{"key":"2_CR2","unstructured":"DPA contest v4, \n                    \n                      http:\/\/www.dpacontest.org\/v4\/"},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"A.A. Bogdanov","year":"2007","unstructured":"Bogdanov, A.A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: An ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 450\u2013466. Springer, Heidelberg (2007)"},{"key":"2_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"E. Brier","year":"2004","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 16\u201329. Springer, Heidelberg (2004)"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-36400-5_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S. Chari","year":"2003","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 13\u201328. Springer, Heidelberg (2003)"},{"issue":"2","key":"2_CR6","first-page":"187","volume":"19","author":"R.T. Clemen","year":"1999","unstructured":"Clemen, R.T., Winkler, R.L.: Combining probability distributions from experts in risk analysis. Risk Analysis\u00a019(2), 187\u2013203 (1999)","journal-title":"Risk Analysis"},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-3-642-12678-9_15","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2010","author":"M.A. Elaabid","year":"2010","unstructured":"Elaabid, M.A., Guilley, S.: Practical improvements of profiled side-channel attacks on a hardware crypto-accelerator. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol.\u00a06055, pp. 243\u2013260. Springer, Heidelberg (2010)"},{"issue":"6","key":"2_CR8","doi-asserted-by":"publisher","first-page":"999","DOI":"10.1109\/TIFS.2014.2315534","volume":"9","author":"S. Guo","year":"2014","unstructured":"Guo, S., Zhao, X., Zhang, F., Wang, T., Shi, Z.J., Standaert, F., Ma, C.: Exploiting the incomplete diffusion feature: A specialized analytical side-channel attack against the aes and its application to microcontroller implementations. IEEE Transactions on Information Forensics and Security\u00a09(6), 999\u20131014 (2014)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"6","key":"2_CR9","doi-asserted-by":"publisher","first-page":"3351","DOI":"10.1090\/S0002-9947-2011-05340-7","volume":"363","author":"T. Hill","year":"2011","unstructured":"Hill, T.: Conflations of probability distributions. Transactions of the American Mathematical Society\u00a0363(6), 3351\u20133372 (2011)","journal-title":"Transactions of the American Mathematical Society"},{"issue":"8","key":"2_CR10","doi-asserted-by":"publisher","first-page":"1771","DOI":"10.1162\/089976602760128018","volume":"14","author":"G.E. Hinton","year":"2002","unstructured":"Hinton, G.E.: Training products of experts by minimizing contrastive divergence. Neural Computation\u00a014(8), 1771\u20131800 (2002)","journal-title":"Neural Computation"},{"key":"2_CR11","unstructured":"Kahn, J.M.: A generative bayesian model for aggregating experts\u2019 probabilities. In: Proceedings of the 20th Conference on Uncertainty in Artificial Intelligence, pp. 301\u2013308. AUAI Press (2004)"},{"key":"2_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P.C. Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"2_CR13","volume-title":"Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)","author":"S. Mangard","year":"2007","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security). Springer-Verlag New York, Inc., Secaucus (2007)"},{"issue":"3","key":"2_CR14","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s13389-013-0059-1","volume":"3","author":"M.S.E. Mohamed","year":"2013","unstructured":"Mohamed, M.S.E., Bulygin, S., Zohner, M., Heuser, A., Walter, M., Buchmann, J.: Improved algebraic side-channel attack on AES. Journal of Cryptographic Engineering\u00a03(3), 139\u2013156 (2013)","journal-title":"Journal of Cryptographic Engineering"},{"key":"2_CR15","unstructured":"Information Technology Laboratory (National\u00a0Institute of\u00a0Standards and Technology). Announcing the Advanced Encryption Standard (AES). Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Gaithersburg, MD (2001)"},{"key":"2_CR16","unstructured":"Oren, Y.: Secure hardware - physical attacks and countermeasures. PhD thesis, Tel-Aviv University, Isreal (2013), \n                    \n                      https:\/\/www.iacr.org\/phds\/?p=detail&entry=893"},{"key":"2_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1007\/978-3-642-15031-9_29","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"Y. Oren","year":"2010","unstructured":"Oren, Y., Kirschbaum, M., Popp, T., Wool, A.: Algebraic side-channel analysis in the presence of errors. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol.\u00a06225, pp. 428\u2013442. Springer, Heidelberg (2010)"},{"key":"2_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-642-33027-8_9","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2012","author":"Y. Oren","year":"2012","unstructured":"Oren, Y., Renauld, M., Standaert, F.-X., Wool, A.: Algebraic side-channel attacks beyond the hamming weight leakage model. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol.\u00a07428, pp. 140\u2013154. Springer, Heidelberg (2012)"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Oren, Y., Weisse, O., Wool, A.: Practical template-algebraic side channel attacks with extremely low data complexity. In: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, p. 7. ACM (2013)","DOI":"10.1145\/2487726.2487733"},{"key":"2_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/978-3-642-37288-9_15","volume-title":"Smart Card Research and Advanced Applications","author":"D. Oswald","year":"2013","unstructured":"Oswald, D., Paar, C.: Improving side-channel analysis with optimal linear transforms. In: Mangard, S. (ed.) CARDIS 2012. LNCS, vol.\u00a07771, pp. 219\u2013233. Springer, Heidelberg (2013)"},{"key":"2_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/978-3-642-16342-5_29","volume-title":"Information Security and Cryptology","author":"M. Renauld","year":"2010","unstructured":"Renauld, M., Standaert, F.-X.: Algebraic side-channel attacks. In: Bao, F., Yung, M., Lin, D., Jing, J. (eds.) Inscrypt 2009. LNCS, vol.\u00a06151, pp. 393\u2013410. Springer, Heidelberg (2010)"},{"key":"2_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-642-04138-9_8","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"M. Renauld","year":"2009","unstructured":"Renauld, M., Standaert, F.-X., Veyrat-Charvillon, N.: Algebraic side-channel attacks on the AES: Why time also matters in DPA. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol.\u00a05747, pp. 97\u2013111. Springer, Heidelberg (2009)"},{"key":"2_CR23","unstructured":"Stallings, W.: Cryptography and Network Security ch. 5, 6th edn. Pearson (2014)"},{"issue":"15","key":"2_CR24","doi-asserted-by":"publisher","first-page":"1139","DOI":"10.1587\/elex.7.1139","volume":"7","author":"T. Sugawara","year":"2010","unstructured":"Sugawara, T., Homma, N., Aoki, T., Satoh, A.: Profiling attack using multivariate regression analysis. IEICE Electronics Express\u00a07(15), 1139\u20131144 (2010)","journal-title":"IEICE Electronics Express"},{"key":"2_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1007\/978-3-642-35999-6_25","volume-title":"Selected Areas in Cryptography","author":"N. Veyrat-Charvillon","year":"2013","unstructured":"Veyrat-Charvillon, N., G\u00e9rard, B., Renauld, M., Standaert, F.-X.: An optimal key enumeration algorithm and its application to side-channel attacks. In: Knudsen, L.R., Wu, H. (eds.) SAC 2012. LNCS, vol.\u00a07707, pp. 390\u2013406. Springer, Heidelberg (2013)"},{"key":"2_CR26","unstructured":"Veyrat-Charvillon, N., G\u00e9rard, B., Standaert, F.-X.: Soft analytical side-channel attacks. Cryptology ePrint Archive, Report 2014\/410 (2014), \n                    \n                      http:\/\/eprint.iacr.org\/2014\/410"},{"key":"2_CR27","unstructured":"Weisse, O.: Source code of our constraint solver as submitted to DPA v4 contest, \n                    \n                      http:\/\/www.ofirweisse.com\n                    \n                    \n                   see DPA v4"},{"key":"2_CR28","unstructured":"Zhao, X., Wang, T., Guo, S., Zhang, F., Shi, Z., Liu, H., Wu, K.: SAT based error tolerant algebraic side-channel attacks. In: 2011 Conference on Cryptographic Algorithms and Cryptographic Chips, CASC (2011)"}],"container-title":["Lecture Notes in Computer Science","Advanced Information Systems Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44709-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,10,15]],"date-time":"2018-10-15T14:09:29Z","timestamp":1539612569000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-44709-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642387081","9783642387098"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44709-3_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}