{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T18:38:45Z","timestamp":1760985525860,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662538869"},{"type":"electronic","value":"9783662538876"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-662-53887-6_20","type":"book-chapter","created":{"date-parts":[[2016,11,8]],"date-time":"2016-11-08T12:11:21Z","timestamp":1478607081000},"page":"548-572","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations"],"prefix":"10.1007","author":[{"given":"Daniel P.","family":"Martin","sequence":"first","affiliation":[]},{"given":"Luke","family":"Mather","sequence":"additional","affiliation":[]},{"given":"Elisabeth","family":"Oswald","sequence":"additional","affiliation":[]},{"given":"Martijn","family":"Stam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,9]]},"reference":[{"issue":"271","key":"20_CR1","first-page":"901","volume":"50","author":"J Aitchison","year":"1955","unstructured":"Aitchison, J.: On the distribution of a positive random variable having a discrete probability mass at the origin. J. Am. Stat. Assoc. 50(271), 901\u2013908 (1955)","journal-title":"J. Am. Stat. Assoc."},{"key":"20_CR2","first-page":"221","volume":"2015","author":"DJ Bernstein","year":"2015","unstructured":"Bernstein, D.J., Lange, T., van Vredendaal, C.: Tighter, faster, simpler side-channel security evaluations beyond computing power. IACR Cryptology ePrint Arch. 2015, 221 (2015)","journal-title":"IACR Cryptology ePrint Arch."},{"key":"20_CR3","first-page":"795","volume":"2015","author":"A Bogdanov","year":"2015","unstructured":"Bogdanov, A., Kizhvatov, I., Manzoor, K., Tischhauser, E., Witteman, M.: Fast and memory-efficient key recovery in side-channel attacks. IACR Cryptology ePrint Arch. 2015, 795 (2015)","journal-title":"IACR Cryptology ePrint Arch."},{"key":"20_CR4","volume-title":"The Jackknife, the Bootstrap, and Other Resampling Plans","author":"E Bradley","year":"1982","unstructured":"Bradley, E.: The Jackknife, the Bootstrap, and Other Resampling Plans. Society for Industrial and Applied Mathematics, Philadelphia (1982)"},{"key":"20_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"E Brier","year":"2004","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16\u201329. Springer, Heidelberg (2004). doi:10.1007\/978-3-540-28632-5_2"},{"key":"20_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/978-3-662-46800-5_16","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2015","author":"A Duc","year":"2015","unstructured":"Duc, A., Faust, S., Standaert, F.-X.: Making masking security proofs concrete. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9056, pp. 401\u2013429. Springer, Heidelberg (2015). doi:10.1007\/978-3-662-46800-5_16"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Duc, A., Faust, S., Standaert, F.: Making masking security proofs concrete - or how to evaluate the security of any leaking device (extended version). Cryptology ePrint Archive, Report 2014\/119 (2015). http:\/\/eprint.iacr.org\/","DOI":"10.1007\/978-3-662-46800-5_16"},{"key":"20_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/978-3-642-33027-8_14","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2012","author":"Y Fei","year":"2012","unstructured":"Fei, Y., Luo, Q., Ding, A.A.: A statistical model for DPA with novel algorithmic confusion analysis. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol. 7428, pp. 233\u2013250. Springer, Heidelberg (2012). doi:10.1007\/978-3-642-33027-8_14"},{"issue":"1","key":"20_CR9","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1111\/j.1469-1809.1947.tb02410.x","volume":"14","author":"DJ Finney","year":"1947","unstructured":"Finney, D.J.: The truncated binomial distribution. Ann. Eugenics 14(1), 319\u2013328 (1947)","journal-title":"Ann. Eugenics"},{"key":"20_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-3-662-48116-5_6","volume-title":"Fast Software Encryption","author":"C Glowacz","year":"2015","unstructured":"Glowacz, C., Grosso, V., Poussier, R., Sch\u00fcth, J., Standaert, F.-X.: Simpler and more efficient rank estimation for side-channel security assessment. In: Leander, G. (ed.) FSE 2015. LNCS, vol. 9054, pp. 117\u2013129. Springer, Heidelberg (2015). doi:10.1007\/978-3-662-48116-5_6"},{"key":"20_CR11","volume-title":"Practitioner\u2019s Guide to Resampling Methods","author":"P Good","year":"2012","unstructured":"Good, P.: Practitioner\u2019s Guide to Resampling Methods. CRC Press, Boca Raton (2012)"},{"key":"20_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"620","DOI":"10.1007\/978-3-662-48324-4_31","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2015","author":"J Longo","year":"2015","unstructured":"Longo, J., De Mulder, E., Page, D., Tunstall, M.: SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip. In: G\u00fcneysu, T., Handschuh, H. (eds.) CHES 2015. LNCS, vol. 9293, pp. 620\u2013640. Springer, Heidelberg (2015). doi:10.1007\/978-3-662-48324-4_31"},{"issue":"2","key":"20_CR13","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1049\/iet-ifs.2010.0096","volume":"5","author":"S Mangard","year":"2011","unstructured":"Mangard, S., Oswald, E., Standaert, F.-X.: One for all - all for one: unifying standard DPA attacks. IET Inf. Secur. 5(2), 100\u2013110 (2011)","journal-title":"IET Inf. Secur."},{"key":"20_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/978-3-662-48800-3_13","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2015","author":"DP Martin","year":"2015","unstructured":"Martin, D.P., O\u2019Connell, J.F., Oswald, E., Stam, M.: Counting keys in parallel after a side channel attack. In: Iwata, T., Cheon, J.H. (eds.) ASIACRYPT 2015. LNCS, vol. 9453, pp. 313\u2013337. Springer, Heidelberg (2015). doi:10.1007\/978-3-662-48800-3_13"},{"key":"20_CR15","unstructured":"Massey, J.L.: Guessing and entropy. In: IEEE International Symposium on Information Theory, p. 204 (1994)"},{"key":"20_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-319-31271-2_8","volume-title":"Smart Card Research and Advanced Applications","author":"R Poussier","year":"2016","unstructured":"Poussier, R., Grosso, V., Standaert, F.-X.: Comparing approaches to rank estimation for side-channel security evaluations. In: Homma, N., Medwed, M. (eds.) CARDIS 2015. LNCS, vol. 9514, pp. 125\u2013142. Springer, Heidelberg (2016). doi:10.1007\/978-3-319-31271-2_8"},{"issue":"6","key":"20_CR17","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1109\/TC.2009.15","volume":"58","author":"E Prouff","year":"2009","unstructured":"Prouff, E., Rivain, M., Bevan, R.: Statistical analysis of second order differential power analysis. IEEE Trans. Comput. 58(6), 799\u2013811 (2009)","journal-title":"IEEE Trans. Comput."},{"key":"20_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/978-3-642-04159-4_11","volume-title":"Selected Areas in Cryptography","author":"M Rivain","year":"2009","unstructured":"Rivain, M.: On the exact success rate of side channel analysis in the Gaussian model. In: Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol. 5381, pp. 165\u2013183. Springer, Heidelberg (2009). doi:10.1007\/978-3-642-04159-4_11"},{"key":"20_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/11545262_3","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"W Schindler","year":"2005","unstructured":"Schindler, W., Lemke, K., Paar, C.: A stochastic model for differential side channel cryptanalysis. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 30\u201346. Springer, Heidelberg (2005). doi:10.1007\/11545262_3"},{"key":"20_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/978-3-642-01001-9_26","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"F-X Standaert","year":"2009","unstructured":"Standaert, F.-X., Malkin, T.G., Yung, M.: A unified framework for the analysis of side-channel key recovery attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 443\u2013461. Springer, Heidelberg (2009). doi:10.1007\/978-3-642-01001-9_26"},{"key":"20_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-642-40349-1_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2013","author":"A Thillard","year":"2013","unstructured":"Thillard, A., Prouff, E., Roche, T.: Success through confidence: evaluating the effectiveness of a side-channel attack. In: Bertoni, G., Coron, J.-S. (eds.) CHES 2013. LNCS, vol. 8086, pp. 21\u201336. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-40349-1_2"},{"key":"20_CR22","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1214\/aoms\/1177706647","volume":"29","author":"J Tukey","year":"1958","unstructured":"Tukey, J.: Bias and confidence in not quite large samples. Ann. Math. Stat. 29, 614\u2013623 (1958)","journal-title":"Ann. Math. Stat."},{"key":"20_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1007\/978-3-642-35999-6_25","volume-title":"Selected Areas in Cryptography","author":"N Veyrat-Charvillon","year":"2013","unstructured":"Veyrat-Charvillon, N., G\u00e9rard, B., Renauld, M., Standaert, F.-X.: An optimal key enumeration algorithm and its application to side-channel attacks. In: Knudsen, L.R., Wu, H. (eds.) SAC 2012. LNCS, vol. 7707, pp. 390\u2013406. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-35999-6_25"},{"key":"20_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/978-3-642-38348-9_8","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2013","author":"N Veyrat-Charvillon","year":"2013","unstructured":"Veyrat-Charvillon, N., G\u00e9rard, B., Standaert, F.-X.: Security evaluations beyond computing power. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 126\u2013141. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-38348-9_8"},{"key":"20_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-3-319-16763-3_13","volume-title":"Smart Card Research and Advanced Applications","author":"X Ye","year":"2015","unstructured":"Ye, X., Eisenbarth, T., Martin, W.: Bounded, yet sufficient? how to determine whether limited side channel information enables key recovery. In: Joye, M., Moradi, A. (eds.) CARDIS 2014. LNCS, vol. 8968, pp. 215\u2013232. Springer, Heidelberg (2015). doi:10.1007\/978-3-319-16763-3_13"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2016"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-53887-6_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T17:08:31Z","timestamp":1710263311000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-53887-6_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783662538869","9783662538876"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-53887-6_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"9 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASIACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Application of Cryptology and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hanoi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 December 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asiacrypt2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.asiacrypt2016.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}