{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T11:52:27Z","timestamp":1725882747700},"publisher-location":"Singapore","reference-count":18,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811041532"},{"type":"electronic","value":"9789811041549"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-4154-9_31","type":"book-chapter","created":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T04:29:21Z","timestamp":1489724961000},"page":"266-273","source":"Crossref","is-referenced-by-count":2,"title":["Timing Side Channel Attack on Key Derivation Functions"],"prefix":"10.1007","author":[{"given":"Chai Wen","family":"Chuah","sequence":"first","affiliation":[]},{"given":"Wen Wen","family":"Koh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,18]]},"reference":[{"key":"31_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-540-68351-3_7","volume-title":"New Stream Cipher Designs","author":"M Boesgaard","year":"2008","unstructured":"Boesgaard, M., Vesterager, M., Zenner, E.: The Rabbit stream cipher. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol. 4986, pp. 69\u201383. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-68351-3_7"},{"issue":"5","key":"31_CR2","doi-asserted-by":"crossref","first-page":"701","DOI":"10.1016\/j.comnet.2005.01.010","volume":"48","author":"D Brumley","year":"2005","unstructured":"Brumley, D., Boneh, D.: Remote timing attacks are practical. Comput. Netw. 48(5), 701\u2013716 (2005)","journal-title":"Comput. Netw."},{"key":"31_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/978-3-540-68351-3_18","volume-title":"New Stream Cipher Designs","author":"C Canni\u00e8re","year":"2008","unstructured":"Canni\u00e8re, C., Preneel, B.: Trivium. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol. 4986, pp. 244\u2013266. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-68351-3_18"},{"key":"31_CR4","doi-asserted-by":"crossref","unstructured":"Chen, L.: NIST SP 800-56C: Recommendation for Key Derivation through Extraction-then-Expansion. Technical report, NIST (2011)","DOI":"10.6028\/NIST.SP.800-56c"},{"key":"31_CR5","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-642-39218-4_10","volume-title":"Security and Privacy Protection in Information Processing Systems","author":"CW Chuah","year":"2013","unstructured":"Chuah, C.W., Dawson, E., Simpson, L.: Key derivation function: the SCKDF scheme. In: Janczewski, L.J., Wolfe, H.B., Shenoi, S. (eds.) SEC 2013. IAICT, vol. 405, pp. 125\u2013138. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-39218-4_10"},{"key":"31_CR6","unstructured":"Eastlake, D., Hansen, T.: RFC 6234: US Secure Hash Algorithms. Technical report, Internet Engineering Task Force (2011)"},{"key":"31_CR7","doi-asserted-by":"crossref","first-page":"1198","DOI":"10.1007\/978-1-4419-5906-5_516","volume-title":"Encyclopedia of Cryptography and Security","author":"M Joye","year":"2011","unstructured":"Joye, M., Olivier, F.: Side-channel analysis. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security, pp. 1198\u20131204. Springer, Heidelberg (2011)"},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"Kaliski, B.: RFC 2898: PKCS# 5, Password-based Cryptography Specification version 2.0. Technical report, Internet Engineering Task Force (2000)","DOI":"10.17487\/rfc2898"},{"issue":"1","key":"31_CR9","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s13389-011-0006-y","volume":"1","author":"P Kocher","year":"2011","unstructured":"Kocher, P., Jaffe, J., Jun, B., Rohatgi, P.: Introduction to differential power analysis. J. Cryptographic Eng. 1(1), 5\u201327 (2011)","journal-title":"J. Cryptographic Eng."},{"key":"31_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology \u2014 CRYPTO 1996","author":"PC Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104\u2013113. Springer, Heidelberg (1996). doi: 10.1007\/3-540-68697-5_9"},{"key":"31_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1007\/978-3-642-14623-7_34","volume-title":"Advances in Cryptology \u2013 CRYPTO 2010","author":"H Krawczyk","year":"2010","unstructured":"Krawczyk, H.: Cryptographic extraction and key derivation: the HKDF scheme. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 631\u2013648. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-14623-7_34"},{"key":"31_CR12","doi-asserted-by":"crossref","unstructured":"Krawczyk, H., Eronen, P.: HMAC-based Extract-and-Expand Key Derivation Function (HKDF). Technical report, RFC 5869 (2010)","DOI":"10.17487\/rfc5869"},{"key":"31_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"620","DOI":"10.1007\/978-3-662-48324-4_31","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2015","author":"J Longo","year":"2015","unstructured":"Longo, J., Mulder, E., Page, D., Tunstall, M.: SoC It to EM: electromagnetic side-channel attacks on a complex system-on-chip. In: G\u00fcneysu, T., Handschuh, H. (eds.) CHES 2015. LNCS, vol. 9293, pp. 620\u2013640. Springer, Heidelberg (2015). doi: 10.1007\/978-3-662-48324-4_31"},{"key":"31_CR14","unstructured":"McGrew, D., Weis, B.: Key Derivation Functions and Their Uses (2010)"},{"key":"31_CR15","unstructured":"SP NIST. 800-108: Recommendation for Key Derivation Using Pseudorandom Functions (2009)"},{"key":"31_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-68351-3_1","volume-title":"New Stream Cipher Designs","author":"M Robshaw","year":"2008","unstructured":"Robshaw, M.: The eSTREAM project. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol. 4986, pp. 1\u20136. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-68351-3_1"},{"key":"31_CR17","unstructured":"Song, J., Poovendran, R., Lee, J., Iwata, T.: The AES-CMAC algorithm. Technical report (2006)"},{"key":"31_CR18","unstructured":"Song, J.H., Poovendran, R., Lee, J., Iwata, T.: RFC 4493: The AES-CMAC Algorithm. Technical report, Internet Engineering Task Force (2005)"}],"container-title":["Lecture Notes in Electrical Engineering","Information Science and Applications 2017"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-4154-9_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,4]],"date-time":"2020-10-04T01:15:24Z","timestamp":1601774124000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-4154-9_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811041532","9789811041549"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-4154-9_31","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2017]]}}}