{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T13:30:43Z","timestamp":1772199043869,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":41,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819529605","type":"print"},{"value":"9789819529612","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T00:00:00Z","timestamp":1760054400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T00:00:00Z","timestamp":1760054400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-2961-2_20","type":"book-chapter","created":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T14:02:48Z","timestamp":1760364168000},"page":"387-406","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["DHABI FRAMEWORK: A Hybrid Approach to\u00a0Overcoming Resistance Against Statistical Cryptanalysis and\u00a0Side-Channel Analysis"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1604-5612","authenticated-orcid":false,"given":"Sumesh Manjunath","family":"Ramesh","sequence":"first","affiliation":[]},{"given":"Hoda","family":"Alkhzaimi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,10]]},"reference":[{"key":"20_CR1","unstructured":"McKay, K.A., Vora, P.L.: Analysis of ARX functions: pseudo-linear methods for approximation, differentials, and evaluating diffusion. IACR Cryptol. ePrint Arch. (2014). http:\/\/eprint.iacr.org\/2014\/895"},{"key":"20_CR2","unstructured":"Abed, F., List, E., Lucks, S., Wenzel, J.: Cryptanalysis of the speck family of block ciphers. IACR Cryptol. ePrint Arch. 568 (2013) http:\/\/eprint.iacr.org\/2013\/568"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Alzakari, S.A., Vora, P.L.: Partly-pseudo-linear cryptanalysis of reduced-round speck. Cryptography 5(1), 1 (2021)","DOI":"10.3390\/cryptography5010001"},{"key":"20_CR4","unstructured":"Ashur, T., Bodden, D.: Linear cryptanalysis of reduced-round speck (2016). https:\/\/www.esat.kuleuven.be\/cosic\/publications\/article-2666.pdf"},{"key":"20_CR5","doi-asserted-by":"publisher","unstructured":"Bhasin, S., Breier, J., Hou, X., Jap, D., Poussier, R., Sim, S.M.: SITM: see-in-the-middle side-channel assisted middle round differential cryptanalysis on SPN block ciphers. IACR Trans. Cryptographic Hardware Embedded Syst. 95\u2013122 (2020). https:\/\/doi.org\/10.13154\/tches.v2020.i1.95-122","DOI":"10.13154\/tches.v2020.i1.95-122"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Velichkov, V., Le Corre, Y.: Automatic search for the best trails in ARX: application to block cipher speck. In: International Conference on Fast Software Encryption. Springer, New York (2016)","DOI":"10.1007\/978-3-662-52993-5_15"},{"key":"20_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-642-21702-9_3","volume-title":"Fast Software Encryption","author":"C Blondeau","year":"2011","unstructured":"Blondeau, C., G\u00e9rard, B.: Multiple differential cryptanalysis: theory and practice. In: Joux, A. (ed.) FSE 2011. LNCS, vol. 6733, pp. 35\u201354. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-21702-9_3"},{"key":"20_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/978-3-319-99136-8_8","volume-title":"Information Security","author":"D Bodden","year":"2018","unstructured":"Bodden, D.: Linear cryptanalysis of reduced-round speck with a heuristic approach: automatic search for linear trails. In: Chen, L., Manulis, M., Schneider, S. (eds.) ISC 2018. LNCS, vol. 11060, pp. 132\u2013150. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99136-8_8"},{"key":"20_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-540-77360-3_6","volume-title":"Selected Areas in Cryptography","author":"A Bogdanov","year":"2007","unstructured":"Bogdanov, A.: Improved side-channel collision attacks on AES. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, vol. 4876, pp. 84\u201395. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-77360-3_6"},{"key":"20_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/978-3-540-85053-3_3","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"A Bogdanov","year":"2008","unstructured":"Bogdanov, A.: Multiple-differential side-channel collision attacks on AES. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 30\u201344. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85053-3_3"},{"key":"20_CR11","doi-asserted-by":"publisher","unstructured":"Breier, J., Jap, D., Bhasin, S.: SCADPA: side-channel assisted differential-plaintext attack on bit permutation based ciphers. In: 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 1129\u20131134 (2018). https:\/\/doi.org\/10.23919\/DATE.2018.8342180. iSSN: 1558-1101","DOI":"10.23919\/DATE.2018.8342180"},{"key":"20_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1007\/BFb0053450","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201994","author":"F Chabaud","year":"1995","unstructured":"Chabaud, F., Vaudenay, S.: Links between differential and linear cryptanalysis. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 356\u2013365. Springer, Heidelberg (1995). https:\/\/doi.org\/10.1007\/BFb0053450"},{"key":"20_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-540-25937-4_4","volume-title":"Fast Software Encryption","author":"JY Cho","year":"2004","unstructured":"Cho, J.Y., Pieprzyk, J.: Algebraic attacks on SOBER-t32 and SOBER-t16 without stuttering. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 49\u201364. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-25937-4_4"},{"key":"20_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-319-13051-4_9","volume-title":"Selected Areas in Cryptography \u2013 SAC 2014","author":"I Dinur","year":"2014","unstructured":"Dinur, I.: Improved differential cryptanalysis of round-reduced speck. In: Joux, A., Youssef, A. (eds.) SAC 2014. LNCS, vol. 8781, pp. 147\u2013164. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-13051-4_9"},{"key":"20_CR15","doi-asserted-by":"publisher","first-page":"16476","DOI":"10.1109\/ACCESS.2019.2894337","volume":"7","author":"AD Dwivedi","year":"2019","unstructured":"Dwivedi, A.D., Morawiecki, P., Srivastava, G.: Differential cryptanalysis of round-reduced speck suitable for internet of things devices. IEEE Access 7, 16476\u201316486 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2894337","journal-title":"IEEE Access"},{"key":"20_CR16","doi-asserted-by":"publisher","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4(1) (1991). https:\/\/doi.org\/10.1007\/BF00630563","DOI":"10.1007\/BF00630563"},{"key":"20_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"E Brier","year":"2004","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16\u201329. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-28632-5_2"},{"key":"20_CR18","unstructured":"Handschuh, H., Preneel, B.: Blind differential cryptanalysis for enhanced power attacks. In: Biham, E., Youssef, A.M. (eds.) Selected Areas in Cryptography, 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers. Lecture Notes in Computer Science, vol.\u00a04356, pp. 163\u2013173. Springer (2006)"},{"key":"20_CR19","unstructured":"Cho, J.Y., Pieprzyk, J: Multiple modular additions and crossword puzzle attack on NLSv2. IACR Cryptol. ePrint Arch. 38 (2007). http:\/\/eprint.iacr.org\/2007\/038"},{"key":"20_CR20","unstructured":"McKay, K.A., Vora, P.L.: Pseudo-linear approximations for ARX ciphers: with application to threefish. IACR Cryptol. ePrint Arch. (2010). http:\/\/eprint.iacr.org\/2010\/282"},{"key":"20_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/3-540-60590-8_16","volume-title":"Fast Software Encryption","author":"LR Knudsen","year":"1995","unstructured":"Knudsen, L.R.: Truncated and higher order differentials. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 196\u2013211. Springer, Heidelberg (1995). https:\/\/doi.org\/10.1007\/3-540-60590-8_16"},{"key":"20_CR22","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-981-13-5913-2_2","volume-title":"Trusted Computing and Information Security","author":"M Li","year":"2019","unstructured":"Li, M., Guo, J., Cui, J., Xu, L.: Impossible differential cryptanalysis of SPECK. In: Zhang, H., Zhao, B., Yan, F. (eds.) CTCIS 2018. CCIS, vol. 960, pp. 16\u201331. Springer, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-13-5913-2_2"},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Maghrebi, H., Portigliatti, T., Prouff, E.: Breaking cryptographic implementations using deep learning techniques. In: Security, Privacy, and Applied Cryptography Engineering. Springer International Publishing (2016)","DOI":"10.1007\/978-3-319-49445-6_1"},{"key":"20_CR24","doi-asserted-by":"crossref","unstructured":"Matsui, M.: Linear cryptanalysis method for DES cipher. In: Workshop on the Theory and Application of Cryptographic Techniques. Springer, New York (1993)","DOI":"10.1007\/3-540-48285-7_33"},{"key":"20_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/3-540-44499-8_19","volume-title":"Cryptographic Hardware and Embedded Systems \u2014 CHES 2000","author":"TS Messerges","year":"2000","unstructured":"Messerges, T.S.: Using second-order power analysis to attack DPA resistant software. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2000. LNCS, vol. 1965, pp. 238\u2013251. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-44499-8_19"},{"key":"20_CR26","doi-asserted-by":"crossref","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Advances in Cryptology - CRYPTO 1999. Springer (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"key":"20_CR27","unstructured":"Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L: The SIMON and SPECK families of lightweight block ciphers. IACR Cryptol. ePrint Arch. 404 (2013). http:\/\/eprint.iacr.org\/2013\/404"},{"key":"20_CR28","unstructured":"Renauld, M., Standaert, F.X.: Algebraic side-channel attacks. Cryptology ePrint Archive, Paper 2009\/279 (2009). https:\/\/eprint.iacr.org\/2009\/279"},{"key":"20_CR29","doi-asserted-by":"publisher","unstructured":"Benadjila, R., Prouff, E., Strullu, R., Cagli, E., Dumas, C: Deep learning for side-channel analysis and introduction to ASCAD database. J. Cryptogr. Eng. 10(2), 163\u2013188 (2020). https:\/\/doi.org\/10.1007\/S13389-019-00220-8","DOI":"10.1007\/S13389-019-00220-8"},{"key":"20_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/11545262_3","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"W Schindler","year":"2005","unstructured":"Schindler, W., Lemke, K., Paar, C.: A stochastic model for differential side channel cryptanalysis. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 30\u201346. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11545262_3"},{"key":"20_CR31","doi-asserted-by":"crossref","unstructured":"Schramm, K., Leander, G., Felke, P., Paar, C.: A collision-attack on AES. In: Cryptographic Hardware and Embedded Systems - CHES 2004, vol.\u00a03156, pp. 163\u2013175. Springer Berlin Heidelberg (2004)","DOI":"10.1007\/978-3-540-28632-5_12"},{"key":"20_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/978-3-540-39887-5_16","volume-title":"Fast Software Encryption","author":"K Schramm","year":"2003","unstructured":"Schramm, K., Wollinger, T., Paar, C.: A new class of collision attacks and its application to DES. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 206\u2013222. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-39887-5_16"},{"key":"20_CR33","doi-asserted-by":"publisher","unstructured":"Samajder, S., Sarkar, P.: Multiple (truncated) differential cryptanalysis: explicit upper bounds on data complexity. Cryptogr. Commun. 10(6), 1137\u20131163 (2018). https:\/\/doi.org\/10.1007\/s12095-017-0268-z","DOI":"10.1007\/s12095-017-0268-z"},{"key":"20_CR34","doi-asserted-by":"crossref","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Jr., B.S.K., Ko\u00e7, \u00c7.K., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2002. Lecture Notes in Computer Science, vol.\u00a02523, pp. 13\u201328. Springer, New York (2002)","DOI":"10.1007\/3-540-36400-5_3"},{"key":"20_CR35","unstructured":"Tiri, K., Akmal, M., Verbauwhede, I.: A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards. In: Proceedings of the 28th European solid-state circuits conference, pp. 403\u2013406. IEEE (2002)"},{"key":"20_CR36","unstructured":"Tiri, K., Verbauwhede, I.: Synthesis of secure FPGA implementations. IACR Cryptol. ePrint Arch. 68 (2004). http:\/\/eprint.iacr.org\/2004\/068"},{"key":"20_CR37","doi-asserted-by":"crossref","unstructured":"Weissbart, L., Picek, S., Batina, L.: One trace is all it takes: machine learning-based side-channel attack on eddsa. In: Security, Privacy, and Applied Cryptography Engineering. Springer International Publishing (2019)","DOI":"10.1007\/978-3-030-35869-3_8"},{"key":"20_CR38","unstructured":"World Economic Forum: https:\/\/www.weforum.org\/press\/2022\/02\/global-consensus-emerges-to-secure-internet-connected-home-and-wearable-devices\/ (2022). Accessed 01 Aug 2022"},{"key":"20_CR39","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-319-23318-5_9","volume-title":"Information Security","author":"Y Yao","year":"2015","unstructured":"Yao, Y., Zhang, B., Wu, W.: Automatic search for linear trails of the speck family. In: Lopez, J., Mitchell, C.J. (eds.) Information Security, pp. 158\u2013176. Springer International Publishing, Cham (2015)"},{"key":"20_CR40","doi-asserted-by":"publisher","unstructured":"Oren, Y., Weisse, O., Wool, A.: Practical template-algebraic side channel attacks with extremely low data complexity. In: Ruby B. Lee and Weidong Shi (ed.) HASP 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23\u201324, 2013, p.\u00a07. ACM (2013). https:\/\/doi.org\/10.1145\/2487726.2487733","DOI":"10.1145\/2487726.2487733"},{"key":"20_CR41","doi-asserted-by":"crossref","unstructured":"Yu, P., Schaumont, P.: Secure FPGA circuits using controlled placement and routing. In: Proceedings of the 5th IEEE\/ACM International Conference on Hardware\/Software Codesign and System Synthesis, pp. 45\u201350 (2007)","DOI":"10.1145\/1289816.1289831"}],"container-title":["Lecture Notes in Computer Science","Provable and Practical Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-2961-2_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T12:48:14Z","timestamp":1772196494000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-2961-2_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,10]]},"ISBN":["9789819529605","9789819529612"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-2961-2_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,10]]},"assertion":[{"value":"10 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ProvSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Provable Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Yokohama","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"provsec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sulab-sever.u-aizu.ac.jp\/provsec2025\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}