{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T15:15:36Z","timestamp":1648912536973},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T00:00:00Z","timestamp":1380585600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1007\/s10207-013-0212-y","type":"journal-article","created":{"date-parts":[[2013,9,30]],"date-time":"2013-09-30T04:45:22Z","timestamp":1380516322000},"page":"291-304","source":"Crossref","is-referenced-by-count":6,"title":["All-or-Nothing Transforms as a countermeasure to differential side-channel analysis"],"prefix":"10.1007","volume":"13","author":[{"given":"Robert P.","family":"McEvoy","sequence":"first","affiliation":[]},{"given":"Michael","family":"Tunstall","sequence":"additional","affiliation":[]},{"given":"Claire","family":"Whelan","sequence":"additional","affiliation":[]},{"given":"Colin C.","family":"Murphy","sequence":"additional","affiliation":[]},{"given":"William P.","family":"Marnane","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,10,1]]},"reference":[{"key":"212_CR1","doi-asserted-by":"crossref","unstructured":"Bellare, M., Boldyreva, A.: The security of chaffing and winnowing. In: Okamoto, T. (ed.) Advances in Cryptology\u2014ASIACRYPT 2000, vol. 1976 of Lecture Notes in Computer Science, pp. 517\u2013530. Springer, Berlin (2000)","DOI":"10.1007\/3-540-44448-3_40"},{"key":"212_CR2","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P. (1994) Optimal asymmetric encryption. In: De Santis, A. (ed.) Advances in Cryptology\u2014EUROCRYPT \u201994, vol. 950 of Lecture Notes in Computer Science, pp. 92\u2013111. Springer, Berlin (1994)","DOI":"10.1007\/BFb0053428"},{"key":"212_CR3","doi-asserted-by":"crossref","unstructured":"Blaze, M.: High-bandwidth encryption with low-bandwidth smartcards. In: Gollmann, D. (ed.) Fast Software Encryption\u2014FSE \u201996, vol. 1039 of Lecture Notes in Computer Science, pp. 33\u201340. Springer, Berlin (1996)","DOI":"10.1007\/3-540-60865-6_40"},{"key":"212_CR4","unstructured":"Boyko, V.: On All-or-Nothing Transforms and Password-Authenticated Key Exchange Protocols. PhD thesis, Massachusetts Institute of Technology (2000)"},{"key":"212_CR5","doi-asserted-by":"crossref","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) Cryptographic Hardware and Embedded Systems\u2014CHES 2004, vol. 3156 of Lecture Notes in Computer Science, pp. 16\u201329. Springer, Berlin (2004)","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"212_CR6","unstructured":"Byers, J., Considine, J., Itkis, G., Cheng, M.C., Yeung, A.: Securing bulk content almost for free. J. Comput. Commun. Special Issue Internet Secur. 29, 290\u2013290 (2006)"},{"key":"212_CR7","doi-asserted-by":"crossref","unstructured":"Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards sound approaches to counteract power-analysis attacks. In: Wiener, M. (ed.) Advances in Cryptology\u2014CRYPTO \u201999, vol. 1666 of Lecture Notes in Computer Science, pp. 398\u2013412. Springer, Berlin (1999)","DOI":"10.1007\/3-540-48405-1_26"},{"key":"212_CR8","doi-asserted-by":"crossref","unstructured":"Coron, J.-S., Goubin, L.: On boolean and arithmetic masking against differential power analysis. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems\u2014CHES 2000, vol. 1965 of Lecture Notes in Computer Science, pp. 231\u2013237. Springer, Berlin (2000)","DOI":"10.1007\/3-540-44499-8_18"},{"key":"212_CR9","unstructured":"Desai, A.: The Security of All-or-Nothing Encryption (Extended Abstract)"},{"key":"212_CR10","unstructured":"Dodis, Y.: Exposure-Resilient Cryptography. PhD thesis. Massachusetts Institute of Technology (2000)"},{"key":"212_CR11","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Sahai, A., Smith, A.: On perfect and adaptive security in exposure-resilient cryptography. In: Pfitzmann, B. (ed.) Advances in Cryptology\u2014EUROCRYPT 2001, vol. 2045 of Lecture Notes in Computer Science, pp. 301\u2013324. Springer, Berlin (2001)","DOI":"10.1007\/3-540-44987-6_19"},{"key":"212_CR12","unstructured":"ECRYPT: ECRYPT Yearly Report on Algorithms and Keysizes (2005). http:\/\/www.ecrypt.eu.org (2006)"},{"key":"212_CR13","unstructured":"ECRYPT: The eSTREAM portfolio. http:\/\/www.ecrypt.eu.org\/stream\/portfolio.pdf , April (2008)"},{"key":"212_CR14","volume-title":"Practical Cryptography","author":"N Ferguson","year":"2003","unstructured":"Ferguson, N., Schneier, B.: Practical Cryptography. Wiley, New York (2003)"},{"key":"212_CR15","doi-asserted-by":"crossref","unstructured":"Fumaroli, G., Martinelli, A., Prouff, E., Rivain, M.: Affine masking against higher-order side channel analysis. In: Biryukov, A., Gong, G., Stinson, D.R. (eds.) Selected Areas in Cryptography\u2014SAC 2010, vol. 6544 of Lecture Notes in Computer Science, pp. 262\u2013280. Springer, Berlin (2010)","DOI":"10.1007\/978-3-642-19574-7_18"},{"key":"212_CR16","doi-asserted-by":"crossref","unstructured":"Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: concrete results. In Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems\u2014CHES 2001, vol. 2162 of Lecture Notes in Computer Science, pp. 251\u2013261. Springer, Berlin (2001)","DOI":"10.1007\/3-540-44709-1_21"},{"key":"212_CR17","doi-asserted-by":"crossref","unstructured":"Genelle, L., Prouff, E., Quisquater, M.: Thwarting higher-order side channel analysis with additive and multiplicative maskings. In Preneel, B., Takagi, T. (eds.) Cryptographic Hardware and Embedded Systems\u2014CHES 2011, vol. 6917 of Lecture Notes in Computer Science, pp. 240\u2013255. Springer, Berlin (2011)","DOI":"10.1007\/978-3-642-23951-9_16"},{"key":"212_CR18","unstructured":"Giraud, C., Prouff, E.: A new approach to counteract DPA attacks on block ciphers. Private Commun. Previously online at http:\/\/eprint.iacr.org\/2005\/340 ; withdrawn (2005)"},{"issue":"2","key":"212_CR19","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1109\/TCSI.2006.885974","volume":"54","author":"JD Goli\u0107","year":"2007","unstructured":"Goli\u0107, J.D.: Techniques for random masking in hardware. IEEE Trans. Circuits Syst. I 54(2), 291\u2013300 (2007)","journal-title":"IEEE Trans. Circuits Syst. I"},{"key":"212_CR20","doi-asserted-by":"crossref","unstructured":"Goubin, L., Patarin, J.: DES and differential power analysis, the duplication method. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems\u2014CHES \u201999, vol. 1717 of Lecture Notes in Computer Science, pp. 158\u2013172. Springer, Berlin (1999)","DOI":"10.1007\/3-540-48059-5_15"},{"key":"212_CR21","doi-asserted-by":"crossref","unstructured":"Homsirikamol, E., Rogawski, M., Gaj, K.: Throughput vs. area trade-offs in high-speed architectures of five round 3 SHA-3 candidates implemented using Xilinx and Altera FPGAs. In: Preneel, B., Takagi, T. (eds.) Cryptographic Hardware and Embedded Systems\u2014CHES 2005, vol. 6917 of Lecture Notes in Computer Science, pp. 491\u2013506. Springer, Berlin (2011)","DOI":"10.1007\/978-3-642-23951-9_32"},{"key":"212_CR22","unstructured":"IEEE: 1363a IEEE Standard Specifications for Public-Key Cryptography\u2014Amendment 1: Additional Techniques (2004)"},{"key":"212_CR23","unstructured":"Johnson, D.B., Matyas, S.M., Peyravian, M.: Encryption of Long Blocks Using a Short-Block Encryption Procedure. Submitted for inclusion in the IEEE P1363a Standard (1996)"},{"key":"212_CR24","unstructured":"Johnson, D.B., Matyas, Jr. S.M.: Method and apparatus for encrypting long blocks using a short-block encryption procedure. US Patent # 5,870,470 (1999)"},{"key":"212_CR25","doi-asserted-by":"crossref","unstructured":"Kocher, P.: Timing attacks on implementations of Diffie\u2013Hellman, RSA, DSS and other systems. In: Koblitz, N. (ed.) Advances in Cryptology\u2014CRYPTO \u201996, vol. 1109 of Lecture Notes in Computer Science, pp. 104\u2013113. Springer, Berlin (1996)","DOI":"10.1007\/3-540-68697-5_9"},{"key":"212_CR26","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) Advances in Cryptology\u2014CRYPTO \u201999, vol. 1666 of Lecture Notes in Computer Science, pp. 388\u2013397. Springer, Berlin (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"key":"212_CR27","volume-title":"Power Analysis Attacks: Revealing the Secrets of Smart Cards","author":"S Mangard","year":"2007","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer, Berlin (2007)"},{"issue":"2","key":"212_CR28","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1049\/iet-ifs.2010.0096","volume":"5","author":"S Mangard","year":"2011","unstructured":"Mangard, S., Oswald, E., Standaert, F.-X.: One for all: unifying standard DPA attacks. IET Inf. Secur. 5(2), 100\u2013110 (2011)","journal-title":"IET Inf. Secur."},{"key":"212_CR29","unstructured":"Marnas, S.I., Angelis, L., Bleris, G.L.: All-or-nothing transforms using quasigroups. In: 1st Balkan Conference on Informatics, pp. 183\u2013191 (2003)"},{"key":"212_CR30","doi-asserted-by":"crossref","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton, FL (1996)","DOI":"10.1201\/9781439821916"},{"key":"212_CR31","unstructured":"National Institute of Standards and Technology: FIPS PUB 46-3. Data Encryption Standard (1999)"},{"key":"212_CR32","unstructured":"National Institute of Standards and Technology: FIPS PUB 197. Advanced Encryption Standard (2001)"},{"key":"212_CR33","unstructured":"National Institute of Standards and Technology: FIPS PUB 180-2. Secure Hash Standard (2002)"},{"key":"212_CR34","doi-asserted-by":"crossref","unstructured":"Okeya, K.: Side channel attacks against HMACs based on block-cipher based hash functions. In: Batten, L.M., Safavi-Naini, R. (eds.) Information Security and Privacy\u2014ACISP 2006, vol. 4058 of Lecture Notes in Computer Science, pp. 432\u2013443. Springer, Berlin (2006)","DOI":"10.1007\/11780656_36"},{"key":"212_CR35","doi-asserted-by":"crossref","unstructured":"Oswald, E., Mangard, S., Herbst, C., Tillich, S.: Practical second-order DPA attacks for masked smart card implementations of block ciphers. In: Pointcheval, D. (ed.) Topics in Cryptology\u2014CT-RSA 2006, vol. 3860 of Lecture Notes in Computer Science, pp. 192\u2013207. Springer, Berlin (2006)","DOI":"10.1007\/11605805_13"},{"key":"212_CR36","unstructured":"Oswald, E., Mangard, S., Pramstaller, N.: Secure and efficient masking of AES\u2014a mission impossible? Cryptology ePrint Archive, Report 2004\/134 (2004) http:\/\/eprint.iacr.org\/"},{"key":"212_CR37","doi-asserted-by":"crossref","unstructured":"Popp, T., Mangard, S.: Masked dual-rail pre-charge logic: DPA-resistance without routing constraints. In: Rao, J.R., Sunar, B. (eds.), Cryptographic Hardware and Embedded Systems\u2014CHES 2005, vol. 3659 of Lecture Notes in Computer Science, pp. 172\u2013186. Springer, Berlin (2005)","DOI":"10.1007\/11545262_13"},{"key":"212_CR38","doi-asserted-by":"crossref","unstructured":"Quisquater, J.-J., Samyde, D.: Electromagnetic analysis (EMA): Measures and counter-measures for smart cards. In: Attali, I., Jensen, T.P. (eds.) Smart Card Programming and Security, International Conference on Research in Smart Cards\u2014E-smart 2001, vol. 2140 of Lecture Notes in Computer Science, pp. 200\u2013210. Springer, Berlin (2001)","DOI":"10.1007\/3-540-45418-7_17"},{"key":"212_CR39","doi-asserted-by":"crossref","unstructured":"Rivest, R.L.: All-or-nothing encryption and the package transform. In: Biham, E. (ed.) Fast Software Encryption\u2014FSE \u201997, vol. 1267 of Lecture Notes in Computer Science, pp. 210\u2013218. Springer, Berlin (1997)","DOI":"10.1007\/BFb0052348"},{"key":"212_CR40","doi-asserted-by":"crossref","unstructured":"Standaert, F-X., Peeters, E., Quisquater, J-J.: On the masking countermeasure and higher-order power analysis attacks. In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), vol. 1, pp. 562\u2013567. IEEE Computer Society (2005)","DOI":"10.1109\/ITCC.2005.213"},{"issue":"2","key":"212_CR41","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1109\/JPROC.2005.862437","volume":"94","author":"F-X Standaert","year":"2006","unstructured":"Standaert, F.-X., Peeters, E., Rouvroy, G., Quisquater, J.-J.: An overview of power analysis attacks against field programmable gate arrays. Proc. IEEE 94(2), 383\u2013394 (2006)","journal-title":"Proc. IEEE"},{"key":"212_CR42","doi-asserted-by":"crossref","unstructured":"Tiri, K., Schaumont, P., Verbauwhede, I.: Side-channel leakage tolerant architectures. In: Third International Conference on Information Technology: New Generations (ITNG 2006), pp. 204\u2013209. IEEE Computer Society (2006)","DOI":"10.1109\/ITNG.2006.121"},{"key":"212_CR43","doi-asserted-by":"crossref","unstructured":"von Willich, M.: A technique with an information-theoretic basis for protecting secret data from differential power attacks. In: Honary, B. (ed.) Cryptography and Coding, vol. 2260 of Lecture Notes in Computer Science, pp. 44\u201362. Springer, Berlin (2001)","DOI":"10.1007\/3-540-45325-3_6"},{"key":"212_CR44","doi-asserted-by":"crossref","unstructured":"Zhang, R., Hanaoka, G., Imai, H.: On the security of cryptosystems with all-or-nothing transforms. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) Applied Cryptography and Network Security\u2014ACNS 2004, vol. 3089 of Lecture Notes in Computer Science, pp. 76\u201390. Springer, Berlin (2004)","DOI":"10.1007\/978-3-540-24852-1_6"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-013-0212-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-013-0212-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-013-0212-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,26]],"date-time":"2019-07-26T23:40:52Z","timestamp":1564184452000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-013-0212-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10,1]]},"references-count":44,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,6]]}},"alternative-id":["212"],"URL":"https:\/\/doi.org\/10.1007\/s10207-013-0212-y","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,10,1]]}}}