{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T02:43:25Z","timestamp":1747104205271,"version":"3.37.3"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2015,12,7]],"date-time":"2015-12-07T00:00:00Z","timestamp":1449446400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Constraints"],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1007\/s10601-015-9237-3","type":"journal-article","created":{"date-parts":[[2015,12,6]],"date-time":"2015-12-06T23:50:43Z","timestamp":1449445843000},"page":"616-645","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Side-channel cryptographic attacks using pseudo-boolean optimization"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0423-802X","authenticated-orcid":false,"given":"Yossef","family":"Oren","sequence":"first","affiliation":[]},{"given":"Avishai","family":"Wool","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,7]]},"reference":[{"key":"9237_CR1","unstructured":"http:\/\/www.msoos.org\/cryptominisat2\/ ."},{"key":"9237_CR2","volume-title":"Constraint integer programming","author":"T Achterberg","year":"2007","unstructured":"Achterberg, T. (2007). Constraint integer programming. PhD thesis, Berlin: Technische Universit\u00e4t."},{"key":"9237_CR3","unstructured":"Akdemir K., Dixon M., Feghali W., Fay P., Gopal V., Guilford J., Ozturc E., Worlich G., & Zohar R. (2010). Breakthrough AES performance with intel AES new instructions. In Technical report, Intel Corporation. http:\/\/software.intel.com\/file\/ 27067 ."},{"key":"9237_CR4","unstructured":"Berthold, T., Heinz, S., Pfetsch, M. E., & Winkler, M. (2009). SCIP \u2013 solving constraint integer programs SAT competitive events booklet. http:\/\/www.cril.univ-artois.fr\/SAT09\/solvers\/booklet.pdf ."},{"key":"9237_CR5","doi-asserted-by":"crossref","unstructured":"Bogdanov, A., Knudsen, L. R., Leander, G., Paar, C., Poschmann, A., Robshaw, M. J. B., Seurin, Y., & Vikkelsoe, C. (2007). Present: an ultra-lightweight block cipher. In CHES (pp. 450\u2013 466).","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"9237_CR6","doi-asserted-by":"crossref","unstructured":"Canright, D. (2005). A very compact S-box for AES. In J.R. Rao & B. Sunar (Eds.), CHESS (Vol. 3659, pp. 441\u2013455). Springer. LNCS.","DOI":"10.1007\/11545262_32"},{"key":"9237_CR7","unstructured":"Nicolas, T.C., & Gregory, V.B. (2007). Algebraic cryptanalysis of the data encryption standard. In S.D. Galbraith (Eds.), . Cryptography and coding (Vol. 4887, pp. 152\u2013169). Berlin: Springer. Lecture Notes in Computer Science."},{"key":"9237_CR8","unstructured":"Daemen, J., & Rijmen, V. (1998). AES proposal. Rijndael."},{"key":"9237_CR9","unstructured":"Dawson, S. (1998). Code hopping decoder using a PIC16C56. Microchip confidential, leaked online 2002. http:\/\/read.pudn.com\/downloads42\/sourcecode\/embed\/144285\/keeloq\/MCSLRN\/DS652B_C.PDF ."},{"key":"9237_CR10","unstructured":"Intel Corporation (2008). Intel turbo boost technology in intel core microarchitecture (Nehalem). In Based processors. Technical report. http:\/\/download.intel.com\/design\/ processor\/applnots\/320354.pdf ."},{"key":"9237_CR11","unstructured":"Jovanovi\u0107, D., & Jani\u0109i\u0107, P. (2005). Logical analysis of hash functions. In B. Gramlich (Ed.),. Frontiers of combining systems (Vol. 3717, pp. 200\u2013215). Berlin: Springer. Lecture Notes in Computer Science."},{"key":"9237_CR12","doi-asserted-by":"crossref","unstructured":"Kocher, P.C., Jaffe, J., & Jun, B. (1999). Differential power analysis. In CRYPTO (pp. 388\u2013 397).","DOI":"10.1007\/3-540-48405-1_25"},{"key":"9237_CR13","unstructured":"Mangard, S. (2002). A simple power-analysis (SPA) attack on implementations of the AES key expansion. In P.J. Lee & C.H. Lim (Eds.), ICISC (Vol. 2587, pp. 343\u2013358). Springer. LNCS ."},{"key":"9237_CR14","volume-title":"Power analysis attacks: revealing the secrets of smart cards (Advances in information security)","author":"S Mangard","year":"2007","unstructured":"Mangard, S., Oswald, E., & Popp, T. (2007). Power analysis attacks: revealing the secrets of smart cards (Advances in information security). New York: Springer."},{"key":"9237_CR15","unstructured":"Manquinho, V., & Roussel, O. (2009). Pseudo-boolean competition. http:\/\/www.cril.univ-artois.fr\/PB09\/ ."},{"issue":"1-2","key":"9237_CR16","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1023\/A:1006326723002","volume":"24","author":"F Massacci","year":"2000","unstructured":"Massacci, F., & Marraro, L. (2000). Logical cryptanalysis as a SAT problem. Journal of Automated Reasoning, 24(1-2), 165\u2013203.","journal-title":"Journal of Automated Reasoning"},{"key":"9237_CR17","doi-asserted-by":"crossref","unstructured":"Menezes, A., Oorschot, P. C., & Vanstone, S.A. (1996). Handbook of applied cryptography. CRC Press.","DOI":"10.1201\/9781439821916"},{"key":"9237_CR18","doi-asserted-by":"crossref","unstructured":"Mironov I., & Zhang L. (2006). Applications of SAT solvers to cryptanalysis of hash functions. In B. Armin & C.P. Gomes (Eds.), Theory and applications of satisfiability testing - SAT (Vol. 4121, pp. 102\u2013115). Berlin: Springer. Lecture Notes in Computer Science.","DOI":"10.1007\/11814948_13"},{"issue":"3","key":"9237_CR19","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/s13389-013-0059-1","volume":"3","author":"MSE Mohamed","year":"2013","unstructured":"Mohamed, M. S. E., Bulygin, S., Zohner, M., Heuser, A., Walter, M., & Buchmann, J. (2013). Improved algebraic side-channel attack on AES. Journal of Cryptographic Engineering, 3(3), 139\u2013156.","journal-title":"Journal of Cryptographic Engineering"},{"key":"9237_CR20","unstructured":"National Institute of Standards and Technology (2001). FIPS PUB 197: announcing the advanced encryption standard (AES). Gaithersburg: Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology."},{"key":"9237_CR21","unstructured":"National Institute of Standards and Technology (1999). FIPS PUB 46-3: data encryption standard (DES). Gaithersburg: National Institute for Standards and Technology."},{"key":"9237_CR22","unstructured":"Oren, Y., Kirschbaum, M., Popp, T., & Wool, A. (2010). Algebraic side-channel analysis in the presence of errors. In CHES (pp. 428\u2013442). http:\/\/iss.oy.ne.ro\/TASCA ."},{"key":"9237_CR23","unstructured":"Oren, Y., Mathieu, R., Standaert, F.-X., & Wool, A. (2012). Algebraic side-channel attacks beyond the hamming weight leakage model. In P. Schaumont & E. Prouff (Eds.), Workshop on cryptographic hardware and embedded systems 2012 (CHES 2012), LNCS 7428 (pp. 140\u2013154). Belgium: Leuven. International Association for Cryptologic Research, Springer. http:\/\/iss.oy.ne.ro\/Template-TASCA ."},{"key":"9237_CR24","doi-asserted-by":"crossref","unstructured":"Oren, Y, Weisse, O., & Wool, A. (2013). Practical template-algebraic side channel attacks with extremely low data complexity. In Proceedings of the 2nd international workshop on hardware and architectural support for security and privacy, HASP \u201913 (pp. 7:1\u20137:8). New York: ACM.","DOI":"10.1145\/2487726.2487733"},{"key":"9237_CR25","unstructured":"Oren, Y., & Wool, A. (2010). TASCA-on-keeloq pseudo-boolean instances. http:\/\/iss.oy.ne.ro\/TASCA\/Instances ."},{"key":"9237_CR26","unstructured":"Oren, Y., & Wool, A. (2012). Template TASCA pseudo-boolean instances. http:\/\/iss.oy.ne.ro\/Template-TASCA\/Instances ."},{"key":"9237_CR27","doi-asserted-by":"crossref","unstructured":"Renauld, M., Standaert, F.-X., & Veyrat-Charvillon, N. (2009). Algebraic side-channel attacks on the AES: why time also matters in DPA. In C. Clavier & K. Gaj (Eds.), CHES (Vol. 5747, pp. 97\u2013111). Springer. LNCS.","DOI":"10.1007\/978-3-642-04138-9_8"},{"key":"9237_CR28","unstructured":"Renauld, M., & Standaert F.-X. (2009). Alebraic side-channel attacks. In D. Lin, J. Jing, F. Bao & M. Yung (Eds.), Information security and cryptology (INSCRYPT) (Vol. 6151, pp. 393\u2013410). Springer. Lecture Notes in Computer Science."},{"key":"9237_CR29","unstructured":"Satyanarayana, H. (2004). AES128 package. http:\/\/opencores.net\/project,aes_crypto_core ."},{"key":"9237_CR30","doi-asserted-by":"crossref","unstructured":"Soos, M., Nohl, K., & Castelluccia, C. (2009). Extending SAT solvers to cryptographic problems. In K. Oliver (Eds.), Theory and applications of satisfiability testing - SAT 2009 (Vol. 5584, pp. 244\u2013257). Lecture Notes in Computer Science, (Vol. 5584 pp. 244\u2013257). Berlin: Springer.","DOI":"10.1007\/978-3-642-02777-2_24"},{"key":"9237_CR31","unstructured":"Zhao, X., Wang, T., Guo, S., Zhang, F., Shi, Z., Liu, H., & Wu, K. (2011). SAT based error tolerant algebraic side-channel attacks. In Conference on cryptographic algorithms and cryptographic chips (CASC2011)."}],"container-title":["Constraints"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10601-015-9237-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10601-015-9237-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10601-015-9237-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10601-015-9237-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T15:14:19Z","timestamp":1559229259000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10601-015-9237-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,7]]},"references-count":31,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,10]]}},"alternative-id":["9237"],"URL":"https:\/\/doi.org\/10.1007\/s10601-015-9237-3","relation":{},"ISSN":["1383-7133","1572-9354"],"issn-type":[{"type":"print","value":"1383-7133"},{"type":"electronic","value":"1572-9354"}],"subject":[],"published":{"date-parts":[[2015,12,7]]}}}