{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T03:05:26Z","timestamp":1763348726982,"version":"3.37.3"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T00:00:00Z","timestamp":1730332800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T00:00:00Z","timestamp":1730332800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62062026","62272451"],"award-info":[{"award-number":["62062026","62272451"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"the Key Research and Development Program of Guangxi in China","award":["guike AB23026131"],"award-info":[{"award-number":["guike AB23026131"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Electron Test"],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1007\/s10836-024-06149-z","type":"journal-article","created":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T09:08:12Z","timestamp":1730365692000},"page":"707-721","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Novel Two-Stage Model Based SCA against secAES"],"prefix":"10.1007","volume":"40","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-3045-6455","authenticated-orcid":false,"given":"XiaoNian","family":"Wu","sequence":"first","affiliation":[]},{"given":"JinLin","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-7773-7324","authenticated-orcid":false,"given":"RunLian","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8401-9838","authenticated-orcid":false,"given":"HaiLong","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,31]]},"reference":[{"issue":"2","key":"6149_CR1","doi-asserted-by":"publisher","first-page":"15","DOI":"10.3390\/cryptography4020015","volume":"4","author":"M Randolph","year":"2020","unstructured":"Randolph M, Diehl W (2020) Power side-channel attack analysis: a review of 20 years of study for the layman. Cryptography 4(2):15","journal-title":"Cryptography"},{"key":"6149_CR2","doi-asserted-by":"publisher","unstructured":"Kocher PC (1996) Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. Proc. Advances in Cryptology \u2014 CRYPTO \u201996. California, USA 104\u2013113. https:\/\/doi.org\/10.1007\/3-540-68697-5_9","DOI":"10.1007\/3-540-68697-5_9"},{"key":"6149_CR3","doi-asserted-by":"publisher","unstructured":"Kocher P, Jaffe J, Jun B (1999) Differential Power Analysis. Proc. Advances in Cryptology \u2014 CRYPTO\u2019 99. California, USA 388\u2013397. https:\/\/doi.org\/10.1007\/3-540-48405-1_25","DOI":"10.1007\/3-540-48405-1_25"},{"key":"6149_CR4","doi-asserted-by":"publisher","unstructured":"Mangard S (2003) A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion. Proc. Information Security and Cryptology \u2014 ICISC 2002. Korea 343\u2013358. https:\/\/doi.org\/10.1007\/3-540-36552-4_24","DOI":"10.1007\/3-540-36552-4_24"},{"key":"6149_CR5","doi-asserted-by":"publisher","unstructured":"Chari S, Rao JR, Rohatgi P (2003) Template Attacks. Proc. Cryptographic Hardware and Embedded Systems - CHES 2002. CA, USA 13\u201328. https:\/\/doi.org\/10.1007\/3-540-36400-5_3","DOI":"10.1007\/3-540-36400-5_3"},{"key":"6149_CR6","doi-asserted-by":"publisher","unstructured":"Brier E, Clavier C, Olivier F (2004) Correlation Power Analysis with a Leakage Model. Proc. Cryptographic Hardware and Embedded Systems - CHES 2004. MA, USA 16\u201329. https:\/\/doi.org\/10.1007\/978-3-540-28632-5_2","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"6149_CR7","doi-asserted-by":"publisher","unstructured":"Maghrebi H, Portigliatti T, Prouff E (2016) Breaking Cryptographic Implementations Using Deep Learning Techniques. Proc. Security, Privacy, and Applied Cryptography Engineering. SPACE 2016. Hyderabad, India 3\u201326. https:\/\/doi.org\/10.1007\/978-3-319-49445-6_1","DOI":"10.1007\/978-3-319-49445-6_1"},{"key":"6149_CR8","doi-asserted-by":"publisher","unstructured":"Prouff E, Rivain M (2013) Masking against Side-Channel Attacks: A Formal Security Proof. Proc. Advances in Cryptology \u2013 EUROCRYPT 2013. Berlin, Heidelberg 142\u2013159. https:\/\/doi.org\/10.1007\/978-3-642-38348-9_9","DOI":"10.1007\/978-3-642-38348-9_9"},{"key":"6149_CR9","doi-asserted-by":"publisher","unstructured":"Peeters E, Standaert FX, Donckers N, Quisquater JJ (2005) Improved Higher-Order Side-Channel Attacks with FPGA Experiments. Proc. Cryptographic Hardware and Embedded Systems \u2013 CHES 2005. Berlin, Heidelberg 309\u2013323. https:\/\/doi.org\/10.1007\/11545262_23","DOI":"10.1007\/11545262_23"},{"key":"6149_CR10","unstructured":"Benadjila R, Lomn\u00e9 V, Prouff E, Roche T Secure AES128 for ATMega8515. 2020-03-27. https:\/\/github.com\/ANSSI-FR\/secAES-ATmega8515"},{"key":"6149_CR11","unstructured":"Balli F, Caforio A, Banik S (2021) Some applications of hamming weight correlations. Cryptol ePrint Archive. https:\/\/eprint.iacr.org\/2021\/611.pdf"},{"key":"6149_CR12","doi-asserted-by":"publisher","unstructured":"Akkar ML, Giraud C (2001) An implementation of DES and AES, secure against some attacks. Proc. International Workshop on Cryptographic Hardware and Embedded Systems, Berlin, Heidelberg 309\u2013318. https:\/\/doi.org\/10.1007\/3-540-44709-1_26","DOI":"10.1007\/3-540-44709-1_26"},{"key":"6149_CR13","doi-asserted-by":"publisher","unstructured":"Messerges TS (2000) Using Second-Order Power Analysis to Attack DPA Resistant Software. Proc. Cryptographic Hardware and Embedded Systems \u2014 CHES 2000. Berlin, Heidelberg 238\u2013251. https:\/\/doi.org\/10.1007\/3-540-44499-8_19","DOI":"10.1007\/3-540-44499-8_19"},{"key":"6149_CR14","doi-asserted-by":"publisher","unstructured":"Oswald E, Mangard S, Herbst C, Tillich S (2006) Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers. Proc. Topics in Cryptology \u2013 CT-RSA 2006. Berlin, Heidelberg 192\u2013207. https:\/\/doi.org\/10.1007\/11605805_13","DOI":"10.1007\/11605805_13"},{"key":"6149_CR15","doi-asserted-by":"publisher","unstructured":"Moradi A, Mischke O, Eisenbarth T (2010) Correlation-Enhanced Power Analysis Collision Attack. Proc. Cryptographic Hardware and Embedded Systems, CHES 2010. Santa Barbara, USA 125\u2013139. https:\/\/doi.org\/10.1007\/978-3-642-15031-9_9","DOI":"10.1007\/978-3-642-15031-9_9"},{"key":"6149_CR16","doi-asserted-by":"publisher","unstructured":"Belgarric P, Bhasin S, Bruneau N, Danger JL, Debande N, Guilley S, Heuser A, Najm Z, Rioul O (2014) Time-Frequency Analysis for Second-Order Attacks. Proc. Smart Card Research and Advanced Applications. CARDIS 2013. Berlin, Germany 108\u2013122. https:\/\/doi.org\/10.1007\/978-3-319-08302-5_8","DOI":"10.1007\/978-3-319-08302-5_8"},{"key":"6149_CR17","doi-asserted-by":"publisher","unstructured":"Battistello A, Coron JS, Prouff E, Zeitoun R (2016) Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme. Proc. Cryptographic Hardware and Embedded Systems \u2013 CHES 2016. Berlin, Heidelberg 23\u201339. https:\/\/doi.org\/10.1007\/978-3-662-53140-2_2","DOI":"10.1007\/978-3-662-53140-2_2"},{"key":"6149_CR18","doi-asserted-by":"publisher","unstructured":"Bouvet A, Guilley S, Vlasak L (2021) First-Order Side-Channel Leakage Analysis of Masked but Asynchronous AES. Proc. Security and Privacy. ICSP 2021. Communications in Computer and Information Science. 16\u201329. https:\/\/doi.org\/10.1007\/978-3-030-90553-8_2","DOI":"10.1007\/978-3-030-90553-8_2"},{"key":"6149_CR19","doi-asserted-by":"publisher","unstructured":"Cagli E, Dumas C, Prouff E (2017) Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures. Proc. Cryptographic Hardware and Embedded Systems \u2013 CHES 2017. Taipei, Taiwan 46\u201368. https:\/\/doi.org\/10.1007\/978-3-319-66787-4_3","DOI":"10.1007\/978-3-319-66787-4_3"},{"key":"6149_CR20","doi-asserted-by":"publisher","unstructured":"TIMON B (2019) Non-profiled deep learning-based side-channel attacks with sensitivity analysis. IACR Trans Cryptographic Hardw Embedded Syst 107\u2013131. https:\/\/doi.org\/10.13154\/tches.v2019.i2.107-131","DOI":"10.13154\/tches.v2019.i2.107-131"},{"key":"6149_CR21","unstructured":"Pfeifer C, Haddad P, Spread (2018) a new layer for profiled deep-learning side-channel attacks. IACR Cryptology ePrint Archive 2018:880"},{"key":"6149_CR22","doi-asserted-by":"publisher","unstructured":"Kuroda K, Fukuda Y, Yoshida K, Fujino T (2021) Practical Aspects on Non-profiled Deep-learning Side-channel Attacks against AES Software Implementation with Two Types of Masking Countermeasures including RSM. Proc. 5th Workshop on Attacks and Solutions in Hardware Security, Virtual Event, Republic of Korea 29\u201340. https:\/\/doi.org\/10.1007\/s13389-023-00312-6","DOI":"10.1007\/s13389-023-00312-6"},{"key":"6149_CR23","doi-asserted-by":"publisher","unstructured":"Gohr A, Laus F, Schindler W (2022) Breaking masked implementations of the clyde-cipher by means of side-channel analysis: a report on the ches challenge side-channel contest 2020. IACR Trans Cryptographic Hardw Embedded Syst 397\u2013437. https:\/\/doi.org\/10.46586\/tches.v2022.i4.397-437","DOI":"10.46586\/tches.v2022.i4.397-437"},{"issue":"3","key":"6149_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13389-023-00314-4","volume":"14","author":"NT Do","year":"2023","unstructured":"Do NT, Hoang VP, Doan VS (2023) A novel non-profiled side channel attack based on multi-output regression neural network. J Cryptographic Eng 14(3):1\u201313. https:\/\/doi.org\/10.1007\/s13389-023-00314-4","journal-title":"J Cryptographic Eng"},{"issue":"2","key":"6149_CR25","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s13389-019-00220-8","volume":"10","author":"R Benadjila","year":"2020","unstructured":"Benadjila R, Prouff E, Strullu R, Cagli E, Dumas C (2020) Deep learning for side-channel analysis and introduction to ASCAD database. J Cryptographic Eng 10(2):163\u2013188. https:\/\/doi.org\/10.1007\/s13389-019-00220-8","journal-title":"J Cryptographic Eng"},{"key":"6149_CR26","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s13389-016-0120-y","volume":"6","author":"T SCHNEIDER","year":"2016","unstructured":"SCHNEIDER T, MORADI A (2016) Leakage assessment methodology: extended version. J Cryptographic Eng 6:85\u201399. https:\/\/doi.org\/10.1007\/s13389-016-0120-y","journal-title":"J Cryptographic Eng"}],"container-title":["Journal of Electronic Testing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-024-06149-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10836-024-06149-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-024-06149-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T07:13:42Z","timestamp":1736147622000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10836-024-06149-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,31]]},"references-count":26,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["6149"],"URL":"https:\/\/doi.org\/10.1007\/s10836-024-06149-z","relation":{},"ISSN":["0923-8174","1573-0727"],"issn-type":[{"type":"print","value":"0923-8174"},{"type":"electronic","value":"1573-0727"}],"subject":[],"published":{"date-parts":[[2024,10,31]]},"assertion":[{"value":"15 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 October 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 October 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}]}}