{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,13]],"date-time":"2024-01-13T22:46:33Z","timestamp":1705185993220},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2012,6,29]],"date-time":"2012-06-29T00:00:00Z","timestamp":1340928000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2012,11]]},"DOI":"10.1007\/s11432-012-4615-6","type":"journal-article","created":{"date-parts":[[2012,6,29]],"date-time":"2012-06-29T00:18:08Z","timestamp":1340929088000},"page":"2555-2569","source":"Crossref","is-referenced-by-count":3,"title":["Evolutionary ciphers against differential power analysis and differential fault analysis"],"prefix":"10.1007","volume":"55","author":[{"given":"Ming","family":"Tang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"ZhenLong","family":"Qiu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Min","family":"Yang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"PingPan","family":"Cheng","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Si","family":"Gao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"ShuBo","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"QinShu","family":"Meng","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2012,6,29]]},"reference":[{"key":"4615_CR1","doi-asserted-by":"crossref","unstructured":"Kocher P. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Proceedings of the 16th Annual International Conference on Advances in Cryptology, Saragossa, 1996. 104\u2013113","DOI":"10.1007\/3-540-68697-5_9"},{"key":"4615_CR2","doi-asserted-by":"crossref","unstructured":"Kocher P, Jaffe J, Jun B. Differential power analysis. In: CRYPTO 1999, Santa Barbara, 1999. 388\u2013397","DOI":"10.1007\/3-540-48405-1_25"},{"key":"4615_CR3","doi-asserted-by":"crossref","unstructured":"Trichina E, Seta D D, Germani L. Simplified adaptive multiplicative masking for AES. In: Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002), San Francisco, 2002. 187\u2013197","DOI":"10.1007\/3-540-36400-5_15"},{"key":"4615_CR4","doi-asserted-by":"crossref","first-page":"781","DOI":"10.1109\/JSSC.2006.870913","volume":"41","author":"K. Tiri","year":"2006","unstructured":"Tiri K, Hwang D, Hodjat A, et a1. AES-based cryptographic and biometric security coprocessor IC in 0.18 \u03bcm CMOS resistant to side channel power analysis attacks. IEEE J Solid-State Circuit, 2006, 41: 781\u2013792","journal-title":"IEEE J Solid-State Circuit"},{"key":"4615_CR5","doi-asserted-by":"crossref","unstructured":"Suzuki D, Saeki M, Ichikawa T. DPA leakage models CMOS logic circuits. In: Workshop on Cryptographic Hardware and Embedded Systems 2005 (CHES 2005), Edinburgh, 2005. 366\u2013382","DOI":"10.1007\/11545262_27"},{"key":"4615_CR6","doi-asserted-by":"crossref","unstructured":"Mentens N, Gierlichs B, Verbauwhede I. Power and fault analysis resistance in hardware through Dynamic reconfiguration. In: Workshop on Cryptographic Hardware and Embedded Systems 2008 (CHES 2008), Washington, 2008. 346\u2013362","DOI":"10.1007\/978-3-540-85053-3_22"},{"key":"4615_CR7","unstructured":"Yang S, Wolf W, Vijaykrishnan N, et a1. Power attack resistant cryptosystem design: a dynamic voltage and frequency switching approach. In: 2005 Design, Automation and Test in Europe Conference and Exposition (DATE 2005), Munich, 2005. 64\u201369"},{"key":"4615_CR8","doi-asserted-by":"crossref","unstructured":"Boneh D, DeMillo R A, Lipton R J. On the importance of checking cryptographic protocols for faults. In: EUROCRYPT 1997, Konstanz, 1997. 37\u201351","DOI":"10.1007\/3-540-69053-0_4"},{"key":"4615_CR9","doi-asserted-by":"crossref","unstructured":"Blomer J, Seifert J P. Fault based cryptanalysis of the advanced encryption standard (AES). In: Financial Cryptography 2003, Guadeloupe, 2003. 162\u2013181","DOI":"10.1007\/978-3-540-45126-6_12"},{"key":"4615_CR10","doi-asserted-by":"crossref","unstructured":"Dusart P, Letourneux G, Vivolo O. Differential fault analysis on AES. January 20 2003. Available from: http:\/\/eprint.iacr.org\/~2003\/010","DOI":"10.1007\/978-3-540-45203-4_23"},{"key":"4615_CR11","doi-asserted-by":"crossref","unstructured":"Piret G, Quisquater J J. A differential fault attack technique against SPN structures, with application to the AES and KHAZAD. In: CHES 2003, Cologne, 2003. LNCS 2779. 77\u201388","DOI":"10.1007\/978-3-540-45238-6_7"},{"key":"4615_CR12","doi-asserted-by":"crossref","unstructured":"Moradi A, Shalmani M T M, Salmasizadeh M. A generalized method of di?erential fault attack against AES cryptosystem. In: Workshop on Cryptographic Hardware and Embedded Systems (CHES 2006), Yokohama, 2006. LNCS 4249. 91\u2013100","DOI":"10.1007\/11894063_8"},{"key":"4615_CR13","doi-asserted-by":"crossref","first-page":"1197","DOI":"10.1109\/TCAD.2005.855939","volume":"25","author":"K. Tiri","year":"2006","unstructured":"Tiri K, Verbauwhede I. A digital design flow for secure integrated circuits. IEEE Trans Comput-Aided Des Integr Circuits Syst, 2006, 25: 1197\u20131208","journal-title":"IEEE Trans Comput-Aided Des Integr Circuits Syst"},{"key":"4615_CR14","first-page":"1678","volume":"26","author":"H. G. Zhang","year":"2003","unstructured":"Zhang H G, Feng X T, Qin Z P, et al. Research on evolutionary cryptosystems and evolutionary DES. Chin J Comput, 2003, 26: 1678\u20131684","journal-title":"Chin J Comput"},{"key":"4615_CR15","doi-asserted-by":"crossref","unstructured":"Song J, Zhang H G, Meng Q S, et al. Cryptanalysis of four-round DES based on genetic algorithm. In: Wireless Communications, Networking and Mobile Computing (WICOM 2007), Shanghai, 2007. 2326\u20132329","DOI":"10.1109\/WICOM.2007.580"},{"key":"4615_CR16","first-page":"540","volume":"54","author":"C. Wang","year":"2008","unstructured":"Wang C, Zhu M L. Design of algorithm for selecting secure ECC based on ant colony. J Wuhan Univ, 2008, 54: 540\u2013542","journal-title":"J Wuhan Univ"},{"key":"4615_CR17","unstructured":"Tang M, Meng Q S, Zhang H G. Evolutionary design of trace form bent function. 24 Sep 2005. Available from: http:\/\/eprint.iacr.org\/2005\/322"},{"key":"4615_CR18","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1007\/s11432-007-0030-9","volume":"50","author":"Q. S. Meng","year":"2007","unstructured":"Meng Q S, Zhang H G, Tang M, et al. Analysis of affinely equivalent Boolean functions. Sci China Ser F-Inf Sci, 2007, 50: 299\u2013306","journal-title":"Sci China Ser F-Inf Sci"},{"key":"4615_CR19","unstructured":"Xilinx. OPB HWICAP. Available from: http:\/\/www.xilinx.com\/bvdocs\/ipcenter\/datasheet\/opbhwicap.pdf"},{"key":"4615_CR20","doi-asserted-by":"crossref","first-page":"1991","DOI":"10.1007\/s11432-011-4430-5","volume":"54","author":"H. G. Zhang","year":"2011","unstructured":"Zhang H G, Li C L, Tang M. Capability of evolutionary cryptosystems against differential cryptanalysis. Sci China Inf Sci, 2011, 54: 1991\u20132000","journal-title":"Sci China Inf Sci"},{"key":"4615_CR21","volume-title":"Applied Cryptography","author":"B. Schneier","year":"1996","unstructured":"Schneier B. Applied Cryptography. New Jersey: John Wiley & Sons, 1996"},{"key":"4615_CR22","unstructured":"Quisquater J J, Samyde D. Electromagnetic analysis (EMA): measures and countermeasures for smart cards. In: E-SMART\u2019 01, Cannes, 2001. 200\u2013210"},{"key":"4615_CR23","doi-asserted-by":"crossref","unstructured":"Akkar M, Giraud C. An implementation of DES and AES secure against some attacks. In: Workshop on Cryptographic Hardware and Embedded Systems (CHES 2001), Paris, 2001. 309\u2013318","DOI":"10.1007\/3-540-44709-1_26"},{"key":"4615_CR24","doi-asserted-by":"crossref","unstructured":"Golic J D, Tymen C. Multiplicative masking and power analysis of AES. In: Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002), San Francisco, 2002. 198\u2013212","DOI":"10.1007\/3-540-36400-5_16"},{"key":"4615_CR25","doi-asserted-by":"crossref","unstructured":"Prouff E. DPA attacks and S-BOXes. In: Fast Software Encryption 2005 (FSE 2005), Paris, 2005. 424\u2013441","DOI":"10.1007\/11502760_29"},{"key":"4615_CR26","doi-asserted-by":"crossref","unstructured":"Karri R, Kuznetsov G, Goessel M. Parity-based concurrent error detection of substitution \u2014 permutation network block ciphers. In: Workshop on Cryptographic Hardware and Embedded Systems 2003 (CHES 2003), Cologne, 2003. 113\u2013124","DOI":"10.1007\/978-3-540-45238-6_10"},{"key":"4615_CR27","doi-asserted-by":"crossref","first-page":"720","DOI":"10.1109\/TC.2006.90","volume":"55","author":"C. Yen","year":"2006","unstructured":"Yen C, Wu B. Simple error detection methods for hardware implementation of advanced encryption standard. IEEE Trans Comput, 2006, 55: 720\u2013731","journal-title":"IEEE Trans Comput"},{"key":"4615_CR28","volume-title":"The Twofish Encryption Algorithm: A 128-Bit Block Cipher","author":"B. Schneier","year":"1999","unstructured":"Schneier B, Kelsey J, Whiting D, et al. The Twofish Encryption Algorithm: A 128-Bit Block Cipher. Michigan: John Wiley & Sons, Inc, 1999"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-012-4615-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-012-4615-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-012-4615-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,19]],"date-time":"2022-01-19T21:11:02Z","timestamp":1642626662000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-012-4615-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6,29]]},"references-count":28,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2012,11]]}},"alternative-id":["4615"],"URL":"https:\/\/doi.org\/10.1007\/s11432-012-4615-6","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,6,29]]}}}