{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,30]],"date-time":"2023-09-30T07:56:16Z","timestamp":1696060576835},"reference-count":7,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2021,3,19]],"date-time":"2021-03-19T00:00:00Z","timestamp":1616112000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,19]],"date-time":"2021-03-19T00:00:00Z","timestamp":1616112000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s11432-018-9794-6","type":"journal-article","created":{"date-parts":[[2021,3,24]],"date-time":"2021-03-24T04:46:52Z","timestamp":1616561212000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Unbalanced sharing: a threshold implementation of SM4"],"prefix":"10.1007","volume":"64","author":[{"given":"Man","family":"Wei","sequence":"first","affiliation":[]},{"given":"Siwei","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Zihao","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,19]]},"reference":[{"key":"9794_CR1","doi-asserted-by":"crossref","unstructured":"Kocher P, Jaffe J, Jun B. Differential power analysis. In: Proceedings of Annual International Cryptology Conference, Santa Barbara, 1999. 388\u2013397","DOI":"10.1007\/3-540-48405-1_25"},{"key":"9794_CR2","doi-asserted-by":"crossref","unstructured":"Nikova S, Rechberger C, Rijmen V. Threshold implementations against side-channel attacks and glitches. In: Proceedings of International Conference on Information and Communications Security, Raleigh, 2006. 529\u2013545","DOI":"10.1007\/11935308_38"},{"key":"9794_CR3","doi-asserted-by":"crossref","unstructured":"Liu F, Ji W, Hu L, et al. Analysis of the SMS4 block cipher. In: Proceedings of Australasian Conference on Information Security and Privacy, Townsville, 2007. 158\u2013170","DOI":"10.1007\/978-3-540-73458-1_13"},{"key":"9794_CR4","doi-asserted-by":"crossref","unstructured":"Canright D. A very compact S-box for AES. In: Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems, Edinburgh, 2005. 441\u2013455","DOI":"10.1007\/11545262_32"},{"key":"9794_CR5","doi-asserted-by":"publisher","first-page":"1188","DOI":"10.1109\/TCAD.2015.2419623","volume":"34","author":"B Bilgin","year":"2015","unstructured":"Bilgin B, Gierlichs B, Nikova S, et al. Trade-offs for threshold implementations illustrated on AES. IEEE Trans Comput-Aided Des Integr Circ Syst, 2015, 34: 1188\u20131200","journal-title":"IEEE Trans Comput-Aided Des Integr Circ Syst"},{"key":"9794_CR6","doi-asserted-by":"crossref","unstructured":"Shang M, Zhang Q L, Liu Z B, et al. An ultra-compact hardware implementation of SMS4. In: Proceedings of International Congress on Advanced Applied Informatics, Kokura Kita-ku, 2014. 86\u201390","DOI":"10.1109\/IIAI-AAI.2014.28"},{"key":"9794_CR7","unstructured":"Goodwill G, Jun B, Jaffe J, et al. A testing methodology for side-channel resistance validation. In: Proceedings of NIST Non-Invasive Attack Testing Workshop, Nara, 2011. 115\u2013136"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-018-9794-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-018-9794-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-018-9794-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,19]],"date-time":"2022-06-19T20:04:12Z","timestamp":1655669052000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-018-9794-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,19]]},"references-count":7,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["9794"],"URL":"https:\/\/doi.org\/10.1007\/s11432-018-9794-6","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,19]]},"assertion":[{"value":"3 November 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 February 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 March 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"159102"}}