{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,15]],"date-time":"2023-09-15T17:21:11Z","timestamp":1694798471654},"reference-count":9,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2021,5,21]],"date-time":"2021-05-21T00:00:00Z","timestamp":1621555200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,5,21]],"date-time":"2021-05-21T00:00:00Z","timestamp":1621555200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1007\/s11432-019-1469-7","type":"journal-article","created":{"date-parts":[[2021,5,26]],"date-time":"2021-05-26T11:05:02Z","timestamp":1622027102000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A small first-order DPA resistant AES implementation with no fresh randomness"],"prefix":"10.1007","volume":"65","author":[{"given":"Man","family":"Wei","sequence":"first","affiliation":[]},{"given":"Siwei","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Zihao","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Zheng","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,21]]},"reference":[{"key":"1469_CR1","doi-asserted-by":"crossref","unstructured":"Kocher P, Jaffe J, Jun B. Differential power analysis. In: Proceedings of Annual International Cryptology Conference, Santa Barbara, 1999. 388\u2013397","DOI":"10.1007\/3-540-48405-1_25"},{"key":"1469_CR2","doi-asserted-by":"crossref","unstructured":"Nikova S, Rechberger C, Rijmen V. Threshold implementations against side-channel attacks and glitches. In: Proceedings of International Conference on Information and Communications Security, Raleigh, 2006. 529\u2013545","DOI":"10.1007\/11935308_38"},{"key":"1469_CR3","doi-asserted-by":"crossref","unstructured":"Gross H, Mangard S, Korak T. Domain-oriented masking: compact masked hardware implementations with arbitrary protection order. In: Proceedings of the ACM Workshop on Theory of Implementation Security, Vienna, 2016","DOI":"10.1145\/2996366.2996426"},{"key":"1469_CR4","doi-asserted-by":"crossref","unstructured":"Canright D. A very compact S-box for AES. In: Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems, Edinburgh, 2005. 441\u2013455","DOI":"10.1007\/11545262_32"},{"key":"1469_CR5","doi-asserted-by":"crossref","unstructured":"Chen C, Farmani M, Eisenbarth T. A tale of two shares: why two-share threshold implementation seems worthwhile \u2014 and why it is not. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, 2016. 819\u2013843","DOI":"10.1007\/978-3-662-53887-6_30"},{"key":"1469_CR6","doi-asserted-by":"crossref","unstructured":"Moradi A, Poschmann A, Ling S, et al. Pushing the limits: a very compact and a threshold implementation of AES. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, 2011. 69\u201388","DOI":"10.1007\/978-3-642-20465-4_6"},{"key":"1469_CR7","doi-asserted-by":"crossref","unstructured":"Wegener F, Moradi A. A first-order SCA resistant AES without fresh randomness. In: Proceedings of International Workshop on Constructive Side-Channel Analysis and Secure Design, Singapore, 2018. 245\u2013262","DOI":"10.1007\/978-3-319-89641-0_14"},{"key":"1469_CR8","unstructured":"Goodwill G, Jun B, Jaffe J, et al. A testing methodology for side-channel resistance validation. In: Proceedings of NIST Non-Invasive Attack Testing Workshop, Nara, 2011. 115\u2013136"},{"key":"1469_CR9","doi-asserted-by":"publisher","first-page":"84","DOI":"10.46586\/tosc.v2019.i1.84-117","volume":"1","author":"S Li","year":"2019","unstructured":"Li S, Sun S W, Li C Y, et al. Constructing low-latency involutory MDS matrices with lightweight circuits. IACR Trans Symmetric Cryptol, 2019, 1: 84\u2013117","journal-title":"IACR Trans Symmetric Cryptol"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-019-1469-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-019-1469-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-019-1469-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,4]],"date-time":"2023-07-04T21:21:40Z","timestamp":1688505700000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-019-1469-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,21]]},"references-count":9,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["1469"],"URL":"https:\/\/doi.org\/10.1007\/s11432-019-1469-7","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,21]]},"assertion":[{"value":"10 April 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 July 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 July 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 May 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"169102"}}