{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T12:40:08Z","timestamp":1695213608327},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,11,16]],"date-time":"2021-11-16T00:00:00Z","timestamp":1637020800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,11,16]],"date-time":"2021-11-16T00:00:00Z","timestamp":1637020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1007\/s11704-020-0319-z","type":"journal-article","created":{"date-parts":[[2021,11,16]],"date-time":"2021-11-16T10:02:47Z","timestamp":1637056967000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SCARE and power attack on AES-like block ciphers with secret S-box"],"prefix":"10.1007","volume":"16","author":[{"given":"Xin","family":"Liu","sequence":"first","affiliation":[]},{"given":"An","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Liehuang","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Yaoling","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Zeyuan","family":"Lyu","sequence":"additional","affiliation":[]},{"given":"Zongyue","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,16]]},"reference":[{"key":"319_CR1","doi-asserted-by":"crossref","unstructured":"Kocher P, Jaffe J, Jun B. Differential power analysis. In: Proceedings of Annual International Cryptology Conference. 1999, 388\u2013397","DOI":"10.1007\/3-540-48405-1_25"},{"key":"319_CR2","doi-asserted-by":"crossref","unstructured":"Kocher P C. Timing attacks on implementations of timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Proceedings of Annual International Cryptology Conference. 1996, 104\u2013113","DOI":"10.1007\/3-540-68697-5_9"},{"key":"319_CR3","doi-asserted-by":"crossref","unstructured":"Brier E, Clavier C, Oliver F. Correlation power analysis with a leakage model. In: Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems. 2004, 16\u201329","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"319_CR4","doi-asserted-by":"crossref","unstructured":"Chari S, Rao J R, Rohatgi P. Template attacks. In: Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems. 2002, 13\u201328","DOI":"10.1007\/3-540-36400-5_3"},{"key":"319_CR5","doi-asserted-by":"crossref","unstructured":"Schramm K, Wollinger T, Paar C. A new class of collision attacks and its application to DES. In: Proceedings of International Workshop on Fast Software Encryption. 2003, 206\u2013222","DOI":"10.1007\/978-3-540-39887-5_16"},{"key":"319_CR6","doi-asserted-by":"crossref","unstructured":"Gierlichs B, Batina L, Tuyls P, Preneel B. Mutual information analysis. In: Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems. 2008, 426\u2013442","DOI":"10.1007\/978-3-540-85053-3_27"},{"key":"319_CR7","doi-asserted-by":"crossref","unstructured":"Garcia F D, de Koning Gans G, Muijrers R, van Rossum P, Verdult R, Schreur R W, Jacobs B. Dismantling MIFARE classic. In: Proceedings of 13th European Symposium on Research in Computer Security. 2008, 97\u2013114","DOI":"10.1007\/978-3-540-88313-5_7"},{"issue":"10","key":"319_CR8","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1038\/s41928-019-0309-z","volume":"2","author":"M Holler","year":"2019","unstructured":"Holler M, Odstrcil M, Guizar-Sicairos M, Lebugle M, M\u00fcller E, Finizio S, Tinti G, David C, Zusman J, Unglaub W, Bunk O, Raabe J, Levi A F J, Aeppli G. Three-dimensional imaging of integrated circuits with macro- to nanoscale zoom. Nature Electronics, 2019, 2(10): 464\u2013470","journal-title":"Nature Electronics"},{"key":"319_CR9","doi-asserted-by":"crossref","unstructured":"Tiessen T, Knudsen L R, K\u00f6lbl S, Lauridsen M M. Security of the AES with a secret S-box. In: Proceedings of International Workshop on Fast Software Encryption. 2015, 175\u2013189","DOI":"10.1007\/978-3-662-48116-5_9"},{"key":"319_CR10","doi-asserted-by":"crossref","unstructured":"Clavier C, Isorez Q, Wurcker A. Complete SCARE of AES-like block ciphers by chosen plaintext collision power analysis. In: Proceedings of International Conference on Cryptology in India. 2013, 116\u2013135","DOI":"10.1007\/978-3-319-03515-4_8"},{"key":"319_CR11","doi-asserted-by":"crossref","unstructured":"Clavier C, Wurcker A. Reverse engineering of a secret AES-like cipher by ineffective fault analysis. In: Proceedings of 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography. 2013, 119\u2013128","DOI":"10.1109\/FDTC.2013.16"},{"key":"319_CR12","doi-asserted-by":"crossref","unstructured":"Sun B, Liu M, Guo J, Qu L, Rijmen V. New insights on AES-like SPN ciphers. In: Proceedings of Annual International Cryptology Conference. 2016, 605\u2013624","DOI":"10.1007\/978-3-662-53018-4_22"},{"issue":"2","key":"319_CR13","doi-asserted-by":"publisher","first-page":"192","DOI":"10.46586\/tosc.v2016.i2.192-225","volume":"2016","author":"L Grassi","year":"2017","unstructured":"Grassi L, Rechberger C, R\u00f8njom S. Subspace trail cryptanalysis and its applications to AES. IACR Transactions on Symmetric Cryptology, 2017, 2016(2): 192\u2013225","journal-title":"IACR Transactions on Symmetric Cryptology"},{"key":"319_CR14","doi-asserted-by":"crossref","unstructured":"Rivain M, Roche T. SCARE of secret ciphers with SPN structures. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security. 2013, 526\u2013544","DOI":"10.1007\/978-3-642-42033-7_27"},{"issue":"3","key":"319_CR15","first-page":"1","volume":"57","author":"M Tang","year":"2014","unstructured":"Tang M, Qiu Z L, Peng H B, Hu X B, Yi M, Zhang H G. Toward reverse engineering on secret s-boxes in block ciphers. Science China: Information Sciences, 2014, 57(3): 1\u201318","journal-title":"Science China: Information Sciences"},{"key":"319_CR16","doi-asserted-by":"crossref","unstructured":"Gao S, Chen H, Wu W, Fan L, Feng J, Ma X. Linear regression attack with F-test: A New SCARE Technique for Secret Block Ciphers. In: Proceedings of International Conference on Cryptology and Network Security. 2016, 3\u201318","DOI":"10.1007\/978-3-319-48965-0_1"},{"key":"319_CR17","doi-asserted-by":"publisher","first-page":"1072","DOI":"10.1109\/TIFS.2019.2932230","volume":"15","author":"J Breier","year":"2019","unstructured":"Breier J, Jap D, Hou X, Bhasin S. On side channel vulnerabilities of bit permutations in cryptographic algorithms. IEEE Transactions on Information Forensics and Security, 2019, 15: 1072\u20131085","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"319_CR18","doi-asserted-by":"crossref","unstructured":"Caforio A, Banik S. A study of persistent fault analysis. In: Proceedings of International Conference on Security, Privacy, and Applied Cryptography Engineering. 2019, 13\u201333","DOI":"10.1007\/978-3-030-35869-3_4"},{"key":"319_CR19","doi-asserted-by":"crossref","unstructured":"Clavier C. An improved SCARE cryptanalysis against a secret A3\/A8 GSM algorithm. In: Proceedings of International Conference on Information Systems Security. 2007, 143\u2013155","DOI":"10.1007\/978-3-540-77086-2_11"},{"key":"319_CR20","doi-asserted-by":"crossref","unstructured":"Novak R. Side-channel attack on substitution blocks. In: Proceedings of International Conference on Applied Cryptography and Network Security. 2003, 307\u2013318","DOI":"10.1007\/978-3-540-45203-4_24"},{"key":"319_CR21","doi-asserted-by":"crossref","unstructured":"Moradi A, Mischke O, Eisenbarth T. Correlation-enhanced power analysis collision attack. In: Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems. 2010, 125\u2013139","DOI":"10.1007\/978-3-642-15031-9_9"},{"key":"319_CR22","volume-title":"The design of Rijndael: AES-the advanced encryption standard","author":"D Joan","year":"2002","unstructured":"Joan D, Vincent R. The design of Rijndael: AES-the advanced encryption standard. 1st ed. Berlin: Springer-Verlag, 2002","edition":"1st ed."}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-020-0319-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11704-020-0319-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-020-0319-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,19]],"date-time":"2023-09-19T21:03:02Z","timestamp":1695157382000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11704-020-0319-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,16]]},"references-count":22,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,8]]}},"alternative-id":["319"],"URL":"https:\/\/doi.org\/10.1007\/s11704-020-0319-z","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,16]]},"assertion":[{"value":"5 July 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 November 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 November 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"164814"}}