{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T02:28:22Z","timestamp":1772764102688,"version":"3.50.1"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2012,3,20]],"date-time":"2012-03-20T00:00:00Z","timestamp":1332201600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Cryptogr Eng"],"published-print":{"date-parts":[[2012,5]]},"DOI":"10.1007\/s13389-012-0028-0","type":"journal-article","created":{"date-parts":[[2012,3,19]],"date-time":"2012-03-19T11:27:00Z","timestamp":1332156420000},"page":"45-62","source":"Crossref","is-referenced-by-count":21,"title":["Analysis of the algebraic side channel attack"],"prefix":"10.1007","volume":"2","author":[{"given":"Claude","family":"Carlet","sequence":"first","affiliation":[]},{"given":"Jean-Charles","family":"Faug\u00e8re","sequence":"additional","affiliation":[]},{"given":"Christopher","family":"Goyet","sequence":"additional","affiliation":[]},{"given":"Gu\u00e9na\u00ebl","family":"Renault","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,3,20]]},"reference":[{"key":"28_CR1","doi-asserted-by":"crossref","unstructured":"Armknecht, F., Ars, G.: Introducing a new variant of fast algebraic attacks and minimizing their successive data complexity. In: Mycrypt, pp. 16\u201332 (2005)","DOI":"10.1007\/11554868_3"},{"key":"28_CR2","doi-asserted-by":"crossref","unstructured":"Akkar, M.-L., Bevan, R., Dischamp, P., Moyart, D.: Power analysis, what is now possible . . . . In: ASIACRYPT, pp. 489\u2013502 (2000)","DOI":"10.1007\/3-540-44448-3_38"},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Albrecht, M., Cid, C.: Cold boot key recovery using polynomial system solving with noise. In: 2nd International Conference on Symbolic Computation and Cryptography (2010)","DOI":"10.1007\/978-3-642-21554-4_4"},{"key":"28_CR4","unstructured":"Ars, G., Faug\u00e8re, J.-C.: Algebraic immunities of functions over finite fields. Research Report RR-5532, INRIA (2005)"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Aoki, K., Ichikawa, T., Kanda, M., Matsui, M., Moriai, S., Nakajima, J., Tokita, T.: Camellia: a 128-bit block cipher suitable for multiple platforms (2000)","DOI":"10.1007\/3-540-44983-3_4"},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"Armknecht, F., Krause, M.: Constructing single- and multi-output Boolean functions with maximal immunity. In: Proceedings of ICALP 2006, Lecture Notes of Computer Science, vol. 4052, pp. 180\u2013191 (2006)","DOI":"10.1007\/11787006_16"},{"key":"28_CR7","unstructured":"Ars, G.: Applications des bases de Gr\u00f6bner en cryptographie. PhD thesis, University of Rennes (2005)"},{"key":"28_CR8","unstructured":"Bardet, M.: \u00c9tude des syst\u00e8mes alg\u00e9briques surd\u00e9termin\u00e9s. Applications aux codes correcteurs et \u00e0 \u00e0 la cryptographie. PhD thesis, Universit\u00e9 de Paris VI (2004)"},{"key":"28_CR9","doi-asserted-by":"crossref","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: CHES\u201904, pp. 16\u201329 (2004)","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"28_CR10","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1006\/jsco.1996.0125","volume":"24","author":"W. Bosma","year":"1997","unstructured":"Bosma W., Cannon J., Playoust C.: The MAGMA algebra system: the user language. J. Symb. Comput. 24, 235\u2013265 (1997)","journal-title":"J. Symb. Comput."},{"key":"28_CR11","unstructured":"Bardet, M., Faug\u00e8re, J.-C., Salvy, B.: On the complexity of Gr\u00f6bner basis computation of semi-regular overdetermined algebraic equations. In: Proceedings of International Conference on Polynomial System Solving (ICPSS), pp. 71\u201375 (2004)"},{"key":"28_CR12","unstructured":"Bardet, M., Faug\u00e8re, J.-C., Salvy, B., Yang, B.-Y.: Asymptotic behaviour of the degree of regularity of semi-regular polynomial systems. In: Proceedings of MEGA 2005, Eighth International Symposium on Effective Methods in Algebraic Geometry (2005)"},{"key":"28_CR13","unstructured":"Bogdanov, A., Knudsen, L.R., Le, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher. In: CHES\u201907. Springer, Berlin (2007)"},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"Bogdanov, A., Kizhvatov, I., Pyshkin, A.: Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection. In: INDOCRYPT, pp. 251\u2013265 (2008)","DOI":"10.1007\/978-3-540-89754-5_20"},{"key":"28_CR15","doi-asserted-by":"crossref","unstructured":"Bogdanov, A.: Improved side-channel collision attacks on AES. In: Adams, C., Miri, A., Wiener, M. (eds.) Selected Areas in Cryptography, Lecture Notes in Computer Science, vol. 4876, pp. 84\u201395. Springer, Heidelberg (2007)","DOI":"10.1007\/978-3-540-77360-3_6"},{"key":"28_CR16","doi-asserted-by":"crossref","unstructured":"Bogdanov, A.: Multiple-differential side-channel collision attacks on AES. In: Oswald, E., Rohatgi, P. (eds.) Cryptographic Hardware and Embedded Systems\u2014CHES 2008 Proceedings, Lecture Notes in Computer Science, vol. 5154, pp. 30\u201344. Springer, Berlin (2008)","DOI":"10.1007\/978-3-540-85053-3_3"},{"key":"28_CR17","doi-asserted-by":"crossref","unstructured":"Carlet, C.: On the algebraic immunities and higher order nonlinearities of vectorial Boolean functions. In: NATO Science for Peace and Security Series, D: Information and Communication Security, vol. 13, pp. 104\u2013116. IOS Press, Amsterdam (2009)","DOI":"10.1109\/ARES.2009.31"},{"key":"28_CR18","doi-asserted-by":"crossref","unstructured":"Carlet, C.: Vectorial Boolean functions for cryptography, pp. 398\u2013469. In: Boolean Models and Methods in Mathematics, Computer Science, and Engineering. Cambridge University Press, Cambridge (2010)","DOI":"10.1017\/CBO9780511780448.012"},{"key":"28_CR19","unstructured":"Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards sound approaches to counteract power-analysis attacks. In: Proceedings of Advances in Cryptology\u2014CRYPTO \u201999, 19th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 15\u201319, 1999, pp. 398\u2013412. Springer, Berlin (1999)"},{"key":"28_CR20","doi-asserted-by":"crossref","unstructured":"Cid C., Leurent G.: An Analysis of the XSL Algorithm. In: ASIACRYPT, pp. 333\u2013352 (2005)","DOI":"10.1007\/11593447_18"},{"key":"28_CR21","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-35651-8","volume-title":"Ideals, Varieties, and Algorithms: An Introduction to Computational Algebraic Geometry and Commutative Algebra, 3\/e (Undergraduate Texts in Mathematics)","author":"D.A. Cox","year":"2007","unstructured":"Cox D.A., Little J., O\u2019Shea D.: Ideals, Varieties, and Algorithms: An Introduction to Computational Algebraic Geometry and Commutative Algebra, 3\/e (Undergraduate Texts in Mathematics). Springer, New Jersey (2007)"},{"key":"28_CR22","doi-asserted-by":"crossref","unstructured":"Courtois, N., Meier, W.: Algebraic Attacks on Stream Ciphers with Linear Feedback. In: EUROCRYPT, pp. 345\u2013359 (2003)","DOI":"10.1007\/3-540-39200-9_21"},{"key":"28_CR23","doi-asserted-by":"crossref","unstructured":"Courtois, N., Pieprzyk, J.: Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. In: ASIACRYPT, pp. 267\u2013287 (2002)","DOI":"10.1007\/3-540-36178-2_17"},{"key":"28_CR24","doi-asserted-by":"crossref","unstructured":"Faug\u00e8re, J.-C.: A new efficient algorithm for computing Gr\u00f6bner bases (F4). In: Journal of Pure and Applied Algebra, pp. 75\u201383. ACM Press, New York (1999)","DOI":"10.1016\/S0022-4049(99)00005-5"},{"key":"28_CR25","doi-asserted-by":"crossref","unstructured":"Faug\u00e8re, J.-C.: A new efficient algorithm for computing Gr\u00f6bner bases without reduction to zero (F5). In: Proceedings of the 2002 International Symposium on Symbolic and Algebraic Computation, ISSAC \u201902, pp. 75\u201383. ACM, New York (2002)","DOI":"10.1145\/780506.780516"},{"key":"28_CR26","doi-asserted-by":"crossref","unstructured":"Faug\u00e8re, J.-C.: Fran\u00e7oise Levy dit Vehel, and Ludovic Perret. Cryptanalysis of MinRank. In: CRYPTO, pp. 280\u2013296 (2008)","DOI":"10.1007\/978-3-540-85174-5_16"},{"key":"28_CR27","doi-asserted-by":"crossref","unstructured":"Faug\u00e8re, J.-C., Joux, A.: Algebraic cryptanalysis of hidden field equation (HFE) cryptosystems using Gr\u00f6bner bases. In: CRYPTO, pp. 44\u201360 (2003)","DOI":"10.1007\/978-3-540-45146-4_3"},{"key":"28_CR28","doi-asserted-by":"crossref","unstructured":"Fischer, S., Meier, W.: Algebraic immunity of S-boxes and augmented functions. In: FSE, pp. 366\u2013381 (2007)","DOI":"10.1007\/978-3-540-74619-5_23"},{"key":"28_CR29","doi-asserted-by":"crossref","unstructured":"Faug\u00e8re, J.-C., Perret, L.: Cryptanalysis of 2R \u2212 schemes. In: CRYPTO, pp. 357\u2013372 (2006)","DOI":"10.1007\/11818175_21"},{"key":"28_CR30","doi-asserted-by":"crossref","unstructured":"Faug\u00e8re, J.-C., Perret, L.: Polynomial equivalence problems: algorithmic and theoretical aspects. In: EUROCRYPT, pp. 30\u201347 (2006)","DOI":"10.1007\/11761679_3"},{"key":"28_CR31","doi-asserted-by":"crossref","unstructured":"Handschuh, H., Preneel, B.: Blind differential crypt analysis for enhanced power attacks. In: Selected Areas in Cryptography, pp. 163\u2013173 (2006)","DOI":"10.1007\/978-3-540-74462-7_12"},{"key":"28_CR32","doi-asserted-by":"crossref","unstructured":"Moradi, A., Mischke, O., Eisenbarth, T.: Correlation-enhanced power analysis collision attack. In: CHES\u201910 (2010)","DOI":"10.1007\/978-3-642-15031-9_9"},{"key":"28_CR33","volume-title":"Power Analysis Attacks: Revealing the Secrets of Smart Cards","author":"S. Mangard","year":"2007","unstructured":"Mangard S., Oswald E., Popp T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer, New York (2007)"},{"key":"28_CR34","unstructured":"Office of State Commercial Cryptography Administration. The SMS4 block cipher (in Chinese) (2006). http:\/\/www.oscca.gov.cn\/UpFile\/200621016423197990.pdf"},{"key":"28_CR35","doi-asserted-by":"crossref","unstructured":"Oren, Y., Kirschbaum, M., Popp, T., Wool, A.: Algebraic side-channel analysis in the presence of errors. In: CHES\u201910 (2010)","DOI":"10.1007\/978-3-642-15031-9_29"},{"key":"28_CR36","doi-asserted-by":"crossref","unstructured":"Prouff, E.: DPA attacks and S-boxes. In: FSE, pp. 424\u2013441 (2005)","DOI":"10.1007\/11502760_29"},{"key":"28_CR37","doi-asserted-by":"crossref","unstructured":"Renauld, M., Standaert, F.-X.: Algebraic side-channel attacks. In: Inscrypt 2009, LNCS, Springer, Berlin (2009)","DOI":"10.1007\/978-3-642-16342-5_29"},{"key":"28_CR38","doi-asserted-by":"crossref","unstructured":"Renauld, M., Standaert, F.-X.: Representation-, leakage- and cipher- dependencies in algebraic side-channel attacks. In: ACNS 2010 Industrial Track, pp. 1\u201318 (2010)","DOI":"10.1007\/978-3-642-16342-5_29"},{"key":"28_CR39","doi-asserted-by":"crossref","unstructured":"Renauld, M., Standaert, F.-X., Veyrat-Charvillon, N.: Algebraic side-channel attacks on the AES: why time also matters in DPA. In: CHES\u201909, pp. 97\u2013111. Springer, Berlin (2009)","DOI":"10.1007\/978-3-642-04138-9_8"},{"key":"28_CR40","doi-asserted-by":"crossref","unstructured":"Schramm, K., Leander, G., Felke, P., Paar, C.: A collision-attack on AES combining side channel and differential attack. In: CHES\u201904, pp. 163\u2013175 (2004)","DOI":"10.1007\/978-3-540-28632-5_12"},{"key":"28_CR41","doi-asserted-by":"crossref","unstructured":"Soos, M., Nohl, K., Castelluccia, C.: Extending SAT solvers to cryptographic problems. In: SAT, pp. 244\u2013257 (2009)","DOI":"10.1007\/978-3-642-02777-2_24"},{"key":"28_CR42","doi-asserted-by":"crossref","unstructured":"Schramm, K., Wollinger, T., Paar, C.: A new class of collision attacks and its application to DES. In: Fast Software Encryption FSE 03, LNCS, vol. 2887, pp. 206\u2013222. Springer, Berlin (2003)","DOI":"10.1007\/978-3-540-39887-5_16"}],"container-title":["Journal of Cryptographic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-012-0028-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13389-012-0028-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-012-0028-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,21]],"date-time":"2023-06-21T07:36:48Z","timestamp":1687333008000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13389-012-0028-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3,20]]},"references-count":42,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,5]]}},"alternative-id":["28"],"URL":"https:\/\/doi.org\/10.1007\/s13389-012-0028-0","relation":{},"ISSN":["2190-8508","2190-8516"],"issn-type":[{"value":"2190-8508","type":"print"},{"value":"2190-8516","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,3,20]]}}}