{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:31:54Z","timestamp":1767339114446,"version":"3.41.0"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2015,9,22]],"date-time":"2015-09-22T00:00:00Z","timestamp":1442880000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2015,9,22]],"date-time":"2015-09-22T00:00:00Z","timestamp":1442880000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["0845871"],"award-info":[{"award-number":["0845871"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1314655"],"award-info":[{"award-number":["1314655"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1337854"],"award-info":[{"award-number":["1337854"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptogr Eng"],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1007\/s13389-015-0107-0","type":"journal-article","created":{"date-parts":[[2015,9,22]],"date-time":"2015-09-22T05:54:36Z","timestamp":1442901276000},"page":"227-243","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":34,"title":["A statistics-based success rate model for DPA and CPA"],"prefix":"10.1007","volume":"5","author":[{"given":"Yunsi","family":"Fei","sequence":"first","affiliation":[]},{"given":"A. Adam","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Lao","sequence":"additional","affiliation":[]},{"given":"Liwei","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,9,22]]},"reference":[{"key":"107_CR1","doi-asserted-by":"crossref","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Proceedings of the International Cryptology Conference on Advances in Cryptology, pp. 388\u2013397 (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"key":"107_CR2","doi-asserted-by":"crossref","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 135\u2013152 (2004)","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"107_CR3","doi-asserted-by":"crossref","unstructured":"Gierlichs, B., Batina, L., Tuyls, P., Preneel, B.: Mutual information analysis. In: International Workshop Cryptographic Hardware and Embedded System, pp. 426\u2014442 (2008)","DOI":"10.1007\/978-3-540-85053-3_27"},{"key":"107_CR4","doi-asserted-by":"crossref","unstructured":"Le, T.-H., Cl\u00e9di\u00e8re, J., Canovas, C., Robisson, B., Servi\u00e8re, C., Lacume, J.-L.: A proposition for correlation power analysis enhancement. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 174\u2013186 (2006)","DOI":"10.1007\/11894063_14"},{"key":"107_CR5","doi-asserted-by":"crossref","unstructured":"Quisquater, J.-J., Samyde, D.: Electromagnetic analysis (EMA): measures and counter-measures for smart cards. In: Smart Card Programming and Security, pp. 200\u2013210 (2001)","DOI":"10.1007\/3-540-45418-7_17"},{"key":"107_CR6","doi-asserted-by":"crossref","unstructured":"Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: concrete results. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 251\u2013261 (2001)","DOI":"10.1007\/3-540-44709-1_21"},{"key":"107_CR7","doi-asserted-by":"crossref","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie\u2013Hellman, RSA, DSS, and other systems. In: Proceedings of the International Cryptology Conference on Advances in Cryptology, pp. 104\u2013113 (1996)","DOI":"10.1007\/3-540-68697-5_9"},{"key":"107_CR8","doi-asserted-by":"crossref","unstructured":"Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards sound approaches to counter power analysis attacks. In: Proceedings of Crypto, pp. 398\u2013412 (1999)","DOI":"10.1007\/3-540-48405-1_26"},{"key":"107_CR9","doi-asserted-by":"crossref","unstructured":"Tiri, K., Verbauwhede, I.: A VLSI design flow for secure side-channel attack resistant ICs. In: Proceedings of Design, Automation and Test in Europe, pp. 58\u201363 (2005)","DOI":"10.1109\/DATE.2005.44"},{"key":"107_CR10","doi-asserted-by":"crossref","unstructured":"Clavier, C., Coron, J.-S., Dabbous, N.: Differential power analysis in the presence of hardware countermeasures. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 252\u2013263 (2000)","DOI":"10.1007\/3-540-44499-8_20"},{"key":"107_CR11","doi-asserted-by":"crossref","unstructured":"Gierlichs, B., Lemke-Rust, K., Paar, C.: Templates vs. stochastic methods: a performance analysis for side channel cryptanalysis. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 15\u201329 (2006)","DOI":"10.1007\/11894063_2"},{"key":"107_CR12","unstructured":"Standaert, F.-X., Bulens, P., de Meulenaer, G., Veyrat-Charvillon, N.: Improving the rules of the DPA contest. In: Cryptology ePrint Archive, Report 2008\/517 (2008). http:\/\/eprint.iacr.org\/2008\/517"},{"key":"107_CR13","doi-asserted-by":"crossref","unstructured":"Standaert, F.-X., Malkin, T., Yung, M.: A unified framework for the analysis of side-channel key recovery attacks. In: Advances in Cryptology\u2014EUROCRYPT 2009, pp. 443\u2013461 (2009)","DOI":"10.1007\/978-3-642-01001-9_26"},{"key":"107_CR14","doi-asserted-by":"crossref","unstructured":"Veyrat-Charvillon, N., Standaert, F.-X.: Mutual information analysis: how, when and why? In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 429\u2013443 (2008)","DOI":"10.1007\/978-3-642-04138-9_30"},{"issue":"5","key":"107_CR15","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5), 541\u2013552 (2002)","journal-title":"IEEE Trans. Comput."},{"key":"107_CR16","doi-asserted-by":"crossref","unstructured":"Bevan, R., Knudsen, E.: Ways to enhance differential power analysis. In: International Conference on Information Security and Cryptology, pp. 327\u2013342 (2003)","DOI":"10.1007\/3-540-36552-4_23"},{"key":"107_CR17","doi-asserted-by":"crossref","unstructured":"Guilley, S., Hoogvorst, P., Pacalet, R.: Differential power analysis model and some results. In: Smart Card Research and Advanced Applications VI, vol. 153, pp. 127\u2013142 (2004)","DOI":"10.1007\/1-4020-8147-2_9"},{"key":"107_CR18","doi-asserted-by":"crossref","unstructured":"Luo, Q., Fei, Y.: Algorithmic collision analysis for evaluating cryptographic systems and side-channel attacks. In: IEEE International Symposium Hardware Oriented Security and Trust, pp. 75\u201380 (2011)","DOI":"10.1109\/HST.2011.5955000"},{"key":"107_CR19","doi-asserted-by":"crossref","unstructured":"Fei, Y., Luo, Q., Ding, A.A.: A statistical model for DPA with novel algorithmic confusion analysis. In: International Workshop on Cryptographic Hardware and Embedded Systems, Sept. 2012, pp. 233\u2013250","DOI":"10.1007\/978-3-642-33027-8_14"},{"key":"107_CR20","doi-asserted-by":"crossref","unstructured":"Mangard, S.: Hardware countermeasures against DPA: a statistical analysis of their effectiveness. In: CT-RSA, pp. 1988\u20131998 (2004)","DOI":"10.1007\/978-3-540-24660-2_18"},{"key":"107_CR21","doi-asserted-by":"crossref","unstructured":"Standaert, F.-X., Peeters, E., Rouvroy, G., Quisquater, J.: An overview of power analysis attacks against field programmable gate arrays. In: Proceedings of the IEEE, vol. 94, pp. 383\u2013394","DOI":"10.1109\/JPROC.2005.862437"},{"key":"107_CR22","doi-asserted-by":"crossref","unstructured":"Rivain, M.: On the exact success rate of side channel analysis in the gaussian model. In: Selected Areas in Cryptography, vol. 5381, pp. 165\u2013183 (2009)","DOI":"10.1007\/978-3-642-04159-4_11"},{"key":"107_CR23","doi-asserted-by":"crossref","unstructured":"Duc, A., Faust, S., Standaert, F.-X.: Making masking security proofs concrete. In: Advances in Cryptology\u2014EUROCRYPT 2015, vol. 9056, pp. 401\u2013429 (2015)","DOI":"10.1007\/978-3-662-46800-5_16"},{"key":"107_CR24","doi-asserted-by":"crossref","unstructured":"Prouff, E.: DPA attacks and S-Boxes. In: International Workshop on Fast Software Encryption, pp. 1\u20138 (2005)","DOI":"10.1007\/11502760_29"},{"key":"107_CR25","doi-asserted-by":"crossref","unstructured":"Thillard, A., Prouff, E., Roche, T.: Success through confidence: evaluating the effectiveness of a side-channel attack. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 21\u201336 (2013)","DOI":"10.1007\/978-3-642-40349-1_2"},{"key":"107_CR26","doi-asserted-by":"crossref","unstructured":"Schindler, W., Lemke, K., Paar, C.: A stochastic model for differential side channel cryptanalysis. In: Cryptographic Hardware and Embedded Systems-CHES 2005. Springer, Berlin, pp. 30\u201346 (2005)","DOI":"10.1007\/11545262_3"},{"key":"107_CR27","doi-asserted-by":"crossref","unstructured":"Heuser, A., Rioul, O., Guilley, S.: A theoretical study of Kolmogorov\u2013Smirnov distinguishers. In: Constructive Side-Channel Analysis and Secure Design, pp. 9\u201328 (2014)","DOI":"10.1007\/978-3-319-10175-0_2"},{"key":"107_CR28","unstructured":"Neyman, J., Pearson, E.S.: On the Problem of the Most Efficient Tests of Statistical Hypotheses. R. Soc. Lond. Philos. Trans. Ser. A 231, 289\u2013337 (1933)"},{"key":"107_CR29","doi-asserted-by":"publisher","DOI":"10.1142\/p341","volume-title":"Information Theory and the Central Limit Theorem","author":"OT Johnson","year":"2004","unstructured":"Johnson, O.T.: Information Theory and the Central Limit Theorem. Imperial College Press, London (2004)"},{"key":"107_CR30","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1214\/aoms\/1177729694","volume":"22","author":"S Kullback","year":"1951","unstructured":"Kullback, S., Leibler, R.A.: On information and sufficiency. Ann. Math. Stat. 22, 49\u201386 (1951)","journal-title":"Ann. Math. Stat."},{"issue":"2","key":"107_CR31","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/s13389-011-0010-2","volume":"1","author":"J Doget","year":"2011","unstructured":"Doget, J., Prouff, E., Rivain, M., Standaert, F.-X.: Univariate side channel attacks and leakage modeling. J. Cryptogr. Eng. 1(2), 123\u2013144 (2011)","journal-title":"J. Cryptogr. Eng."},{"issue":"2","key":"107_CR32","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1049\/iet-ifs.2010.0096","volume":"5","author":"S Mangard","year":"2011","unstructured":"Mangard, S., Oswald, E., Standaert, F.-X.: One for all\u2014all for one: unifying standard differential power analysis attacks. IET Inf. Secur 5(2), 100\u2013110 (2011)","journal-title":"IET Inf. Secur"},{"key":"107_CR33","unstructured":"DPA Contest. http:\/\/www.dpacontest.org\/"},{"key":"107_CR34","unstructured":"Side-channel attack standard evaluation board (SASEBO). Research Center for Information Security (RCIS). http:\/\/www.rcis.aist.go.jp\/special\/SASEBO\/index-en.html"},{"key":"107_CR35","volume-title":"Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)","author":"S Mangard","year":"2007","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security). Springer, New York (2007)"},{"key":"107_CR36","doi-asserted-by":"crossref","unstructured":"Oswald, E., Mangard, S., Pramstaller, N., Rijmen, V.: A side-channel analysis resistant description of the AES S-box. In: Fast Software Encryption, pp. 413\u2013423 (2005)","DOI":"10.1007\/11502760_28"},{"key":"107_CR37","doi-asserted-by":"crossref","unstructured":"Canright, D., Batina, L.: A very compact perfectly masked S-box for AES. In: Applied Cryptography and Network Security, pp. 446\u2013459 (2008)","DOI":"10.1007\/978-3-540-68914-0_27"},{"key":"107_CR38","doi-asserted-by":"crossref","unstructured":"Tiri, K., Schaumont, P.: Changing the odds against masked logic. In: Selected Areas in Cryptography, pp. 134\u2013146 (2007)","DOI":"10.1007\/978-3-540-74462-7_10"},{"key":"107_CR39","doi-asserted-by":"crossref","unstructured":"Chen, Z., Sinha, A., Schaumont, P.: Implementing virtual secure circuit using a custom-instruction approach. In: Proceedings of the International Conference on Compilers, Architectures and Synthesis for Embedded Systems, pp. 57\u201366 (2010)","DOI":"10.1145\/1878921.1878933"},{"key":"107_CR40","unstructured":"Tiri, K., Akmal, M., Verbauwhede, I.: A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards. In: Proceedings of European Solid-State Circuits Conference, pp. 403\u2013406 (2002)"},{"key":"107_CR41","unstructured":"Tiri, K., Verbauwhede, I.: A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation. In: Proceedings of the International Conference on Design, Automation and Test in Europe, pp. 246\u2013251 (2004)"},{"key":"107_CR42","unstructured":"Yang, S., Wolf, W., Vijaykrishnan, N., Serpanos, D., Xie, Y.: Power attack resistant cryptosystem design: a dynamic voltage and frequency switching approach. In: Proceedings of the International Conference on Design Automation and Test in Europe (2005)"},{"key":"107_CR43","doi-asserted-by":"crossref","unstructured":"Coron, J., Kizhvatov, I.: An efficient method for random delay generation in embedded software. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 156\u2013170 (2009)","DOI":"10.1007\/978-3-642-04138-9_12"},{"key":"107_CR44","doi-asserted-by":"crossref","unstructured":"Coron, J., Kizhvatov, I.: Analysis and improvement of the random delay countermeasure of CHES 2009. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 95\u2013109 (2011)","DOI":"10.1007\/978-3-642-15031-9_7"},{"key":"107_CR45","doi-asserted-by":"crossref","unstructured":"Bucci, M., Luzzi, R., Guglielmo, M., Trifiletti, A.: A countermeasure against differential power analysis based on random delay insertion. In: Proceedings of IEEE International Symposium Circuits and Systems, pp. 3547\u20133550 (2005)","DOI":"10.1109\/ISCAS.2005.1465395"}],"container-title":["Journal of Cryptographic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-015-0107-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13389-015-0107-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-015-0107-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-015-0107-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T19:00:22Z","timestamp":1748631622000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13389-015-0107-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,22]]},"references-count":45,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,11]]}},"alternative-id":["107"],"URL":"https:\/\/doi.org\/10.1007\/s13389-015-0107-0","relation":{},"ISSN":["2190-8508","2190-8516"],"issn-type":[{"type":"print","value":"2190-8508"},{"type":"electronic","value":"2190-8516"}],"subject":[],"published":{"date-parts":[[2015,9,22]]},"assertion":[{"value":"14 September 2013","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 July 2015","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 September 2015","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}