{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T18:23:28Z","timestamp":1740162208865,"version":"3.37.3"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T00:00:00Z","timestamp":1672704000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T00:00:00Z","timestamp":1672704000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptogr Eng"],"published-print":{"date-parts":[[2023,11]]},"DOI":"10.1007\/s13389-022-00307-9","type":"journal-article","created":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T13:03:44Z","timestamp":1672751024000},"page":"409-425","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Spatial dependency analysis to extract information from side-channel mixtures: extended version"],"prefix":"10.1007","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9320-2685","authenticated-orcid":false,"given":"Aur\u00e9lien","family":"Vasselle","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7810-8570","authenticated-orcid":false,"given":"Hugues","family":"Thiebeauld","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9706-5710","authenticated-orcid":false,"given":"Philippe","family":"Maurine","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,3]]},"reference":[{"key":"307_CR1","unstructured":"2022. Gitlab repository for Nucleo SW AES with masking and shuffling. (December 2022). https:\/\/gitlab.com\/eshard\/nucleo_sw_aes_masked_shuffled Accessed Online"},{"key":"307_CR2","unstructured":"Alam, M., Khan, H.A., Dey, M., Sinha, N., Callan, R., Zajic, A., Prvulovic, M.: One &Done: a single-decryption EM-based attack on OpenSSL\u2019s constant-time blinded RSA. In: 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, pp. 585\u2013602 (2018). https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/alam"},{"issue":"2","key":"307_CR3","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/s00145-010-9084-8","volume":"24","author":"L Batina","year":"2011","unstructured":"Batina, L., Gierlichs, B., Prouff, E., Rivain, M., Standaert, F.-X., Veyrat-Charvillon, N.: Mutual information analysis: a comprehensive study. J. Cryptol. 24(2), 269\u2013291 (2011). https:\/\/doi.org\/10.1007\/s00145-010-9084-8","journal-title":"J. Cryptol."},{"key":"307_CR4","unstructured":"Belgarric, P., Bhasin, S., Bruneau, N., Danger, J.-L., Debande, N., Guilley, S., Heuser, A., Najm, Z., Rioul, O.: Time-frequency analysis for second-order attacks. IACR Cryptology ePrint Archive 2016, 772 (2016). http:\/\/eprint.iacr.org\/2016\/772"},{"key":"307_CR5","unstructured":"Bhasin, S., Danger, J.-L., Guilley, S., Najm, Z.: NICV: normalized inter-class variance for detection of side-channel leakage. IACR Cryptol. ePrint Arch. 2013, 717 (2013). http:\/\/eprint.iacr.org\/2013\/717"},{"key":"307_CR6","doi-asserted-by":"publisher","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) Cryptographic Hardware and Embedded Systems\u2014CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings (Lecture Notes in Computer Science), vol.\u00a03156, pp. 16\u201329. Springer (2004). https:\/\/doi.org\/10.1007\/978-3-540-28632-5_2","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"307_CR7","doi-asserted-by":"publisher","unstructured":"Clavier, C., Coron, J.-S., Dabbous, N.: Differential power analysis in the presence of hardware countermeasures. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems\u2014CHES 2000, 2nd International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings (Lecture Notes in Computer Science), vol.\u00a01965, pp. 252\u2013263. Springer (2000).https:\/\/doi.org\/10.1007\/3-540-44499-8_20","DOI":"10.1007\/3-540-44499-8_20"},{"issue":"2","key":"307_CR8","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/s13389-011-0010-2","volume":"1","author":"J Doget","year":"2011","unstructured":"Doget, J., Prouff, E., Rivain, M., Standaert, F.-X.: Univariate side channel attacks and leakage modeling. J. Cryptogr. Eng. 1(2), 123\u2013144 (2011). https:\/\/doi.org\/10.1007\/s13389-011-0010-2","journal-title":"J. Cryptogr. Eng."},{"key":"307_CR9","doi-asserted-by":"publisher","unstructured":"Genkin, D., Pachmanov, L., Pipman, I., Tromer, E., Yarom, Y.: ECDSA key extraction from mobile devices via nonintrusive physical side channels. In: Weippl, E.R., Katzenbeisser, S., Kruegel, C., Myers, A.C., Halevi, S. (eds.) Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016. ACM, pp. 1626\u20131638 (2016). https:\/\/doi.org\/10.1145\/2976749.2978353","DOI":"10.1145\/2976749.2978353"},{"issue":"2","key":"307_CR10","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/s13389-015-0100-7","volume":"5","author":"D Genkin","year":"2015","unstructured":"Genkin, D., Pipman, I., Tromer, E.: Get your hands off my laptop: physical side-channel key-extraction attacks on PCs\u2014extended version. J. Cryptogr. Eng. 5(2), 95\u2013112 (2015). https:\/\/doi.org\/10.1007\/s13389-015-0100-7","journal-title":"J. Cryptogr. Eng."},{"issue":"2","key":"307_CR11","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1177\/030913259501900205","volume":"19","author":"A Getis","year":"1995","unstructured":"Getis, A.: Cliff, ad and ord, jk 1973: Spatial autocorrelation. london: Pion. Progress Hum. Geogr. 19(2), 245\u2013249 (1995)","journal-title":"Progress Hum. Geogr."},{"key":"307_CR12","doi-asserted-by":"publisher","unstructured":"Gierlichs, B., Batina, L., Preneel, B., Verbauwhede, I.: Revisiting higher-order DPA attacks:. In: Pieprzyk, J. (ed.) Topics in Cryptology\u2014CT-RSA 2010, The Cryptographers\u2019 Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings (Lecture Notes in Computer Science), vol.\u00a05985, pp. 221\u2013234. Springer (2010). https:\/\/doi.org\/10.1007\/978-3-642-11925-5_16","DOI":"10.1007\/978-3-642-11925-5_16"},{"key":"307_CR13","doi-asserted-by":"publisher","unstructured":"Lemke-Rust, K., Paar, C.: Gaussian mixture models for higher-order side channel analysis. In: Paillier, P., Verbauwhede, I. (eds.) Cryptographic Hardware and Embedded Systems\u2014CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings (Lecture Notes in Computer Science), vol.\u00a04727, pp. 14\u201327. Springer (2007). https:\/\/doi.org\/10.1007\/978-3-540-74735-2_2","DOI":"10.1007\/978-3-540-74735-2_2"},{"key":"307_CR14","doi-asserted-by":"publisher","unstructured":"Longo, J., De Mulder, E., Page, D., Tunstall, M.: SoC It to EM: electromagnetic side-channel attacks on a complex system-on-chip. In: G\u00fcneysu, T., Handschuh, H. (eds.) Cryptographic Hardware and Embedded Systems\u2014CHES 2015\u201417th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings (Lecture Notes in Computer Science), vol.\u00a09293, pp. 620\u2013640. Springer (2015). https:\/\/doi.org\/10.1007\/978-3-662-48324-4_31","DOI":"10.1007\/978-3-662-48324-4_31"},{"key":"307_CR15","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1109\/TIT.1954.1057469","volume":"4","author":"WJ McGill","year":"1954","unstructured":"McGill, W.J.: Multivariate information transmission. Trans. IRE Prof. Group Inf. Theory (TIT) 4, 93\u2013111 (1954). https:\/\/doi.org\/10.1109\/TIT.1954.1057469","journal-title":"Trans. IRE Prof. Group Inf. Theory (TIT)"},{"issue":"1\/2","key":"307_CR16","doi-asserted-by":"publisher","first-page":"17","DOI":"10.2307\/2332142","volume":"37","author":"PAP Moran","year":"1950","unstructured":"Moran, P.A.P.: Notes on continuous stochastic phenomena. Biometrika 37(1\/2), 17\u201323 (1950)","journal-title":"Biometrika"},{"issue":"6","key":"307_CR17","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1109\/TC.2009.15","volume":"58","author":"E Prouff","year":"2009","unstructured":"Prouff, E., Rivain, M., Bevan, R.: Statistical analysis of second order differential power analysis. IEEE Trans. Comput. 58(6), 799\u2013811 (2009). https:\/\/doi.org\/10.1109\/TC.2009.15","journal-title":"IEEE Trans. Comput."},{"key":"307_CR18","unstructured":"Prouff, E., Strullu, R., Benadjila, R., Cagli, E., Dumas, C.: Study of deep learning techniques for side-channel analysis and introduction to ASCAD database. IACR Cryptol. ePrint Arch. 2018 , 53 (2018). http:\/\/eprint.iacr.org\/2018\/053"},{"issue":"1","key":"307_CR19","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MSP.2018.1331033","volume":"16","author":"E Ronen","year":"2018","unstructured":"Ronen, E., Shamir, A., Weingarten, A.-O., O\u2019Flynn, C.: IoT goes nuclear: creating a ZigBee chain reaction. IEEE Secur. Priv. 16(1), 54\u201362 (2018). https:\/\/doi.org\/10.1109\/MSP.2018.1331033","journal-title":"IEEE Secur. Priv."},{"key":"307_CR20","doi-asserted-by":"publisher","unstructured":"Roth, G., Mellor-Crummey, J.M., Kennedy, K., Brickner, R.G.: Compiling stencils in high performance Fortran. In: Proceedings of the ACM\/IEEE Conference on Supercomputing, SC 1997, November 15-21, (1997), San Jose, CA, USA. 12. https:\/\/doi.org\/10.1145\/509593.509605","DOI":"10.1145\/509593.509605"},{"key":"307_CR21","doi-asserted-by":"publisher","unstructured":"Standaert, F.-X., Gierlichs, B., Verbauwhede, I.: Partition versus comparison side-channel distinguishers: an empirical evaluation of statistical tests for univariate side-channel attacks against two unprotected CMOS devices. In: Lee, P.J., Cheon, J.H. (eds) Information Security and Cryptology\u2014ICISC 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers (Lecture Notes in Computer Science), vol.\u00a05461, pp. 253\u2013267. Springer (2008). https:\/\/doi.org\/10.1007\/978-3-642-00730-9_16","DOI":"10.1007\/978-3-642-00730-9_16"},{"key":"307_CR22","unstructured":"Suleiman, D.R., Ibrahim, M.A., Hamarash, I.I.: Dynamic voltage frequency scaling (DVFS) for microprocessors power and energy reduction"},{"key":"307_CR23","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-319-89641-0_8","volume-title":"SCATTER: a new dimension in side-channel","author":"H Thiebeauld","year":"2018","unstructured":"Thiebeauld, H., Gagnerot, G., Wurcker, A., Clavier, C.: SCATTER: a new dimension in side-channel, pp. 135\u2013152. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-89641-0_8"},{"key":"307_CR24","unstructured":"Thiebeauld, H., Vasselle, A., Wurcker, A.: Second-order Scatter Attack. IACR Cryptol. ePrint Arch. 2019, 345 (2019). https:\/\/eprint.iacr.org\/2019\/345"},{"key":"307_CR25","doi-asserted-by":"publisher","unstructured":"van Woudenberg, J.G.J., Witteman, M.F., Bakker, B.: Improving differential power analysis by elastic alignment. In: Kiayias, A. (ed.) Topics in Cryptology\u2014CT-RSA 2011: The Cryptographers\u2019 Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings (Lecture Notes in Computer Science), vol.\u00a06558, pp. 104\u2013119. Springer (2011). https:\/\/doi.org\/10.1007\/978-3-642-19074-2_8","DOI":"10.1007\/978-3-642-19074-2_8"},{"key":"307_CR26","doi-asserted-by":"publisher","unstructured":"Vasselle, A., Maurine, P., Cozzi, M.: Breaking mobile firmware encryption through near-field side-channel analysis. In: Chang, C.-H., R\u00fchrmair, U., Holcomb, D.E., Schaumont, P. (eds.) Proceedings of the 3rd ACM Workshop on Attacks and Solutions in Hardware Security Workshop, ASHES@CCS 2019, London, UK, November 15, 2019. ACM, pp. 23\u201332 (2019). https:\/\/doi.org\/10.1145\/3338508.3359571","DOI":"10.1145\/3338508.3359571"},{"key":"307_CR27","doi-asserted-by":"publisher","unstructured":"Vyas, S., Dumpala, N.K., Tessier, R., Holcomb, D.E.: Improving the efficiency of PUF-based key generation in FPGAs using variation-aware placement. In: Ienne, P., Najjar, W.A., Anderson, J.H., Brisk, P., Stechele, W. (eds.) 26th International Conference on Field Programmable Logic and Applications, FPL 2016, Lausanne, Switzerland, August 29 - September 2, 2016. IEEE, pp. 1\u20134. https:\/\/doi.org\/10.1109\/FPL.2016.7577307","DOI":"10.1109\/FPL.2016.7577307"},{"key":"307_CR28","doi-asserted-by":"publisher","unstructured":"Waddle, J., Wagner, D.A.: Towards efficient second-order power analysis. In: Joye, M., Quisquater, J.-J. (eds.) Cryptographic Hardware and Embedded Systems\u2014CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings (Lecture Notes in Computer Science), vol.\u00a03156, pp. 1\u201315. Springer. https:\/\/doi.org\/10.1007\/978-3-540-28632-5_1","DOI":"10.1007\/978-3-540-28632-5_1"},{"issue":"6","key":"307_CR29","doi-asserted-by":"publisher","first-page":"1468","DOI":"10.1109\/TIFS.2018.2791341","volume":"13","author":"F Wilde","year":"2018","unstructured":"Wilde, F., Gammel, B.M., Pehl, M.: Spatial correlation analysis on physical unclonable functions. IEEE Trans. Inf. Forensics Secur. 13(6), 1468\u20131480 (2018). https:\/\/doi.org\/10.1109\/TIFS.2018.2791341","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"307_CR30","doi-asserted-by":"publisher","unstructured":"Yang, S., Wolf, W.H., Vijaykrishnan, N., Serpanos, D.N., Xie, Y.: Power attack resistant cryptosystem design: a dynamic voltage and frequency switching approach. In: 2005 Design, Automation and Test in Europe Conference and Exposition (DATE 2005), 7-11 March 2005, Munich, Germany. IEEE Computer Society, pp. 64\u201369. https:\/\/doi.org\/10.1109\/DATE.2005.241","DOI":"10.1109\/DATE.2005.241"}],"container-title":["Journal of Cryptographic Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-022-00307-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13389-022-00307-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-022-00307-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T12:20:02Z","timestamp":1700742002000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13389-022-00307-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,3]]},"references-count":30,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,11]]}},"alternative-id":["307"],"URL":"https:\/\/doi.org\/10.1007\/s13389-022-00307-9","relation":{},"ISSN":["2190-8508","2190-8516"],"issn-type":[{"type":"print","value":"2190-8508"},{"type":"electronic","value":"2190-8516"}],"subject":[],"published":{"date-parts":[[2023,1,3]]},"assertion":[{"value":"12 June 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 November 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}