{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:55:43Z","timestamp":1762005343931,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319893389"},{"type":"electronic","value":"9783319893396"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-89339-6_7","type":"book-chapter","created":{"date-parts":[[2018,4,5]],"date-time":"2018-04-05T01:32:30Z","timestamp":1522891950000},"page":"107-123","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["SCA-Resistance for AES: How Cheap Can We Go?"],"prefix":"10.1007","author":[{"given":"Ricardo","family":"Chaves","sequence":"first","affiliation":[]},{"given":"\u0141ukasz","family":"Chmielewski","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Regazzoni","sequence":"additional","affiliation":[]},{"given":"Lejla","family":"Batina","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,6]]},"reference":[{"key":"7_CR1","unstructured":"Becker, G., Cooper, J., DeMulder, E., Goodwill, G., Jaffe, J., Kenworthy, G., Kouzminov, T., Leiserson, A., Marson, M., Rohatgi, P., Saab, S.: Test vector leakage assessment (TVLA) methodology in practice. In: International Cryptographic Module Conference, vol. 1001, p. 13 (2013)"},{"key":"7_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/11545262_32","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"D Canright","year":"2005","unstructured":"Canright, D.: A very compact S-box for AES. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 441\u2013455. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11545262_32"},{"key":"7_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1007\/3-540-48405-1_26","volume-title":"Advances in Cryptology \u2014 CRYPTO 1999","author":"S Chari","year":"1999","unstructured":"Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards sound approaches to counteract power-analysis attacks. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 398\u2013412. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_26"},{"key":"7_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-36400-5_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S Chari","year":"2003","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski, B.S., Ko\u00e7, K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13\u201328. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36400-5_3"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Chaves, R., Kuzmanov, G., Vassiliadis, S., Sousa, L.: Reconfigurable memory based AES co-processor. In: 20th International Parallel and Distributed Processing Symposium 2006, IPDPS 2006, pp. 8\u2013pp. IEEE (2006)","DOI":"10.1109\/IPDPS.2006.1639441"},{"issue":"2","key":"7_CR6","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/s13389-011-0010-2","volume":"1","author":"J Doget","year":"2011","unstructured":"Doget, J., Prouff, E., Rivain, M., Standaert, F.X.: Univariate side channel attacks and leakage modeling. J. Cryptograph. Eng. 1(2), 123\u2013144 (2011)","journal-title":"J. Cryptograph. Eng."},{"key":"7_CR7","unstructured":"Gilbert Goodwill, B.J., Jaffe, J., Rohatgi, P.: A testing methodology for side-channel resistance validation (2011)"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-642-23951-9_3","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"T G\u00fcneysu","year":"2011","unstructured":"G\u00fcneysu, T., Moradi, A.: Generic side-channel countermeasures for reconfigurable devices. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 33\u201348. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23951-9_3"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Guntur, H., Ishii, J., Satoh, A.: Side-channel attack user reference architecture board SAKURA-G. In: 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE), pp. 271\u2013274, October 2014","DOI":"10.1109\/GCCE.2014.7031104"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Kaps, J., Velegalati, R.: DPA resistant AES on FPGA using partial DDL. In: 2010 18th IEEE Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM), pp. 273\u2013280. IEEE (2010)","DOI":"10.1109\/FCCM.2010.49"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2014 CRYPTO 1999","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_25"},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/3-540-44706-7_11","volume-title":"Fast Software Encryption","author":"TS Messerges","year":"2001","unstructured":"Messerges, T.S.: Securing the AES finalists against power analysis attacks. In: Goos, G., Hartmanis, J., van Leeuwen, J., Schneier, B. (eds.) FSE 2000. LNCS, vol. 1978, pp. 150\u2013164. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44706-7_11"},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/978-3-642-25578-6_4","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2011","author":"M Nassar","year":"2011","unstructured":"Nassar, M., Guilley, S., Danger, J.-L.: Formal analysis of the entropy\/security trade-off in first-order masking countermeasures against side-channel attacks. In: Bernstein, D.J., Chatterjee, S. (eds.) INDOCRYPT 2011. LNCS, vol. 7107, pp. 22\u201339. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-25578-6_4"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Nassar, M., Souissi, Y., Guilley, S., Danger, J.L.: RSM: a small and fast countermeasure for AES, secure against 1st and 2nd-order zero-offset SCAs. In: Design, Automation and Test in Europe Conference and Exhibition (DATE), pp. 1173\u20131178. IEEE (2012)","DOI":"10.1109\/DATE.2012.6176671"},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/11604938_23","volume-title":"Information Security Applications","author":"E Oswald","year":"2006","unstructured":"Oswald, E., Schramm, K.: An efficient masking scheme for AES software implementations. In: Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, vol. 3786, pp. 292\u2013305. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11604938_23"},{"key":"7_CR16","first-page":"230","volume":"4","author":"F Regazzoni","year":"2009","unstructured":"Regazzoni, F., Eisenbarth, T., Poschmann, A., Gro\u00dfsch\u00e4dl, J., G\u00fcrkaynak, F.K., Macchetti, M., Deniz, Z.T., Pozzi, L., Paar, C., Leblebici, Y., Ienne, P.: Evaluating resistance of MCML technology to power analysis attacks using a simulation-based methodology. Trans. Comput. Sci. 4, 230\u2013243 (2009)","journal-title":"Trans. Comput. Sci."},{"key":"7_CR17","first-page":"56","volume":"2011","author":"F Regazzoni","year":"2011","unstructured":"Regazzoni, F., Wang, Y., Standaert, F.X.: FPGA implementations of the AES masked against power analysis attacks. Proc. COSADE 2011, 56\u201366 (2011)","journal-title":"Proc. COSADE"},{"key":"7_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-3-319-21476-4_7","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"P Sasdrich","year":"2015","unstructured":"Sasdrich, P., Mischke, O., Moradi, A., G\u00fcneysu, T.: Side-channel protection by randomizing look-up tables on reconfigurable hardware. In: Mangard, S., Poschmann, A.Y. (eds.) COSADE 2014. LNCS, vol. 9064, pp. 95\u2013107. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-21476-4_7"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Sasdrich, P., Moradi, A., Mischke, O., G\u00fcneysu, T.: Achieving side-channel protection with dynamic logic reconfiguration on modern FPGAs. In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5\u20137 May 2015, pp. 130\u2013136 (2015)","DOI":"10.1109\/HST.2015.7140251"},{"key":"7_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/11894063_21","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"D Suzuki","year":"2006","unstructured":"Suzuki, D., Saeki, M.: Security evaluation of DPA countermeasures using dual-rail pre-charge logic style. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 255\u2013269. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11894063_21"},{"key":"7_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-540-45238-6_11","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"K Tiri","year":"2003","unstructured":"Tiri, K., Verbauwhede, I.: Securing encryption algorithms against DPA at the logic level: next generation smart card technology. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 125\u2013136. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45238-6_11"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Tiri, K., Verbauwhede, I.: A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation. In: 2004 Design, Automation and Test in Europe Conference and Exposition (DATE 2004), Paris, France, 16\u201320 February 2004, pp. 246\u2013251 (2004)","DOI":"10.1109\/DATE.2004.1268856"},{"key":"7_CR23","first-page":"124","volume":"2015","author":"A Wild","year":"2015","unstructured":"Wild, A., Moradi, A., G\u00fcneysu, T.: Glifred: glitch-free duplication - towards power-equalized circuits on FPGAs. IACR Cryptology ePrint Archive 2015, 124 (2015)","journal-title":"IACR Cryptology ePrint Archive"},{"key":"7_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-319-08302-5_4","volume-title":"Smart Card Research and Advanced Applications","author":"X Ye","year":"2014","unstructured":"Ye, X., Eisenbarth, T.: On the vulnerability of low entropy masking schemes. In: Francillon, A., Rohatgi, P. (eds.) CARDIS 2013. LNCS, vol. 8419, pp. 44\u201360. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-08302-5_4"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Yu, P., Schaumont, P.: Secure FPGA circuits using controlled placement and routing. In: Proceedings of the 5th International Conference on Hardware\/Software Codesign and System Synthesis, CODES + ISSS 2007, Salzburg, Austria, 30 September\u20133 October 2007, pp. 45\u201350 (2007)","DOI":"10.1145\/1289816.1289831"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 AFRICACRYPT 2018"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-89339-6_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,14]],"date-time":"2019-10-14T04:07:18Z","timestamp":1571026038000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-89339-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319893389","9783319893396"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-89339-6_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}