{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T15:37:35Z","timestamp":1777390655162,"version":"3.51.4"},"reference-count":44,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T00:00:00Z","timestamp":1731456000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T00:00:00Z","timestamp":1731456000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,11,13]]},"DOI":"10.1109\/dcis62603.2024.10769155","type":"proceedings-article","created":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T18:54:06Z","timestamp":1733252046000},"page":"1-6","source":"Crossref","is-referenced-by-count":9,"title":["Hardware implementations, SCA\/FIA attacks, and countermeasures for the ASCON AEAD cipher: a review"],"prefix":"10.1109","author":[{"given":"Miguel","family":"Mart\u00edn-Gonz\u00e1lez","sequence":"first","affiliation":[{"name":"University of Seville,Physics Faculty,Department of Electronics and Electromagnetism,Seville,Spain"}]},{"given":"Erica","family":"Tena-Sanchez","sequence":"additional","affiliation":[{"name":"Instituto de Microelectr&#x00F3;nica de Sevilla IMSE-CNM (CSIC \/ University of Seville)"}]},{"given":"F. Eugenio Potestad","family":"Ord\u00f3\u00f1ez","sequence":"additional","affiliation":[{"name":"Instituto de Microelectr&#x00F3;nica de Sevilla IMSE-CNM (CSIC \/ University of Seville)"}]},{"given":"Antonio J.","family":"Acosta","sequence":"additional","affiliation":[{"name":"Instituto de Microelectr&#x00F3;nica de Sevilla IMSE-CNM (CSIC \/ University of Seville)"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Lightweight Cryptography Standardization Process: NIST Selects Ascon","year":"2024"},{"key":"ref2","volume-title":"Final Portfolio","year":"2024"},{"key":"ref3","first-page":"27","article-title":"Introduction to Side-Channel Attacks","author":"Standaert","year":"2009","journal-title":"Secure Integrated Circuits and Systems"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3047976"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-021-09398-9"},{"key":"ref6","article-title":"AsCON publications","author":"Schl\u00e4ffer","year":"2024","journal-title":"AsCON Lightweight Authenticated Encryption & Hashing, website."},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2016.10.006"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2015.14"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2018.00066"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2018.8383904"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3052184"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/iSES50453.2020.00067"},{"key":"ref13","first-page":"1","article-title":"Evaluating the Performance of Ascon Lightweight Authenticated Encryption for AI-Enabled IoT Devices","author":"Khan","year":"2022","journal-title":"TRONSHOW"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SOCC56010.2022.9908100"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICECS202256217.2022.9971037"},{"key":"ref16","first-page":"2023","article-title":"Hardware Implementation of ASCON","volume-title":"NIST Lightweight Cryptography Workshop","author":"Kandi"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2019.8741029"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-16350-1_5"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.microrel.2021.114155"},{"key":"ref20","volume-title":"Side-Channel Analysis of Keccak and Ascon","author":"Samwel","year":"2016"},{"key":"ref21","volume-title":"Energy Efficient Hardware Implementations of CAESAR Submissions","author":"Fivez","year":"2016"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/RECONFIG.2017.8279790"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ReConFig48160.2019.8994788"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2021.3136463"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/iSES54909.2022.00048"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3075564.3079067"},{"key":"ref27","volume-title":"Side-Channel Evaluation Report on Implementations of Several NIST LWC Finalists","author":"Batina","year":"2022"},{"key":"ref28","first-page":"2023\/1598","article-title":"Lightweight but Not Easy: Side-channel Analysis of the Ascon Authenticated Cipher on a 32-bit Microcontroller","author":"Weissbart","year":"2023","journal-title":"Cryptology ePrint Archive"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-29497-6_6"},{"key":"ref30","first-page":"389","article-title":"An Efficient Soft Analytical Side-Channel Attack on Ascon","author":"Lou","year":"2022","journal-title":"WASA"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2023.i4.344-366"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-61486-6_9"},{"key":"ref33","article-title":"SCARL: Side-Channel Analysis with Reinforcement Learning on the Ascon Authenticated Cipher","volume":"abs\/2006.03995","author":"Ramezanpour","year":"2020","journal-title":"CoRR"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2952262"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-55304-3_27"},{"key":"ref36","first-page":"2020\/1542","article-title":"Feeding Three Birds With One Scone: A Generic Duplication Based Countermeasure To Fault Attacks (Extended Version)","author":"Baksi","year":"2020","journal-title":"Cryptology ePrint Archive"},{"key":"ref37","first-page":"2019\/536","article-title":"Protecting against Statistical Ineffective Fault Attacks","author":"Daemen","year":"2019","journal-title":"Cryptology ePrint Archive"},{"key":"ref38","first-page":"18","article-title":"Prevention of Fault Attacks in ASCON Authenticated Cipher Using Cellular Automata","author":"Jacob","year":"2020","journal-title":"ACRI"},{"key":"ref39","first-page":"2022\/041","article-title":"Reinforcing Lightweight Authenticated Encryption Schemes against Statistical Ineffective Fault Attack","author":"Ambili","year":"2022","journal-title":"Cryptology ePrint Archive"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2996366.2996426"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_6"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i2.1-21"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2022.i4.693-717"},{"key":"ref44","first-page":"2023\/1914","article-title":"Efficient Low-Latency Masking of Ascon without Fresh Randomness","author":"Prasad","year":"2023","journal-title":"Cryptology ePrint Archive"}],"event":{"name":"2024 39th Conference on Design of Circuits and Integrated Systems (DCIS)","location":"Catania, Italy","start":{"date-parts":[[2024,11,13]]},"end":{"date-parts":[[2024,11,15]]}},"container-title":["2024 39th Conference on Design of Circuits and Integrated Systems (DCIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10769040\/10769041\/10769155.pdf?arnumber=10769155","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T19:56:15Z","timestamp":1736538975000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10769155\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,13]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/dcis62603.2024.10769155","relation":{},"subject":[],"published":{"date-parts":[[2024,11,13]]}}}