{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T11:01:00Z","timestamp":1766055660773,"version":"3.48.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T00:00:00Z","timestamp":1764115200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T00:00:00Z","timestamp":1764115200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,26]]},"DOI":"10.1109\/dcis67520.2025.11281929","type":"proceedings-article","created":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T18:44:08Z","timestamp":1765478648000},"page":"43-48","source":"Crossref","is-referenced-by-count":0,"title":["Low Entropy Masking Protection Scheme for Ascon Cipher to Counteract Side-Channel Attacks"],"prefix":"10.1109","author":[{"given":"E.","family":"Tena-S\u00e1nchez","sequence":"first","affiliation":[{"name":"Instituto de Microelectr&#x00F3;nica de Sevilla IMSE-CNM (CSIC \/ University of Seville)"}]},{"given":"F. E.","family":"Potestad-Ord\u00f3\u00f1ez","sequence":"additional","affiliation":[{"name":"Instituto de Microelectr&#x00F3;nica de Sevilla IMSE-CNM (CSIC \/ University of Seville)"}]},{"given":"M.","family":"Mart\u00edn-Gonz\u00e1lez","sequence":"additional","affiliation":[{"name":"Instituto de Microelectr&#x00F3;nica de Sevilla IMSE-CNM (CSIC \/ University of Seville)"}]},{"given":"A.","family":"Casado-Gal\u00e1n","sequence":"additional","affiliation":[{"name":"Instituto de Microelectr&#x00F3;nica de Sevilla IMSE-CNM (CSIC \/ University of Seville)"}]},{"given":"A. J.","family":"Acosta","sequence":"additional","affiliation":[{"name":"Instituto de Microelectr&#x00F3;nica de Sevilla IMSE-CNM (CSIC \/ University of Seville)"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2019.8666557"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM50824.2020.9269083"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07134-3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"key":"ref5","volume-title":"Power analysis attacks: Revealing the secrets of smart cards","volume":"31","author":"Mangard","year":"2008"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_9"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2012.2227486"},{"volume-title":"ASCON V1.2, Submission to NIST","year":"2021","author":"Dobraunig","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/DCIS62603.2024.10769155"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1049\/ell2.70260"},{"volume-title":"Side-Channel Analysis of Keccak and Ascon","year":"2016","author":"Samwel","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2016.10.006"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3075564.3079067"},{"key":"ref14","article-title":"Side-Channel Evaluation Report on Implementations of Several NIST LWC Finalists","volume-title":"Sidechannel evaluation report on implementations of several NIST LWC finalists","author":"Batina","year":"2022"},{"key":"ref15","article-title":"Lightweight but Not Easy: Side-channel Analysis of the Ascon Authenticated Cipher on a 32-bit Microcontroller","author":"Weissbart","year":"2023","journal-title":"Cryptology ePrint Archive"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-29497-6_6"},{"key":"ref17","article-title":"SCARL: Side-Channel Analysis with Reinforcement Learning on the Ascon Authenticated Cipher","volume":"abs\/2006.03995","author":"Ramezanpour","year":"2020","journal-title":"CoRR"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2023.i4.344-366"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-61486-6_9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/fpt.2018.00066"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography2030026"},{"key":"ref22","article-title":"Hardware Implementation of ASCON","volume-title":"NIST Lightweight Cryptography Workshop 2023","author":"Kandi","year":"2023"}],"event":{"name":"2025 40th Conference on Design of Circuits and Integrated Systems (DCIS)","start":{"date-parts":[[2025,11,26]]},"location":"Santander, Spain","end":{"date-parts":[[2025,11,28]]}},"container-title":["2025 40th Conference on Design of Circuits and Integrated Systems (DCIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11281883\/11281806\/11281929.pdf?arnumber=11281929","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T10:57:28Z","timestamp":1766055448000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11281929\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,26]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/dcis67520.2025.11281929","relation":{},"subject":[],"published":{"date-parts":[[2025,11,26]]}}}