{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,24]],"date-time":"2025-02-24T05:16:21Z","timestamp":1740374181568,"version":"3.37.3"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/hst.2010.5513124","type":"proceedings-article","created":{"date-parts":[[2010,7,23]],"date-time":"2010-07-23T13:51:20Z","timestamp":1279893080000},"page":"1-6","source":"Crossref","is-referenced-by-count":8,"title":["Entropy-based power attack"],"prefix":"10.1109","author":[{"given":"Houssem","family":"Maghrebi","sequence":"first","affiliation":[]},{"given":"Sylvain","family":"Guilley","sequence":"additional","affiliation":[]},{"given":"Jean-Luc","family":"Danger","sequence":"additional","affiliation":[]},{"given":"Florent","family":"Flament","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"127","article-title":"Differential Power Analysis Model and some Results","author":"guilley","year":"2004","journal-title":"Proceedings of WCC\/CARDIS"},{"key":"ref11","first-page":"388","article-title":"Differential Power Analysis","volume":"1666","author":"kocher","year":"1999","journal-title":"Crypto"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1968.1054210"},{"key":"ref13","article-title":"Evaluation of Countermeasures Implementation Based on Boolean Masking to Thwart First and Second Order Side-Channel Attacks","author":"maghrebi","year":"2009","journal-title":"In SCS"},{"key":"ref14","first-page":"76","article-title":"Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations","volume":"4249","author":"mangard","year":"2006","journal-title":"CHES"},{"journal-title":"Digital Communications","year":"2000","author":"proakis","key":"ref15"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1007\/978-3-642-01957-9_31","article-title":"Theoretical and practical aspects of mutual information based side channel analysis","author":"prouff","year":"2009","journal-title":"Proceedings of the 7th International Conference on Applied Cryptography and Network Security ACNS '09"},{"year":"0","key":"ref17"},{"journal-title":"A Mathematical Theory of Communication","year":"1948","author":"shannon","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-3324-9"},{"key":"ref4","first-page":"13","article-title":"Template Attacks","volume":"2523","author":"chari","year":"2002","journal-title":"CHES"},{"key":"ref3","article-title":"Towards Sound Approaches to Counteract Power-Analysis Attacks","volume":"1666","author":"chari","year":"1999","journal-title":"Crypto"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.33.1134"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.2517-6161.1977.tb01600.x","article-title":"Maximum-likelihood from incomplete data via the EM algorithm","volume":"39","author":"dempster","year":"1977","journal-title":"Journal of Royal Statistical Society B"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1007\/978-3-540-85053-3_27","article-title":"Mutual Information Analysis - A Generic Side-Channel Distinguisher","volume":"5154","author":"gierlichs","year":"2008","journal-title":"Cryptographic Hardware and Embedded Systems - CHES 2008"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11925-5_16"},{"key":"ref2","first-page":"16","article-title":"Correlation Power Analysis with a Leakage Model","volume":"3156","author":"brier","year":"2004","journal-title":"CHES"},{"key":"ref9","first-page":"158","article-title":"DES and differential power analysis (The &#x201C;Duplication&#x201D; Method)","volume":"1717","author":"goubin","year":"1999","journal-title":"CHES"},{"key":"ref1","first-page":"309","article-title":"An Implementation of DES and AES Secure against Some Attacks","volume":"2162","author":"akkar","year":"2001","journal-title":"Proceedings of CHES'01"},{"key":"ref20","first-page":"253","article-title":"Partition vs. comparison side-channel distinguishers: An empirical evaluation of statistical tests for univariate side-channel attacks against two unprotected cmos devices","author":"standaert","year":"2008","journal-title":"ICISC"},{"key":"ref22","first-page":"429","article-title":"Mutual information analysis: How, when and why?","volume":"5747 2009","author":"veyrat-charvillon","year":"2009","journal-title":"CHES 2009"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2006.311315"},{"key":"ref23","article-title":"Data-based choice of histogram bin width","author":"wand","year":"0","journal-title":"Statistics working paper"}],"event":{"name":"2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","start":{"date-parts":[[2010,6,13]]},"location":"Anaheim, CA, USA","end":{"date-parts":[[2010,6,14]]}},"container-title":["2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5507538\/5513098\/05513124.pdf?arnumber=5513124","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,23]],"date-time":"2025-02-23T08:40:55Z","timestamp":1740300055000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5513124\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/hst.2010.5513124","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}