{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T03:10:20Z","timestamp":1775099420447,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/icce-berlin.2017.8210596","type":"proceedings-article","created":{"date-parts":[[2017,12,18]],"date-time":"2017-12-18T22:59:51Z","timestamp":1513637991000},"page":"79-84","source":"Crossref","is-referenced-by-count":7,"title":["A robust scan-based side-channel attack method against HMAC-SHA-256 circuits"],"prefix":"10.1109","author":[{"given":"Daisuke","family":"Oku","sequence":"first","affiliation":[]},{"given":"Masao","family":"Yanagisawa","sequence":"additional","affiliation":[]},{"given":"Nozomu","family":"Togawa","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2005.862745"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E92.A.3229"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2505014"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2398423"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E93.A.2481"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjtsldm.4.47"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1007\/978-3-540-89754-5_18","article-title":"Scan based side channel attacks on stream ciphers and their counter-measures","volume":"5365","author":"agrawal","year":"2008","journal-title":"Lecture Notes in Computer Science"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1929943.1929952"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E97.A.1444"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-013-5369-9"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1007\/978-3-540-45238-6_6","article-title":"Cryptanal-ysis of block ciphers implemented on computers with cache","volume":"2779","author":"tsunoo","year":"2003","journal-title":"Lecture Notes in Computer Science"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","article-title":"On the importance of checking cryptographic protocols for faults","volume":"1233","author":"boneh","year":"1997","journal-title":"Lecture Notes in Computer Science"},{"key":"ref6","first-page":"230","article-title":"Dif-ferential power analysis of HMAC SHA-2 in the hamming weight model","author":"belaid","year":"2013","journal-title":"Security and Cryptography (SECRYPT) Proceedings of the 2010 International Conference"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/11780656_36"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1007\/978-3-540-77535-5_23","article-title":"Differential power analysis of HMAC based on SHA-2, and countermeasures","volume":"4867","author":"mcevoy","year":"2007","journal-title":"Lecture Notes in Computer Science"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/BFb0052259","article-title":"Differential fault analysis of secret key cryptosystems","volume":"1294","author":"biham","year":"1997","journal-title":"Lecture Notes in Computer Science"},{"key":"ref9","first-page":"339","article-title":"Scan based side channel attack on dedicated hardware implementations of Data Encryption Standard","author":"yang","year":"2004","journal-title":"Proc of International Test Conference"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","article-title":"Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems","volume":"1109","author":"kocher","year":"1996","journal-title":"Lecture Notes in Computer Science"},{"key":"ref20","article-title":"Modern Game Console Exploitation","author":"debusschere","year":"2012","journal-title":"Technical Report Department of Computer Science"},{"key":"ref22","year":"0","journal-title":"FIPS 198&#x2013;1 The Keyed-Hash Message Authentication Code"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2014.2304492"},{"key":"ref24","year":"0","journal-title":"FIPS 180&#x2013;1 Secure Hash Standard"},{"key":"ref23","year":"0","journal-title":"Descriptions of SHA-256 SHA-384 and SHA-512"},{"key":"ref26","article-title":"Request for Comments 4868: Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec","author":"kelly","year":"2007","journal-title":"IETF"},{"key":"ref25","article-title":"Request for Comments 5246: The Transport Layer Security (TLS) protocol version 1.2","author":"dierks","year":"2008","journal-title":"IETF"}],"event":{"name":"2017 IEEE 7th International Conference on Consumer Electronics - Berlin (ICCE-Berlin)","location":"Berlin","start":{"date-parts":[[2017,9,3]]},"end":{"date-parts":[[2017,9,6]]}},"container-title":["2017 IEEE 7th International Conference on Consumer Electronics - Berlin (ICCE-Berlin)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8169615\/8210564\/08210596.pdf?arnumber=8210596","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T21:10:00Z","timestamp":1643145000000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8210596\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/icce-berlin.2017.8210596","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}