{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:39:47Z","timestamp":1729658387908,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/iscas.2015.7169071","type":"proceedings-article","created":{"date-parts":[[2015,7,30]],"date-time":"2015-07-30T21:31:36Z","timestamp":1438291896000},"page":"2013-2016","source":"Crossref","is-referenced-by-count":10,"title":["Improving DPA resistance of S-boxes: How far can we go?"],"prefix":"10.1109","author":[{"given":"Baris","family":"Ege","sequence":"first","affiliation":[]},{"given":"Kostas","family":"Papagiannopoulos","sequence":"additional","affiliation":[]},{"given":"Lejla","family":"Batina","sequence":"additional","affiliation":[]},{"given":"Stjepan","family":"Picek","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1","article-title":"Constrained Search for a Class of Good Bijective S-Boxes with Improved DPA Resistivity","volume":"pp","author":"mazumdar","year":"2013","journal-title":"Information Forensics and Security IEEE Transactions on"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2013.6581571"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2556315.2556319"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2014.6855573"},{"key":"ref14","article-title":"Redefining the Transparency Order","author":"chakraborty","year":"2014","journal-title":"Cryptology ePrint Archive Report"},{"key":"ref15","first-page":"233","article-title":"A Statistical Model for DPA with Novel Algorithmic Confusion Analysis","author":"fei","year":"2012","journal-title":"Proceedings of the 14th International Workshop on Cryptographic Hardware and Embedded Systems CHES '12 ser LNCS"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13039-2_22"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73074-3_13"},{"journal-title":"ISO\/IEC 29192-2 2012","article-title":"Information technology - Security techniques - Lightweight cryptography - Part 2: Block ciphers","year":"2012","key":"ref18"},{"key":"ref19","first-page":"443","article-title":"A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks","author":"standaert","year":"2009","journal-title":"Proceedings of the 28th Annual International Conference on Advances in Cryptology The Theory and Applications of Cryptographic Techniques EUROCRYPT '09 ser LNCS"},{"key":"ref4","first-page":"450","article-title":"PRESENT: An Ultra-Lightweight Block Cipher","author":"bogdanov","year":"2007","journal-title":"CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems"},{"article-title":"Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)","year":"2007","author":"mangard","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47555-9_7"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1007\/978-3-642-34961-4_14","article-title":"PRINCE: A Low-Latency Block Cipher for Pervasive Computing Applications","volume":"7658","author":"borghoff","year":"2012","journal-title":"Advances in Cryptology ASIACRYPT 2012"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-8147-2_9"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-38424-3_1"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","article-title":"Differential Power Analysis","author":"kocher","year":"1999","journal-title":"Advances in Cryptology - CRYPTO'99 ser LNCS"},{"key":"ref1","first-page":"152","article-title":"A Statistics-based Fundamental Model for Side-channel Attack Analysis","volume":"2014","author":"fei","year":"2014","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10175-0_2"}],"event":{"name":"2015 IEEE International Symposium on Circuits and Systems (ISCAS)","start":{"date-parts":[[2015,5,24]]},"location":"Lisbon, Portugal","end":{"date-parts":[[2015,5,27]]}},"container-title":["2015 IEEE International Symposium on Circuits and Systems (ISCAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7152138\/7168553\/07169071.pdf?arnumber=7169071","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:48:14Z","timestamp":1602690494000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7169071"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/iscas.2015.7169071","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}