{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T09:26:14Z","timestamp":1758273974954,"version":"3.37.3"},"reference-count":28,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61372062"],"award-info":[{"award-number":["61372062"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1109\/tifs.2018.2868237","type":"journal-article","created":{"date-parts":[[2018,8,31]],"date-time":"2018-08-31T18:33:15Z","timestamp":1535740395000},"page":"939-953","source":"Crossref","is-referenced-by-count":5,"title":["Group collision attack"],"prefix":"10.1109","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9679-6223","authenticated-orcid":false,"given":"Changhai","family":"Ou","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2193-0015","authenticated-orcid":false,"given":"Zhu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Degang","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Xinping","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"240","article-title":"From improved leakage detection to the detection of points of interests in leakage traces","author":"durvaux","year":"2016","journal-title":"Proc 30th Annu Int Conf Theory Appl Cryptograph Techn"},{"key":"ref11","first-page":"426","article-title":"Mutual information analysis: A generic side-channel distinguisher","author":"gierlichs","year":"2008","journal-title":"Proc 9th Int Workshop Cryptograph Hardw Embed Syst (CHES)"},{"key":"ref12","first-page":"388","article-title":"Differential power analysis","author":"kocher","year":"1999","journal-title":"Proc 19th Annu Int Cryptol Conf Adv Cryptol (CRYPTO)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2010.0096"},{"key":"ref14","first-page":"313","article-title":"Counting keys in parallel after a side channel attack","author":"martin","year":"2015","journal-title":"Proc 8th Int Conf Theory Appl Cryptol Inf Secur (ASIACRYPT)"},{"key":"ref15","first-page":"428","article-title":"Statistical tools flavor side-channel collision attacks","author":"moradi","year":"2012","journal-title":"Proc 31st Annu Int Conf Theory Appl Cryptol Tech"},{"key":"ref16","first-page":"324","article-title":"Detecting hidden leakages","author":"moradi","year":"2014","journal-title":"Proc 6th Int Conf Appl Cryptogr Netw Secur (ACNS)"},{"key":"ref17","first-page":"125","article-title":"Correlation-enhanced power analysis collision attack","author":"moradi","year":"2010","journal-title":"Proc 9th Int Workshop Cryptograph Hardw Embed Syst (CHES)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2012.6176671"},{"key":"ref19","first-page":"145","article-title":"Group verification based multiple-differential collision attack","author":"ou","year":"2016","journal-title":"Proc 18th Int Conf Inf Commun Secur (ICICS)"},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-97916-8_4","article-title":"Entropy reduction for the correlation-enhanced power analysis collision attack","author":"wiemers","year":"2018"},{"key":"ref4","first-page":"251","article-title":"Algebraic methods in side-channel collision attacks and practical collision detection","author":"bogdanov","year":"2008","journal-title":"Proc 9th Int Conf Cryptol Prog Cryptol"},{"key":"ref27","first-page":"232","article-title":"Fault-tolerant linear collision attack: A combination with correlation power analysis","author":"wang","year":"2014","journal-title":"Proc 10th Int Conf Inf Secur Pract Exper (ISPEC)"},{"key":"ref3","first-page":"310","article-title":"Fast and memory-efficient key recovery in side-channel attacks","author":"bogdanov","year":"2015","journal-title":"Proc 22nd Int Conf Sel Areas Cryptogr (SAC)"},{"key":"ref6","first-page":"13","article-title":"Template attacks","author":"chari","year":"2002","journal-title":"Proc 9th Int Workshop Cryptograph Hardw Embed Syst (CHES)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"ref8","first-page":"311","article-title":"A bounded-space near-optimal key enumeration algorithm for multi-subkey side-channel attacks","author":"david","year":"2017","journal-title":"Proc Cryptograph Track RSA Conf Topics Cryptol (CT-RSA)"},{"key":"ref7","first-page":"367","article-title":"Back to Massey: Impressively fast, scalable and tight security evaluation tools","author":"choudary","year":"2017","journal-title":"Proc 8th Int Conf Cryptogr Hardw Embedded Syst (CHES)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.140"},{"key":"ref9","first-page":"401","article-title":"Making masking security proofs concrete&#x2014;Or how to evaluate the security of any leaking device","author":"duc","year":"2015","journal-title":"Proc 14th Annu Int Conf Theory Appl Cryptogr Technol"},{"journal-title":"DPA Contest","year":"2013","key":"ref1"},{"key":"ref20","first-page":"241","article-title":"Improving DPA by peak distribution analysis","author":"pan","year":"2010","journal-title":"Proc 17th Int Workshop Sel Areas Cryptogr (SAC)"},{"key":"ref22","first-page":"440","article-title":"Practical template attacks","author":"rechberger","year":"2004","journal-title":"Proc Int Workshop Info Sec Appl (WISA)"},{"key":"ref21","first-page":"61","article-title":"Simple key enumeration (and rank estimation) using histograms: An integrated approach","author":"poussier","year":"2016","journal-title":"Proc 8th Int Conf Cryptogr Hardw Embedded Syst (CHES)"},{"key":"ref24","first-page":"443","article-title":"A unified framework for the analysis of side-channel key recovery attacks","author":"standaert","year":"2009","journal-title":"Proc 26th Annu Int Conf Theory Appl Cryptograph Techn"},{"key":"ref23","first-page":"163","article-title":"A collision-attack on AES: Combining side channel- and differential-attack","author":"schramm","year":"2004","journal-title":"Proc 9th Int Workshop Cryptograph Hardw Embed Syst (CHES)"},{"key":"ref26","first-page":"126","article-title":"Security evaluations beyond computing power","author":"veyrat-charvillon","year":"2013","journal-title":"Proc 32nd Annu Int Conf Theory Appl Cryptograph Techn"},{"key":"ref25","first-page":"390","article-title":"An optimal key enumeration algorithm and its application to side-channel attacks","author":"veyrat-charvillon","year":"2012","journal-title":"Proc 19th Int Conf Sel Areas Cryptogr (SAC)"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/8517164\/08453014.pdf?arnumber=8453014","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T21:09:48Z","timestamp":1657746588000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8453014\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":28,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2018.2868237","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2019,4]]}}}