{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T16:28:44Z","timestamp":1730305724405,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,12]]},"DOI":"10.1109\/wifs.2009.5386455","type":"proceedings-article","created":{"date-parts":[[2010,1,22]],"date-time":"2010-01-22T16:14:24Z","timestamp":1264176864000},"page":"191-195","source":"Crossref","is-referenced-by-count":11,"title":["Practical DPA attacks on MDPL"],"prefix":"10.1109","author":[{"given":"Elke","family":"De Mulder","sequence":"first","affiliation":[]},{"given":"Benedikt","family":"Gierlichs","sequence":"additional","affiliation":[]},{"given":"Bart","family":"Preneel","sequence":"additional","affiliation":[]},{"given":"Ingrid","family":"Verbauwhede","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1007\/978-3-642-00862-7_14"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/TCAD.2005.855939"},{"key":"ref12","article-title":"Random Switching Logic: A Countermeasure against DPA based on Transition Probability. Cryptology ePrint Archive","author":"suzuki","year":"2004","journal-title":"Tech Rep IACR ePrint"},{"key":"ref13","first-page":"134","article-title":"Changing the Odds Against Masked Logic","volume":"4356","author":"tiri","year":"2006","journal-title":"SAC 2006"},{"key":"ref14","first-page":"1","article-title":"Towards Efficient Second-Order Power Analysis","volume":"3156","author":"waddle","year":"2004","journal-title":"CHES 2004"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/TC.2003.1190589"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1007\/3-540-45760-7_6"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/ISCAS.2006.1693232"},{"key":"ref18","article-title":"Statistics and Secret Leakage","volume":"1962","author":"coron","year":"2000","journal-title":"Financial Cryptography"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1023\/A:1020363323869"},{"key":"ref4","first-page":"413","article-title":"A Side-Channel Analysis Resistant Description of the AES S-box","volume":"3557","author":"oswald","year":"2005","journal-title":"FSE 2005"},{"key":"ref3","first-page":"309","article-title":"An Implementation of DES and AES, Secure against Some Attacks","volume":"2162","author":"akkar","year":"2001","journal-title":"CHES 2001"},{"key":"ref6","first-page":"172","article-title":"Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints","volume":"3659","author":"popp","year":"2005","journal-title":"CHES 2005"},{"key":"ref5","first-page":"252","article-title":"Differential Power Analysis in the Presence of Hardware Countermeasures","volume":"1965","author":"clavier","year":"2000","journal-title":"CHES 2000"},{"key":"ref8","first-page":"81","article-title":"Evalu-ation of the Masked Logic Style MDPL on a Prototype Chip","volume":"4727","author":"popp","year":"2007","journal-title":"CHES 2007"},{"key":"ref7","first-page":"255","article-title":"Security Evaluation of DPA Countermeasures Using Dual-Rail Pre-charge Logic Style","volume":"4249","author":"suzuki","year":"2006","journal-title":"CHES 2006"},{"key":"ref2","first-page":"16","article-title":"Correlation power analysis with a leakage model","volume":"3156","author":"brier","year":"2004","journal-title":"CHES 2004"},{"key":"ref1","first-page":"388","article-title":"Differential Power Analysis","volume":"1666","author":"kocher","year":"1999","journal-title":"CRYPTO'99"},{"key":"ref9","first-page":"95","article-title":"Masking and Dual-Rail Logic Don't Add Up","volume":"4727","author":"schaumont","year":"2007","journal-title":"CHES 2007"},{"key":"ref20","first-page":"222","article-title":"Hardware Countermeasures Against DPA - A Statistical Analysis of Their Effectiveness","volume":"2964","author":"mangard","year":"2004","journal-title":"CT-RSA 2004"}],"event":{"name":"2009 First IEEE International Workshop on Information Forensics and Security (WIFS)","start":{"date-parts":[[2009,12,6]]},"location":"London, United Kingdom","end":{"date-parts":[[2009,12,9]]}},"container-title":["2009 First IEEE International Workshop on Information Forensics and Security (WIFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5377995\/5386439\/05386455.pdf?arnumber=5386455","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T17:59:29Z","timestamp":1489859969000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5386455\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/wifs.2009.5386455","relation":{},"subject":[],"published":{"date-parts":[[2009,12]]}}}