{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T13:02:50Z","timestamp":1765976570368,"version":"3.41.2"},"reference-count":38,"publisher":"World Scientific Pub Co Pte Ltd","issue":"08","funder":[{"DOI":"10.13039\/501100001809","name":"national natural science foundation of china","doi-asserted-by":"publisher","award":["61471158"],"award-info":[{"award-number":["61471158"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Bifurcation Chaos"],"published-print":{"date-parts":[[2022,6,30]]},"abstract":"<jats:p> SCA is one of the biggest threats to the security of encryption chip. It can crack the unprotected encryption chip at lower cost and faster speed, which weakens the security of the SM4 encryption algorithm circuit without any protection. In this paper, the SM4 encryption algorithm is implemented on FPGA. The pseudo-random sequence generated by discrete chaotic system is used to randomly mask the intermediate value in the SM4 encryption process. This will disrupt the power consumption in the encryption process, thus preventing power analysis. Experimental results show that the proposed chaotic mask scheme can effectively prevent intermediate value leakage and protect the SM4 encryption system from power analysis attack. <\/jats:p>","DOI":"10.1142\/s0218127422501103","type":"journal-article","created":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T08:43:59Z","timestamp":1656578639000},"source":"Crossref","is-referenced-by-count":5,"title":["SM4 Chaotic Masking Scheme Against Power Analysis Based on FPGA"],"prefix":"10.1142","volume":"32","author":[{"given":"Zijing","family":"Jiang","sequence":"first","affiliation":[{"name":"Electronic Engineering College, Heilongjiang University, Harbin 150080, P. R. China"}]},{"given":"Wenhao","family":"Yan","sequence":"additional","affiliation":[{"name":"Electronic Engineering College, Heilongjiang University, Harbin 150080, P. R. China"}]},{"given":"Wei","family":"Ding","sequence":"additional","affiliation":[{"name":"Electronic Engineering College, Heilongjiang University, Harbin 150080, P. R. China"}]},{"given":"Linlin","family":"Yue","sequence":"additional","affiliation":[{"name":"Electronic Engineering College, Heilongjiang University, Harbin 150080, P. R. China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5520-6001","authenticated-orcid":false,"given":"Qun","family":"Ding","sequence":"additional","affiliation":[{"name":"Electronic Engineering College, Heilongjiang University, Harbin 150080, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2022,6,30]]},"reference":[{"key":"S0218127422501103BIB001","first-page":"29","volume":"2002","author":"Agrawal D.","year":"2002","journal-title":"Cryptograph. Hardw. Embed. Syst. CHES"},{"key":"S0218127422501103BIB002","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs:20080041"},{"key":"S0218127422501103BIB003","first-page":"39","volume":"30","author":"Bae D.","year":"2020","journal-title":"J. Korea Instit. Inform. Secur. Cryptol."},{"key":"S0218127422501103BIB004","doi-asserted-by":"publisher","DOI":"10.1007\/11689522_1"},{"key":"S0218127422501103BIB005","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2020.iS1.295-349"},{"key":"S0218127422501103BIB006","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052259"},{"key":"S0218127422501103BIB007","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.140"},{"key":"S0218127422501103BIB008","first-page":"16","volume":"2004","author":"Brier E.","year":"2004","journal-title":"Cryptograph. Hardw. Embed. Syst. CHES"},{"key":"S0218127422501103BIB009","first-page":"446","volume":"5037","author":"Canright D.","year":"2008","journal-title":"Appl. Cryptograph. Netw. Secur."},{"key":"S0218127422501103BIB010","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i2.132-161"},{"key":"S0218127422501103BIB011","first-page":"13","volume-title":"Int. Workshop on Cryptographic Hardware and Embedded Systems","author":"Chari S.","year":"2002"},{"key":"S0218127422501103BIB012","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i2.49-79"},{"key":"S0218127422501103BIB013","doi-asserted-by":"publisher","DOI":"10.1109\/VLSI-DAT.2019.8741835"},{"key":"S0218127422501103BIB014","first-page":"189","volume":"2002","author":"Elena T.","year":"2002","journal-title":"Cryptograph. Hardw. Embed. Syst. CHES"},{"key":"S0218127422501103BIB015","first-page":"413","volume-title":"Fast Software Encryption","author":"Elisabeth O.","year":"2005"},{"key":"S0218127422501103BIB016","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_2"},{"key":"S0218127422501103BIB017","first-page":"426","volume":"2008","author":"Gierlichs B.","year":"2008","journal-title":"Cryptograph. Hardw. Embed. Syst. CHES"},{"key":"S0218127422501103BIB018","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2018.2802867"},{"key":"S0218127422501103BIB019","first-page":"198","volume":"2002","author":"Jovan D. G.","year":"2002","journal-title":"Cryptograph. Hardw. Embed. Syst. CHES"},{"key":"S0218127422501103BIB020","doi-asserted-by":"publisher","DOI":"10.1109\/IDT.2008.4802469"},{"key":"S0218127422501103BIB021","doi-asserted-by":"publisher","DOI":"10.3390\/app9071438"},{"key":"S0218127422501103BIB022","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_9"},{"key":"S0218127422501103BIB023","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"key":"S0218127422501103BIB024","first-page":"388","author":"Kocher P.","year":"1999","journal-title":"Ann. Int. Cryptology Conf."},{"key":"S0218127422501103BIB025","first-page":"373","volume":"4859","author":"Kumar K.","year":"2007","journal-title":"Int. Conf. Cryptol. India 2007"},{"key":"S0218127422501103BIB026","first-page":"709","volume":"29","author":"Kwon H. P.","year":"2019","journal-title":"J. Korea Instit. Inform. Secur. Cryptol."},{"key":"S0218127422501103BIB027","first-page":"320","volume":"2010","author":"Li Y.","year":"2010","journal-title":"Cryptograph. Hardw. Embed. Syst. CHES"},{"key":"S0218127422501103BIB028","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIIS49377.2020.9194867"},{"volume-title":"2014 Tenth Int. Conf. Computational Intelligence and Security.","year":"2014","author":"Liang H.","key":"S0218127422501103BIB029"},{"key":"S0218127422501103BIB030","unstructured":"Lv, S. W.,  Li, D. &  Zhang, C.  [2012]  SM4 Block Cipher Algorithm  (China Standards Press),  pp. 5\u20138."},{"key":"S0218127422501103BIB031","first-page":"309","volume":"2001","author":"Mehdi L. A.","year":"2001","journal-title":"Cryptograph. Hardw. Embed Syst. CHES"},{"key":"S0218127422501103BIB032","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2287600"},{"key":"S0218127422501103BIB034","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2015.7122475"},{"key":"S0218127422501103BIB035","first-page":"1","volume":"2019","author":"Robyns P.","year":"2019","journal-title":"IACR Trans. Cryptograph. Hardw. Embed. Syst."},{"key":"S0218127422501103BIB036","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44709-1_16"},{"key":"S0218127422501103BIB037","first-page":"206","volume":"2003","author":"Schramm K.","year":"2003","journal-title":"Fast Software Encryption FSE"},{"key":"S0218127422501103BIB040","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2013.2268379"},{"key":"S0218127422501103BIB041","first-page":"1","volume-title":"2011 IEEE 54th Int. Midwest Symp. Circuits and Systems","author":"Yuan Z.","year":"2011"}],"container-title":["International Journal of Bifurcation and Chaos"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218127422501103","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T08:44:58Z","timestamp":1656578698000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0218127422501103"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,30]]},"references-count":38,"journal-issue":{"issue":"08","published-print":{"date-parts":[[2022,6,30]]}},"alternative-id":["10.1142\/S0218127422501103"],"URL":"https:\/\/doi.org\/10.1142\/s0218127422501103","relation":{},"ISSN":["0218-1274","1793-6551"],"issn-type":[{"type":"print","value":"0218-1274"},{"type":"electronic","value":"1793-6551"}],"subject":[],"published":{"date-parts":[[2022,6,30]]},"article-number":"2250110"}}