{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:23:12Z","timestamp":1750306992028,"version":"3.41.0"},"reference-count":36,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2013,6,1]],"date-time":"2013-06-01T00:00:00Z","timestamp":1370044800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Tactical SIGINT Technology program office"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst. Secur."],"published-print":{"date-parts":[[2013,6]]},"abstract":"<jats:p>We propose a generalized framework to evaluate the side-channel information leakage of symmetric block ciphers. The leakage mapping methodology enables the systematic and efficient identification and mitigation of problematic information leakages by exhaustively considering relevant leakage models. The evaluation procedure bounds the anticipated resistance of an implementation to the general class of univariate differential side-channel analysis techniques. Typical applications are demonstrated using the well-known Hamming weight and Hamming distance leakage models, with recommendations for the incorporation of more accurate models. The evaluation results are empirically validated against correlation-based differential side-channel analysis attacks on two typical unprotected implementations of the Advanced Encryption Standard.<\/jats:p>","DOI":"10.1145\/2487222.2487224","type":"journal-article","created":{"date-parts":[[2013,6,18]],"date-time":"2013-06-18T12:36:08Z","timestamp":1371558968000},"page":"1-29","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Leakage Mapping"],"prefix":"10.1145","volume":"16","author":[{"given":"William E.","family":"Cobb","sequence":"first","affiliation":[{"name":"Air Force Institute of Technology"}]},{"given":"Rusty O.","family":"Baldwin","sequence":"additional","affiliation":[{"name":"Air Force Institute of Technology"}]},{"given":"Eric D.","family":"Laspe","sequence":"additional","affiliation":[{"name":"Air Force Institute of Technology"}]}],"member":"320","published-online":{"date-parts":[[2013,6]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/648255.752713"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/11545262_2"},{"key":"e_1_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Akkar M.-L. Bevan R. Dischamp P. and \n      Moyart D\n  . \n  2000\n  . Power analysis what is now possible... In Proceedings of the International Conference on Theory and Application of Cryptology and Information Security (ASIACRYPT). T. Okamoto Ed. Lecture Notes in Computer Science vol. \n  1976 Springer 489--502.   Akkar M.-L. Bevan R. Dischamp P. and Moyart D. 2000. Power analysis what is now possible... In Proceedings of the International Conference on Theory and Application of Cryptology and Information Security (ASIACRYPT) . T. Okamoto Ed. Lecture Notes in Computer Science vol. 1976 Springer 489--502.","DOI":"10.1007\/3-540-44448-3_38"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_1"},{"key":"e_1_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Biham E.\n     and \n      Shamir A\n  . \n  1997\n  . Differential fault analysis of secret key cryptosystems. In Proceedings of the Annual International Cryptology Conference (CRYPTO\u201997). B. S. Kaliski Jr. Ed. Lecture Notes in Computer Science vol. \n  1294 Springer 513--525.   Biham E. and Shamir A. 1997. Differential fault analysis of secret key cryptosystems. In Proceedings of the Annual International Cryptology Conference (CRYPTO\u201997) . B. S. Kaliski Jr. Ed. Lecture Notes in Computer Science vol. 1294 Springer 513--525.","DOI":"10.1007\/BFb0052259"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/648255.752740"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2160170"},{"key":"e_1_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Daemen J. and Rijmen V. 2001. The Design of Rijndael. Springer.   Daemen J. and Rijmen V. 2001. The Design of Rijndael . Springer.","DOI":"10.1007\/978-3-662-04722-4"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85053-3_27"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27954-6_15"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02384-2_25"},{"key":"e_1_2_1_13_1","volume-title":"Proceedings of the Annual International Cryptology Conference (CRYPTO\u201999)","volume":"1666","author":"Kocher P. C.","unstructured":"Kocher , P. C. , Jaffe , J. , and Jun , B . 1999. Differential power analysis . In Proceedings of the Annual International Cryptology Conference (CRYPTO\u201999) . M. J. Wiener Ed., Lecture Notes in Computer Science , vol. 1666 , Springer, 388--397. Kocher, P. C., Jaffe, J., and Jun, B. 1999. Differential power analysis. In Proceedings of the Annual International Cryptology Conference (CRYPTO\u201999). M. J. Wiener Ed., Lecture Notes in Computer Science, vol. 1666, Springer, 388--397."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1894302.1894317"},{"key":"e_1_2_1_15_1","unstructured":"Mangard S. Oswald E. and Popp T. 2007. Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer.   Mangard S. Oswald E. and Popp T. 2007. Power Analysis Attacks: Revealing the Secrets of Smart Cards . Springer."},{"key":"e_1_2_1_16_1","volume-title":"-X","author":"Mangard S.","year":"2009","unstructured":"Mangard , S. , Oswald , E. , and Standaert , F . -X . 2009 . One for all - all for one: Unifying standard DPA attacks. Cryptology ePrint Archive, Report 2009\/449. http:\/\/eprint.iacr.org\/ Mangard, S., Oswald, E., and Standaert, F.-X. 2009. One for all - all for one: Unifying standard DPA attacks. Cryptology ePrint Archive, Report 2009\/449. http:\/\/eprint.iacr.org\/"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27954-6_1"},{"key":"e_1_2_1_18_1","unstructured":"National Institute of Standards and Technology (NIST). 1999. FIPS PUB 46-3: Data encryption standard (DES). http:\/\/csrc.nist.gov\/publications\/fips\/fips46-3\/fips46-3.pdf  National Institute of Standards and Technology (NIST). 1999. FIPS PUB 46-3: Data encryption standard (DES). http:\/\/csrc.nist.gov\/publications\/fips\/fips46-3\/fips46-3.pdf"},{"key":"e_1_2_1_19_1","unstructured":"National Institute of Standards and Technology (NIST). 2001. FIPS PUB 197: Announcing the advanced encryption standard (AES). http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf  National Institute of Standards and Technology (NIST). 2001. FIPS PUB 197: Announcing the advanced encryption standard (AES). http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf"},{"key":"e_1_2_1_20_1","unstructured":"Paristech T. 2010. DPA contest v2. http:\/\/www.dpacontest.org\/v2\/  Paristech T. 2010. DPA contest v2. http:\/\/www.dpacontest.org\/v2\/"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2005.12.013"},{"key":"e_1_2_1_22_1","unstructured":"RCIS. 2011. SASEBO GII. http:\/\/www.rcis.aist.go.jp\/special\/SASEBO\/SASEBO-GII-en.html  RCIS. 2011. SASEBO GII. http:\/\/www.rcis.aist.go.jp\/special\/SASEBO\/SASEBO-GII-en.html"},{"key":"e_1_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Renauld M. Kamel D. Standaert F.-X. and \n      Flandre D\n  . \n  2011\n  . Information theoretic and security analysis of a 65-nanometer ddsll aes s-box. In Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems (CHES\u201911). B. Preneel and T. Takagi Eds. Lecture Notes in Computer Science vol. \n  6917 Springer 223--239.   Renauld M. Kamel D. Standaert F.-X. and Flandre D. 2011. Information theoretic and security analysis of a 65-nanometer ddsll aes s-box. In Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems (CHES\u201911). B. Preneel and T. Takagi Eds. Lecture Notes in Computer Science vol. 6917 Springer 223--239.","DOI":"10.1007\/978-3-642-23951-9_15"},{"volume-title":"Proceedings of the 30th Symposium on Information Theory in the Benelux.","author":"Renauld M.","key":"e_1_2_1_24_1","unstructured":"Renauld , M. and Standaert , F . -X. 2009. Combining algebraic and side-channel cryptanalysis against block ciphers . In Proceedings of the 30th Symposium on Information Theory in the Benelux. Renauld, M. and Standaert, F.-X. 2009. Combining algebraic and side-channel cryptanalysis against block ciphers. In Proceedings of the 30th Symposium on Information Theory in the Benelux."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_8"},{"key":"e_1_2_1_26_1","unstructured":"RISCURE. 2009. Inspector - The side channel test platform. http:\/\/www.riscure.com\/inspector\/product-description.html  RISCURE. 2009. Inspector - The side channel test platform. http:\/\/www.riscure.com\/inspector\/product-description.html"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.2307\/2685263"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/11545262_3"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_3"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_6"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_3"},{"key":"e_1_2_1_32_1","series-title":"Lecture Notes in Computer Science","volume-title":"-J","author":"Standaert F.-X.","year":"2006","unstructured":"Standaert , F.-X. , Mace , F. , Peeters , E. , and Quisquater , J . -J . 2006 . Updates on the security of FPGAs against power analysis attacks. In Proceedings of the International Workshop on Applied Reconfigurable Computing (ARC\u201906). K. Bertels, J. M. P. Cardoso, and S. Vassiliadis Eds., Lecture Notes in Computer Science , vol. 3985 , Springer , 335--346. Standaert, F.-X., Mace, F., Peeters, E., and Quisquater, J.-J. 2006. Updates on the security of FPGAs against power analysis attacks. In Proceedings of the International Workshop on Applied Reconfigurable Computing (ARC\u201906). K. Bertels, J. M. P. Cardoso, and S. Vassiliadis Eds., Lecture Notes in Computer Science, vol. 3985, Springer, 335--346."},{"key":"e_1_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Standaert F.-X. Gierlichs B. and \n      Verbauwhede I\n  . \n  2008\n  . Partition vs. comparison side-channel distinguishers: An empirical evaluation of statistical tests for univariate side-channel attacks against two unprotected cmos devices. In Proceedings of the International Conference on Information Security and Cryptology (ICISC\u201908). P. J. Lee and J. H. Cheon Eds. Lecture Notes in Computer Science vol. \n  5461 Springer 253--267.  Standaert F.-X. Gierlichs B. and Verbauwhede I. 2008. Partition vs. comparison side-channel distinguishers: An empirical evaluation of statistical tests for univariate side-channel attacks against two unprotected cmos devices. In Proceedings of the International Conference on Information Security and Cryptology (ICISC\u201908) . P. J. Lee and J. H. Cheon Eds. Lecture Notes in Computer Science vol. 5461 Springer 253--267.","DOI":"10.1007\/978-3-642-00730-9_16"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/3088723.3088767"},{"volume-title":"Proceedings of the Conference on Advances in Cryptology (CRYPTO\u201911)","author":"Veyrat-Charvillon N.","key":"e_1_2_1_35_1","unstructured":"Veyrat-Charvillon , N. and Standaert , F . 2011. Generic side-channel distinguishers: Improvements and limitations . In Proceedings of the Conference on Advances in Cryptology (CRYPTO\u201911) . 354--372. Veyrat-Charvillon, N. and Standaert, F. 2011. Generic side-channel distinguishers: Improvements and limitations. In Proceedings of the Conference on Advances in Cryptology (CRYPTO\u201911). 354--372."},{"key":"e_1_2_1_36_1","unstructured":"Xilinx. 2011. Virtex 5 family. http:\/\/www.xilinx.com\/products\/virtex5\/  Xilinx. 2011. Virtex 5 family. http:\/\/www.xilinx.com\/products\/virtex5\/"}],"container-title":["ACM Transactions on Information and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2487222.2487224","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2487222.2487224","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:48:38Z","timestamp":1750236518000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2487222.2487224"}},"subtitle":["A Systematic Methodology for Assessing the Side-Channel Information Leakage of Cryptographic Implementations"],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,6]]}},"alternative-id":["10.1145\/2487222.2487224"],"URL":"https:\/\/doi.org\/10.1145\/2487222.2487224","relation":{},"ISSN":["1094-9224","1557-7406"],"issn-type":[{"type":"print","value":"1094-9224"},{"type":"electronic","value":"1557-7406"}],"subject":[],"published":{"date-parts":[[2013,6]]},"assertion":[{"value":"2011-08-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2013-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2013-06-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}