{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T01:05:00Z","timestamp":1772240700536,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,6,23]],"date-time":"2013-06-23T00:00:00Z","timestamp":1371945600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,6,23]]},"DOI":"10.1145\/2487726.2487733","type":"proceedings-article","created":{"date-parts":[[2013,6,18]],"date-time":"2013-06-18T12:36:08Z","timestamp":1371558968000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Practical template-algebraic side channel attacks with extremely low data complexity"],"prefix":"10.1145","author":[{"given":"Yossef","family":"Oren","sequence":"first","affiliation":[{"name":"Tel-Aviv University, Ramat Aviv, Israel"}]},{"given":"Ofir","family":"Weisse","sequence":"additional","affiliation":[{"name":"Tel-Aviv University, Ramat Aviv, Israel"}]},{"given":"Avishai","family":"Wool","sequence":"additional","affiliation":[{"name":"Tel-Aviv University, Ramat Aviv, Israel"}]}],"member":"320","published-online":{"date-parts":[[2013,6,23]]},"reference":[{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2010.104"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02777-2_40"},{"key":"e_1_3_2_1_4_1","volume-title":"SAT 2009 competitive events booklet","author":"Berthold T.","year":"2009","unstructured":"T. Berthold , S. Heinz , M. E. Pfetsch , and M. Winkler . SCIP -- Solving Constraint Integer Programs . SAT 2009 competitive events booklet , 2009 . T. Berthold, S. Heinz, M. E. Pfetsch, and M. Winkler. SCIP -- Solving Constraint Integer Programs. SAT 2009 competitive events booklet, 2009."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1779274.1779288"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"e_1_3_2_1_7_1","series-title":"LNCS","first-page":"16","volume-title":"M. Joye and J.-J","author":"Brier E.","year":"2004","unstructured":"E. Brier , C. Clavier , and F. Olivier . Correlation power analysis with a leakage model . In M. Joye and J.-J . Quisquater, editors, CHES, volume 3156 of LNCS , pages 16 -- 29 . Springer , 2004 . E. Brier, C. Clavier, and F. Olivier. Correlation power analysis with a leakage model. In M. Joye and J.-J. Quisquater, editors, CHES, volume 3156 of LNCS, pages 16--29. Springer, 2004."},{"key":"e_1_3_2_1_8_1","series-title":"LNCS","first-page":"13","volume-title":"B. S. K. Jr., \u00c7etin Kaya Ko\u00e7, and C","author":"Chari S.","year":"2002","unstructured":"S. Chari , J. R. Rao , and P. Rohatgi . Template Attacks . In B. S. K. Jr., \u00c7etin Kaya Ko\u00e7, and C . Paar, editors, CHES, volume 2523 of LNCS , pages 13 -- 28 . Springer , 2002 . S. Chari, J. R. Rao, and P. Rohatgi. Template Attacks. In B. S. K. Jr., \u00c7etin Kaya Ko\u00e7, and C. Paar, editors, CHES, volume 2523 of LNCS, pages 13--28. Springer, 2002."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12678-9_15"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29912-4_18"},{"key":"e_1_3_2_1_11_1","unstructured":"IAIK IMPA Lab. IAIK IMPA Lab Infrastructure. Online.  IAIK IMPA Lab. IAIK IMPA Lab Infrastructure. Online."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.IR.6815","volume-title":"Information Technology Laboratory","author":"Information Technology Laboratory (National Institute of Standards and Technology).","year":"2001","unstructured":"Information Technology Laboratory (National Institute of Standards and Technology). Announcing the Advanced Encryption Standard (AES). Computer Security Division , Information Technology Laboratory , National Institute of Standards and Technology , Gaithersburg, MD , 2001 . Information Technology Laboratory (National Institute of Standards and Technology). Announcing the Advanced Encryption Standard (AES). Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, Gaithersburg, MD, 2001."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37682-5_27"},{"key":"e_1_3_2_1_14_1","volume-title":"Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances inInformation Security)","author":"Mangard S.","year":"2007","unstructured":"S. Mangard , E. Oswald , and T. Popp . Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances inInformation Security) . Springer-Verlag New York, Inc. , Secaucus, NJ, USA , 2007 . S. Mangard, E. Oswald, and T. Popp. Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances inInformation Security). Springer-Verlag New York, Inc., Secaucus, NJ, USA, 2007."},{"key":"e_1_3_2_1_15_1","first-page":"2009","author":"Manquinho V.","year":"2009","unstructured":"V. Manquinho and O. Roussel . Pseudo-Boolean Competition 2009 . Online, July 2009 . V. Manquinho and O. Roussel. Pseudo-Boolean Competition 2009. Online, July 2009.","journal-title":"Pseudo-Boolean Competition"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1006326723002"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2012.6224335"},{"key":"e_1_3_2_1_18_1","volume-title":"FIPS PUB 46-3: Data Encryption Standard (DES)","author":"National Institute of Standards and Technology.","year":"1999","unstructured":"National Institute of Standards and Technology. FIPS PUB 46-3: Data Encryption Standard (DES) . Oct. 1999 . National Institute of Standards and Technology. FIPS PUB 46-3: Data Encryption Standard (DES). Oct. 1999."},{"key":"e_1_3_2_1_19_1","series-title":"LNCS","first-page":"428","volume-title":"S. Mangard and F.-X","author":"Oren Y.","year":"2010","unstructured":"Y. Oren , M. Kirschbaum , T. Popp , and A. Wool . Algebraic Side-Channel Analysis in the Presence of Errors . In S. Mangard and F.-X . Standaert, editors, CHES, volume 6225 of LNCS , pages 428 -- 442 . Springer , 2010 . Y. Oren, M. Kirschbaum, T. Popp, and A. Wool. Algebraic Side-Channel Analysis in the Presence of Errors. In S. Mangard and F.-X. Standaert, editors, CHES, volume 6225 of LNCS, pages 428--442. Springer, 2010."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_9"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"D.\n      Oswald\n     and \n      C.\n      Paar\n  . \n  Breaking mifare desfire mf3icd40: Power analysis and templates in the real world\n  . In B. Preneel and T. Takagi editors CHES volume \n  6917\n   of \n  LNCS pages \n  207\n  --\n  222\n  . \n  Springer 2011\n  .   D. Oswald and C. Paar. Breaking mifare desfire mf3icd40: Power analysis and templates in the real world. In B. Preneel and T. Takagi editors CHES volume 6917 of LNCS pages 207--222. Springer 2011.","DOI":"10.1007\/978-3-642-23951-9_14"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31815-6_35"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"M.\n      Renauld\n     and \n      F.-X.\n      Standaert\n    .\n  Algebraic Side-Channel Attacks\n  . In F. Bao M. Yung D. Lin and J. Jing editors Inscrypt volume \n  6151\n   of \n  LNCS pages \n  393\n  --\n  410\n  . \n  Springer 2009\n  .   M. Renauld and F.-X. Standaert. Algebraic Side-Channel Attacks. In F. Bao M. Yung D. Lin and J. Jing editors Inscrypt volume 6151 of LNCS pages 393--410. Springer 2009.","DOI":"10.1007\/978-3-642-16342-5_29"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_8"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/11545262_3"},{"key":"e_1_3_2_1_26_1","series-title":"LNCS","first-page":"390","volume-title":"L. R. Knudsen and H. Wu","author":"Veyrat-Charvillon N.","year":"2012","unstructured":"N. Veyrat-Charvillon , B. G\u00e9rard , M. Renauld , and F.-X. Standaert . An optimal key enumeration algorithm and its application to side-channel attacks . In L. R. Knudsen and H. Wu , editors, Selected Areas in Cryptography, volume 7707 of LNCS , pages 390 -- 406 . Springer , 2012 . N. Veyrat-Charvillon, B. G\u00e9rard, M. Renauld, and F.-X. Standaert. An optimal key enumeration algorithm and its application to side-channel attacks. In L. R. Knudsen and H. Wu, editors, Selected Areas in Cryptography, volume 7707 of LNCS, pages 390--406. Springer, 2012."},{"key":"e_1_3_2_1_27_1","volume-title":"Technische Universit\u00e4t Berlin","author":"Wunderling R.","year":"1996","unstructured":"R. Wunderling . Paralleler und objektorientierter Simplex-Algorithmus. PhD thesis , Technische Universit\u00e4t Berlin , 1996 . R. Wunderling. Paralleler und objektorientierter Simplex-Algorithmus. PhD thesis, Technische Universit\u00e4t Berlin, 1996."},{"key":"e_1_3_2_1_28_1","volume-title":"2011 Conference on Cryptographic Algorithms and Cryptographic Chips (CASC2011)","author":"Zhao X.","year":"2011","unstructured":"X. Zhao , T. Wang , S. Guo , F. Zhang , Z. Shi , H. Liu , and K. Wu . SAT based Error Tolerant Algebraic Side-Channel Attacks . 2011 Conference on Cryptographic Algorithms and Cryptographic Chips (CASC2011) , July 2011 . X. Zhao, T. Wang, S. Guo, F. Zhang, Z. Shi, H. Liu, and K. Wu. SAT based Error Tolerant Algebraic Side-Channel Attacks. 2011 Conference on Cryptographic Algorithms and Cryptographic Chips (CASC2011), July 2011."}],"event":{"name":"HASP '13: The Second Workshop on Hardware and Architectural Support for Security and Privacy","location":"Tel-Aviv Israel","acronym":"HASP '13","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2487726.2487733","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2487726.2487733","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:39:29Z","timestamp":1750235969000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2487726.2487733"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,23]]},"references-count":27,"alternative-id":["10.1145\/2487726.2487733","10.1145\/2487726"],"URL":"https:\/\/doi.org\/10.1145\/2487726.2487733","relation":{},"subject":[],"published":{"date-parts":[[2013,6,23]]},"assertion":[{"value":"2013-06-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}