{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:20:33Z","timestamp":1750306833879,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,1,20]],"date-time":"2014-01-20T00:00:00Z","timestamp":1390176000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003958","name":"Technologiestichting STW","doi-asserted-by":"publisher","award":["12624 - SIDES"],"award-info":[{"award-number":["12624 - SIDES"]}],"id":[{"id":"10.13039\/501100003958","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000921","name":"European Cooperation in Science and Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000921","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003246","name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["ProFIL 628.001.007"],"award-info":[{"award-number":["ProFIL 628.001.007"]}],"id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,1,20]]},"DOI":"10.1145\/2556315.2556319","type":"proceedings-article","created":{"date-parts":[[2014,1,14]],"date-time":"2014-01-14T13:40:06Z","timestamp":1389706806000},"page":"13-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["On using genetic algorithms for intrinsic side-channel resistance"],"prefix":"10.1145","author":[{"given":"Stjepan","family":"Picek","sequence":"first","affiliation":[{"name":"Radboud University Nijmegen, The Netherlands"}]},{"given":"Bari\u015f","family":"Ege","sequence":"additional","affiliation":[{"name":"Radboud University Nijmegen, The Netherlands"}]},{"given":"Lejla","family":"Batina","sequence":"additional","affiliation":[{"name":"Radboud University Nijmegen, The Netherlands"}]},{"given":"Domagoj","family":"Jakobovic","sequence":"additional","affiliation":[{"name":"University of Zagreb, Croatia"}]},{"given":"\u0141ukasz","family":"Chmielewski","sequence":"additional","affiliation":[{"name":"Riscure BV, Delft, The Netherlands"}]},{"given":"Marin","family":"Golub","sequence":"additional","affiliation":[{"name":"University of Zagreb, Croatia"}]}],"member":"320","published-online":{"date-parts":[[2014,1,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1754948.1754958"},{"key":"e_1_3_2_1_2_1","volume-title":"A.: Differential Cryptanalysis of DES-like Cryptosystems. In: Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology. CRYPTO '90","author":"Biham E.","year":"1991","unstructured":"Biham , E. , Shamir , A.: Differential Cryptanalysis of DES-like Cryptosystems. In: Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology. CRYPTO '90 , London, UK, UK, Springer-Verlag ( 1991 ) 2--21 Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystems. In: Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology. CRYPTO '90, London, UK, UK, Springer-Verlag (1991) 2--21"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/11596219_5"},{"key":"e_1_3_2_1_4_1","volume-title":"Popp","author":"Mangard S.","year":"2007","unstructured":"Mangard , S. , Oswald , E. , Popp , T. : Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security). Springer-Verlag New York , Inc., Secaucus, NJ, US1A ( 2007 ) Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security). Springer-Verlag New York, Inc., Secaucus, NJ, US1A (2007)"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/11502760_29"},{"key":"e_1_3_2_1_7_1","series-title":"Lecture Notes in Computer Science","volume-title":"Jun","author":"Kocher P.","year":"1999","unstructured":"Kocher , P. , Jaffe , J. , Jun , B. : Differential Power Analysis. In Wiener, M., ed.: Advances in Cryptology : Proceedings of CRYPTO'99. Number 1666 in Lecture Notes in Computer Science , Springer-Verlag ( 1999 ) 388--397 Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In Wiener, M., ed.: Advances in Cryptology: Proceedings of CRYPTO'99. Number 1666 in Lecture Notes in Computer Science, Springer-Verlag (1999) 388--397"},{"key":"e_1_3_2_1_9_1","unstructured":"Bernstein D. J.: Cache-timing attacks on AES (2004)  Bernstein D. J.: Cache-timing attacks on AES (2004)"},{"key":"e_1_3_2_1_10_1","volume-title":"E.: Heuristic Design of Cryptographically Strong Balanced Boolean Functions. In: Advances in Cryptology - EUROCRYPT '98","author":"Millan W.","year":"1998","unstructured":"Millan , W. , Clark , A. , Dawson , E.: Heuristic Design of Cryptographically Strong Balanced Boolean Functions. In: Advances in Cryptology - EUROCRYPT '98 . ( 1998 ) 489--499 Millan, W., Clark, A., Dawson, E.: Heuristic Design of Cryptographically Strong Balanced Boolean Functions. In: Advances in Cryptology - EUROCRYPT '98. (1998) 489--499"},{"key":"e_1_3_2_1_11_1","first-page":"246","volume":"200","author":"Clark J. A.","unstructured":"Clark , J. A. , Jacob , J. L. , Stepney , S. , Maitra , S. , Millan , W. : Evolving Boolean Functions Satisfying Multiple Criteria. In: Progress in Cryptology - INDOCRYPT 200 2. (2002) 246 -- 259 Clark, J. A., Jacob, J. L., Stepney, S., Maitra, S., Millan, W.: Evolving Boolean Functions Satisfying Multiple Criteria. In: Progress in Cryptology - INDOCRYPT 2002. (2002) 246--259","journal-title":"INDOCRYPT"},{"volume-title":"Hardware-Oriented Security and Trust (HOST), 2013 IEEE International Symposium on. (2013)","author":"Mazumdar B.","key":"e_1_3_2_1_12_1","unstructured":"Mazumdar , B. , Mukhopadhyay , D. , Sengupta , I. : Design and implementation of rotation symmetric S-boxes with high nonlinearity and high DPA resilience . In: Hardware-Oriented Security and Trust (HOST), 2013 IEEE International Symposium on. (2013) 87--92 Mazumdar, B., Mukhopadhyay, D., Sengupta, I.: Design and implementation of rotation symmetric S-boxes with high nonlinearity and high DPA resilience. In: Hardware-Oriented Security and Trust (HOST), 2013 IEEE International Symposium on. (2013) 87--92"},{"key":"e_1_3_2_1_13_1","volume-title":"Sengupta","author":"Mazumdar B.","year":"2013","unstructured":"Mazumdar , B. , Mukhopadhay , D. , Sengupta , I. : Constrained Search for a Class of Good Bijective S-Boxes with Improved DPA Resistivity. Information Forensics and Security, IEEE Transactions on PP( 99) ( 2013 ) 1--1 Mazumdar, B., Mukhopadhay, D., Sengupta, I.: Constrained Search for a Class of Good Bijective S-Boxes with Improved DPA Resistivity. Information Forensics and Security, IEEE Transactions on PP(99) (2013) 1--1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/4235.585893"},{"key":"e_1_3_2_1_15_1","series-title":"Lecture Notes in Computer Science","volume-title":"RSA, DSS and other systems","author":"Kocher P.","year":"1996","unstructured":"Kocher , P. : Timing attacks on implementations of Diffie-Hellman , RSA, DSS and other systems . In Koblitz, N., ed.: Advances in Cryptology : Proceedings of CRYPTO'96. Number 1109 in Lecture Notes in Computer Science , Springer-Verlag ( 1996 ) 104--113 Kocher, P.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems. In Koblitz, N., ed.: Advances in Cryptology: Proceedings of CRYPTO'96. Number 1109 in Lecture Notes in Computer Science, Springer-Verlag (1996) 104--113"},{"key":"e_1_3_2_1_16_1","series-title":"Lecture Notes in Computer Science","volume-title":"Samyde","author":"Quisquater J. J.","year":"2001","unstructured":"Quisquater , J. J. , Samyde , D. : ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smard Cards. In Attali, I., Jensen, T. P., eds.: Smart Card Programming and Security (E-smart 2001 ). Volume 2140 of Lecture Notes in Computer Science ., Springer-Verlag ( 2001) 200--210 Quisquater, J. J., Samyde, D.: ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smard Cards. In Attali, I., Jensen, T. P., eds.: Smart Card Programming and Security (E-smart 2001). Volume 2140 of Lecture Notes in Computer Science., Springer-Verlag (2001) 200--210"},{"key":"e_1_3_2_1_17_1","volume-title":"Hammer","author":"Crama Y.","year":"2010","unstructured":"Crama , Y. , Hammer , P. L. : Boolean Models and Methods in Mathematics, Computer Science, and Engineering. 1 st edn. Cambridge University Press , New York, NY, USA ( 2010 ) Crama, Y., Hammer, P. L.: Boolean Models and Methods in Mathematics, Computer Science, and Engineering. 1st edn. Cambridge University Press, New York, NY, USA (2010)","edition":"1"},{"key":"e_1_3_2_1_18_1","volume-title":"R.: Differential Power Analysis Model and Some Results. In: In proceedings of CARDIS 2004","author":"Guilley S.","year":"2004","unstructured":"Guilley , S. , Pacalet , R.: Differential Power Analysis Model and Some Results. In: In proceedings of CARDIS 2004 , Kluwer Academic Publishers ( 2004 ) 127--142 Guilley, S., Pacalet, R.: Differential Power Analysis Model and Some Results. In: In proceedings of CARDIS 2004, Kluwer Academic Publishers (2004) 127--142"},{"key":"e_1_3_2_1_19_1","unstructured":"Weise T. In: Global Optimization Algorithms Theory and Application. (2009)  Weise T. In: Global Optimization Algorithms Theory and Application. (2009)"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-05094-1"},{"key":"e_1_3_2_1_21_1","series-title":"January 2013","volume-title":"Evolutionary computation framework","author":"Jakobovic D.","unstructured":"Jakobovic , D. , : Evolutionary computation framework ( January 2013 ) Jakobovic, D., et al.: Evolutionary computation framework (January 2013)"},{"key":"e_1_3_2_1_22_1","unstructured":"Boese K. D.: Cost Versus Distance In the Traveling Salesman Problem. Technical report (1995)  Boese K. D.: Cost Versus Distance In the Traveling Salesman Problem. Technical report (1995)"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1569901.1570026"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/b97772"},{"key":"e_1_3_2_1_25_1","volume-title":"Proc. of the International Conference on Genetic Algorithms and Their Applications","author":"Goldberg D. E.","year":"1985","unstructured":"Goldberg , D. E. , Lingle , R. : Alleles, loci, and the traveling salesman problem . In: Proc. of the International Conference on Genetic Algorithms and Their Applications , Pittsburgh, PA ( 1985 ) 154--159 Goldberg, D. E., Lingle, R.: Alleles, loci, and the traveling salesman problem. In: Proc. of the International Conference on Genetic Algorithms and Their Applications, Pittsburgh, PA (1985) 154--159"},{"key":"e_1_3_2_1_26_1","unstructured":"Syswerda G.: Schedule optimization using genetic algorithms. In: Handbook of Genetic Algorithms. (1991) 332--349  Syswerda G.: Schedule optimization using genetic algorithms. In: Handbook of Genetic Algorithms. (1991) 332--349"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 9th International Joint Conference on Artificial Intelligence -","volume":"1","author":"Davis L.","year":"1985","unstructured":"Davis , L. : Applying adaptive algorithms to epistatic domains . In: Proceedings of the 9th International Joint Conference on Artificial Intelligence - Volume 1 . IJCAI'85, San Francisco, CA, USA, Morgan Kaufmann Publishers Inc. ( 1985 ) 162--164 Davis, L.: Applying adaptive algorithms to epistatic domains. In: Proceedings of the 9th International Joint Conference on Artificial Intelligence - Volume 1. IJCAI'85, San Francisco, CA, USA, Morgan Kaufmann Publishers Inc. (1985) 162--164"},{"key":"e_1_3_2_1_28_1","volume-title":"Zheng","author":"Zhang X.","year":"1995","unstructured":"Zhang , X. , Zheng , Y. : GAC-the criterion of global avalanche characteristics of cryptographic functions. Journal of Universal Computer Science 1(5) ( 1995 ) 316--333 Zhang, X., Zheng, Y.: GAC-the criterion of global avalanche characteristics of cryptographic functions. Journal of Universal Computer Science 1(5) (1995) 316--333"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/1754868.1754910"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/3088723.3088767"}],"event":{"name":"CS2: Cryptography and Security in Computing Systems","sponsor":["HiPEAC HiPEAC Network of Excellence"],"location":"Vienna Austria","acronym":"CS2"},"container-title":["Proceedings of the First Workshop on Cryptography and Security in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2556315.2556319","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2556315.2556319","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:09:53Z","timestamp":1750234193000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2556315.2556319"}},"subtitle":["the case of AES S-box"],"short-title":[],"issued":{"date-parts":[[2014,1,20]]},"references-count":29,"alternative-id":["10.1145\/2556315.2556319","10.1145\/2556315"],"URL":"https:\/\/doi.org\/10.1145\/2556315.2556319","relation":{},"subject":[],"published":{"date-parts":[[2014,1,20]]},"assertion":[{"value":"2014-01-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}