{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T05:50:35Z","timestamp":1769925035049,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,15]],"date-time":"2017-05-15T00:00:00Z","timestamp":1494806400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,5,15]]},"DOI":"10.1145\/3075564.3079067","type":"proceedings-article","created":{"date-parts":[[2017,6,7]],"date-time":"2017-06-07T12:47:29Z","timestamp":1496839649000},"page":"415-424","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["DPA on hardware implementations of Ascon and Keyak"],"prefix":"10.1145","author":[{"given":"Niels","family":"Samwel","sequence":"first","affiliation":[{"name":"Digital Security Group, Radboud University Nijmegen"}]},{"given":"Joan","family":"Daemen","sequence":"additional","affiliation":[{"name":"Digital Security Group, Radboud University Nijmegen, ST Microelectronics"}]}],"member":"320","published-online":{"date-parts":[[2017,5,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Farzaneh Abed Christian Forler and Stefan Lucks. 2014. General Overview of the Authenticated Schemes for the First Round of the CAESAR Competition. Technical Report. Cryptology ePrint Archive: Report 2014\/792.{2} CAESAR submissions second-round candidates. Available: http:\/\/competitions.cr.yp.to\/caesar-submissions.html. https:\/\/pdfs.semanticscholar.org\/9d87\/276411a6ea1b1c6b89c7a04306221fc8b8b8.pdf  Farzaneh Abed Christian Forler and Stefan Lucks. 2014. General Overview of the Authenticated Schemes for the First Round of the CAESAR Competition. Technical Report. Cryptology ePrint Archive: Report 2014\/792.{2} CAESAR submissions second-round candidates. Available: http:\/\/competitions.cr.yp.to\/caesar-submissions.html. https:\/\/pdfs.semanticscholar.org\/9d87\/276411a6ea1b1c6b89c7a04306221fc8b8b8.pdf"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICROW.2012.12"},{"key":"e_1_3_2_1_3_1","volume-title":"The Keccak reference. (January","author":"Bertoni G.","year":"2011","unstructured":"G. Bertoni , J. Daemen , M. Peeters , and G. Van Assche . 2011. The Keccak reference. (January 2011 ). http:\/\/keccak.noekeon.org\/Keccak-reference-3.0.pdf http:\/\/keccak.noekeon.org\/. G. Bertoni, J. Daemen, M. Peeters, and G. Van Assche. 2011. The Keccak reference. (January 2011). http:\/\/keccak.noekeon.org\/Keccak-reference-3.0.pdf http:\/\/keccak.noekeon.org\/."},{"key":"e_1_3_2_1_4_1","volume-title":"Permutation-based encryption, authentication and authenticated encryption. Directions in Authenticated Ciphers","author":"Bertoni Guido","year":"2012","unstructured":"Guido Bertoni , Joan Daemen , Micha\u00ebl Peeters , and Gilles Van Assche . 2012. Permutation-based encryption, authentication and authenticated encryption. Directions in Authenticated Ciphers ( 2012 ). Guido Bertoni, Joan Daemen, Micha\u00ebl Peeters, and Gilles Van Assche. 2012. Permutation-based encryption, authentication and authenticated encryption. Directions in Authenticated Ciphers (2012)."},{"key":"e_1_3_2_1_5_1","unstructured":"Guido Bertoni Joan Daemen Micha\u00c3\u0144l Peeters Gilles van Assche and Ronny van Keer. 2016. CAESAR submission: Keyak v2. (2016). http:\/\/keyak.noekeon.org\/Keyakv2-doc2.2.pdf  Guido Bertoni Joan Daemen Micha\u00c3\u0144l Peeters Gilles van Assche and Ronny van Keer. 2016. CAESAR submission: Keyak v2. (2016). http:\/\/keyak.noekeon.org\/Keyakv2-doc2.2.pdf"},{"key":"e_1_3_2_1_6_1","volume-title":"Smart Card Research and Advanced Applications","author":"Bilgin Beg\u00c3ijl","unstructured":"Beg\u00c3ijl Bilgin , Joan Daemen , Ventzislav Nikov , Svetla Nikova , Vincent Rijmen , and Gilles Van Assche . 2014. Efficient and First-Order DPA Resistant Implementations of Keccak . In Smart Card Research and Advanced Applications . Springer Science & Business Media , 187--199. Beg\u00c3ijl Bilgin, Joan Daemen, Ventzislav Nikov, Svetla Nikova, Vincent Rijmen, and Gilles Van Assche. 2014. Efficient and First-Order DPA Resistant Implementations of Keccak. In Smart Card Research and Advanced Applications. Springer Science & Business Media, 187--199."},{"key":"e_1_3_2_1_7_1","volume-title":"Computational aspects of correlation power analysis. Journal of Cryptographic Engineering (feb","author":"Bottinelli Paul","year":"2015","unstructured":"Paul Bottinelli and Joppe W Bos . 2015. Computational aspects of correlation power analysis. Journal of Cryptographic Engineering (feb 2015 ), 1--15. Paul Bottinelli and Joppe W Bos. 2015. Computational aspects of correlation power analysis. Journal of Cryptographic Engineering (feb 2015), 1--15."},{"key":"e_1_3_2_1_8_1","series-title":"Lecture Notes in Computer Science","volume-title":"Correlation Power Analysis with a Leakage Model","author":"Brier Eric","unstructured":"Eric Brier , Christophe Clavier , and Francis Olivier . 2004. Correlation Power Analysis with a Leakage Model . In Lecture Notes in Computer Science . Springer Nature , 16--29. Eric Brier, Christophe Clavier, and Francis Olivier. 2004. Correlation Power Analysis with a Leakage Model. In Lecture Notes in Computer Science. Springer Nature, 16--29."},{"key":"e_1_3_2_1_9_1","volume-title":"Advances in Cryptology --- CRYPTO' 99","author":"Chari Suresh","unstructured":"Suresh Chari , Charanjit S. Jutla , Josyula R. Rao , and Pankaj Rohatgi . 1999. Towards Sound Approaches to Counteract Power-Analysis Attacks . In Advances in Cryptology --- CRYPTO' 99 . Springer Nature , 398--412. Suresh Chari, Charanjit S. Jutla, Josyula R. Rao, and Pankaj Rohatgi. 1999. Towards Sound Approaches to Counteract Power-Analysis Attacks. In Advances in Cryptology --- CRYPTO' 99. Springer Nature, 398--412."},{"key":"e_1_3_2_1_10_1","unstructured":"Joan Daemen. 2016. Changing of the Guards: a simple and efficient method for achieving uniformity in threshold sharing. (2016) 1--8.  Joan Daemen. 2016. Changing of the Guards: a simple and efficient method for achieving uniformity in threshold sharing. (2016) 1--8."},{"key":"e_1_3_2_1_11_1","unstructured":"C. Dobraunig M. Eichlseder F. Mendel and M. Schl\u00c3d'ffer. 2015. Ascon v1.l Submission to CAESAR. (2015). https:\/\/competitions.cr.yp.to\/round2\/asconv11.pdf  C. Dobraunig M. Eichlseder F. Mendel and M. Schl\u00c3d'ffer. 2015. Ascon v1.l Submission to CAESAR. (2015). https:\/\/competitions.cr.yp.to\/round2\/asconv11.pdf"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1080\/00220973.1937.11010053"},{"key":"e_1_3_2_1_13_1","volume-title":"Advances in Cryptology --- CRYPTO' 99","author":"Kocher Paul","unstructured":"Paul Kocher , Joshua Jaffe , and Benjamin Jun . 1999. Differential Power Analysis . In Advances in Cryptology --- CRYPTO' 99 . Springer Nature , 388--397. Paul Kocher, Joshua Jaffe, and Benjamin Jun. 1999. Differential Power Analysis. In Advances in Cryptology --- CRYPTO' 99. Springer Nature, 388--397."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2768566.2768567"},{"key":"e_1_3_2_1_15_1","volume-title":"Power analysis attacks: Revealing the secrets of smart cards","author":"Mangard Stefan","unstructured":"Stefan Mangard , Elisabeth Oswald , and Thomas Popp . 2008. Power analysis attacks: Revealing the secrets of smart cards . Vol. 31 . Springer Science & Business Media . Stefan Mangard, Elisabeth Oswald, and Thomas Popp. 2008. Power analysis attacks: Revealing the secrets of smart cards. Vol. 31. Springer Science & Business Media."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/11935308_38"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9085-7"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/11545262_23"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_9"},{"key":"e_1_3_2_1_21_1","volume-title":"Advances in Cryptology - ASIACRYPT","author":"Standaert Fran\u00e7ois-Xavier","year":"2010","unstructured":"Fran\u00e7ois-Xavier Standaert , Nicolas Veyrat-Charvillon , Elisabeth Oswald , Benedikt Gierlichs , Marcel Medwed , Markus Kasper , and Stefan Mangard . 2010. The World Is Not Enough: Another Look on Second-Order DPA . In Advances in Cryptology - ASIACRYPT 2010 . Springer Nature , 112--129. Fran\u00e7ois-Xavier Standaert, Nicolas Veyrat-Charvillon, Elisabeth Oswald, Benedikt Gierlichs, Marcel Medwed, Markus Kasper, and Stefan Mangard. 2010. The World Is Not Enough: Another Look on Second-Order DPA. In Advances in Cryptology - ASIACRYPT 2010. Springer Nature, 112--129."},{"key":"e_1_3_2_1_22_1","volume-title":"Side-Channel Analysis of MAC-Keccak. In 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST). Institute of Electrical and Electronics Engineers (IEEE).","author":"Taha Mostafa","year":"2013","unstructured":"Mostafa Taha and Patrick Schaumont . 2013 . Side-Channel Analysis of MAC-Keccak. In 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST). Institute of Electrical and Electronics Engineers (IEEE). Mostafa Taha and Patrick Schaumont. 2013. Side-Channel Analysis of MAC-Keccak. In 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST). Institute of Electrical and Electronics Engineers (IEEE)."}],"event":{"name":"CF '17: Computing Frontiers Conference","location":"Siena Italy","acronym":"CF '17","sponsor":["SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing"]},"container-title":["Proceedings of the Computing Frontiers Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3075564.3079067","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3075564.3079067","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:42Z","timestamp":1750215822000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3075564.3079067"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,15]]},"references-count":21,"alternative-id":["10.1145\/3075564.3079067","10.1145\/3075564"],"URL":"https:\/\/doi.org\/10.1145\/3075564.3079067","relation":{},"subject":[],"published":{"date-parts":[[2017,5,15]]},"assertion":[{"value":"2017-05-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}