{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:22Z","timestamp":1750220902977,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,1,12]],"date-time":"2020-01-12T00:00:00Z","timestamp":1578787200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,1,12]]},"DOI":"10.1145\/3378936.3378980","type":"proceedings-article","created":{"date-parts":[[2020,3,7]],"date-time":"2020-03-07T12:09:51Z","timestamp":1583582991000},"page":"226-231","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Tamper Resistance Evaluation of TWINE Implemented on 8-bit Microcontroller"],"prefix":"10.1145","author":[{"given":"Yusuke","family":"Nozaki","sequence":"first","affiliation":[{"name":"Meijo University, Tenpaku-ku, Nagoya, Aichi, Japan"}]},{"given":"Masaya","family":"Yoshikawa","sequence":"additional","affiliation":[{"name":"Meijo University, Tenpaku-ku, Nagoya, Aichi, Japan"}]}],"member":"320","published-online":{"date-parts":[[2020,3,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Fog Computing: Survey of Trends, Architectures, Requirements, and Research Directions","author":"Naha R. K.","year":"2018","unstructured":"Naha , R. K. , Garg , S. , Georgakopoulos , D. , Jayaraman , P. P. , Gao , L. , Xiang , Y. , and Ranjan , R . 2018 . Fog Computing: Survey of Trends, Architectures, Requirements, and Research Directions . IEEE Access , 6 (Aug. 2018), 47980--48009. DOI= http:\/\/doi.org\/10.1109\/ACCESS.2018.2866491. 10.1109\/ACCESS.2018.2866491 Naha, R. K., Garg, S., Georgakopoulos, D., Jayaraman, P. P., Gao, L., Xiang, Y., and Ranjan, R. 2018. Fog Computing: Survey of Trends, Architectures, Requirements, and Research Directions. IEEE Access, 6 (Aug. 2018), 47980--48009. DOI= http:\/\/doi.org\/10.1109\/ACCESS.2018.2866491."},{"key":"e_1_3_2_1_2_1","volume-title":"privacy and trust in Internet of Things: The road ahead. Computer Networks, 76 (Jan","author":"Sicaria S.","year":"2015","unstructured":"Sicaria , S. , Rizzardia , A. , Griecob , L. A. , and Coen-Porisinia , A. 2015. Security , privacy and trust in Internet of Things: The road ahead. Computer Networks, 76 (Jan . 2015 ), 146--164. DOI=https:\/\/doi.org\/10.1016\/j.comnet.2014.11.008. 10.1016\/j.comnet.2014.11.008 Sicaria, S., Rizzardia, A., Griecob, L. A., and Coen-Porisinia, A. 2015. Security, privacy and trust in Internet of Things: The road ahead. Computer Networks, 76 (Jan. 2015), 146--164. DOI=https:\/\/doi.org\/10.1016\/j.comnet.2014.11.008."},{"key":"#cr-split#-e_1_3_2_1_3_1.1","doi-asserted-by":"crossref","unstructured":"National Institute of Standards and Technology. 2001. Specification for the Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197. DOI= http:\/\/doi.org\/10.6028\/NIST.FIPS.197 10.6028\/NIST.FIPS.197","DOI":"10.6028\/NIST.FIPS.197"},{"key":"#cr-split#-e_1_3_2_1_3_1.2","doi-asserted-by":"crossref","unstructured":"National Institute of Standards and Technology. 2001. Specification for the Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197. DOI= http:\/\/doi.org\/10.6028\/NIST.FIPS.197","DOI":"10.6028\/NIST.FIPS.197"},{"key":"e_1_3_2_1_4_1","volume-title":"Versatile Blockcipher. In Proceedings of ECRYPT Workshop on Lightweight Cryptography (Louvain-la-Neuve","author":"Suzaki T.","year":"2011","unstructured":"Suzaki , T. , Minematsu , K. , Morioka , S. , and Kobayashi , E . 2011. TWINE: A Lightweight , Versatile Blockcipher. In Proceedings of ECRYPT Workshop on Lightweight Cryptography (Louvain-la-Neuve , Belgium , November 28-29, 2011 ). LC11, 146--169. Suzaki, T., Minematsu, K., Morioka, S., and Kobayashi, E. 2011. TWINE: A Lightweight, Versatile Blockcipher. In Proceedings of ECRYPT Workshop on Lightweight Cryptography (Louvain-la-Neuve, Belgium, November 28-29, 2011). LC11, 146--169."},{"key":"e_1_3_2_1_5_1","volume-title":"PRESENT: An Ultra-Lightweight Block Cipher. In Proceedings of 9th International Workshop on Cryptographic Hardware and Embedded Systems","author":"Bogdanav A.","year":"2007","unstructured":"Bogdanav , A. , Knudsen , L. R. , Leander , G. , Paar , C. , Poschmann , A. , Robshaw , M. J. B. , Seurin , Y. , and Vikkelsoe , C . 2007 . PRESENT: An Ultra-Lightweight Block Cipher. In Proceedings of 9th International Workshop on Cryptographic Hardware and Embedded Systems ( Vienna, Austria , September 10-13, 2007 ). CHES 2007. Springer-Verlag LNCS 4727, 450--466. DOI= http:\/\/doi.org\/10.1007\/978-3-540-74735-2_31. 10.1007\/978-3-540-74735-2_31 Bogdanav, A., Knudsen, L. R., Leander, G., Paar, C., Poschmann, A., Robshaw, M. J. B., Seurin, Y., and Vikkelsoe, C. 2007. PRESENT: An Ultra-Lightweight Block Cipher. In Proceedings of 9th International Workshop on Cryptographic Hardware and Embedded Systems (Vienna, Austria, September 10-13, 2007). CHES 2007. Springer-Verlag LNCS 4727, 450--466. DOI= http:\/\/doi.org\/10.1007\/978-3-540-74735-2_31."},{"key":"e_1_3_2_1_6_1","first-page":"307","article-title":"The Simeck Family of Lightweight Block Ciphers. In Proceedings of 17th International Workshop on Cryptographic Hardware and Embedded Systems (Saint-Malo, France, September 13-16, 2015). CHES 2015","volume":"9293","author":"Yang G.","year":"2015","unstructured":"Yang , G. , Zhu , B. , Suder , V. , Aagaard , M. D. , and Gong , G. 2015 . The Simeck Family of Lightweight Block Ciphers. In Proceedings of 17th International Workshop on Cryptographic Hardware and Embedded Systems (Saint-Malo, France, September 13-16, 2015). CHES 2015 . Springer-Verlag LNCS 9293 , 307 -- 329 . DOI= http:\/\/doi.org\/10.1007\/978-3-662-48324-4_16. 10.1007\/978-3-662-48324-4_16 Yang, G., Zhu, B., Suder, V., Aagaard, M. D., and Gong, G. 2015. The Simeck Family of Lightweight Block Ciphers. In Proceedings of 17th International Workshop on Cryptographic Hardware and Embedded Systems (Saint-Malo, France, September 13-16, 2015). CHES 2015. Springer-Verlag LNCS 9293, 307--329. DOI= http:\/\/doi.org\/10.1007\/978-3-662-48324-4_16.","journal-title":"Springer-Verlag LNCS"},{"volume-title":"Proceedings of 19th Annual International Cryptology Conference (Santa Barbara, USA, August 15-19, 1999). CRYPTO'99. Springer-Verlag LNCS 1666","author":"Kocher P.","key":"e_1_3_2_1_7_1","unstructured":"Kocher , P. , Jaffe , J. , and Jun , B . 1999. Differential Power Analysis . In Proceedings of 19th Annual International Cryptology Conference (Santa Barbara, USA, August 15-19, 1999). CRYPTO'99. Springer-Verlag LNCS 1666 , 388--397. DOI= http:\/\/doi.org\/10.1007\/3-540-48405-1_25. 10.1007\/3-540-48405-1_25 Kocher, P., Jaffe, J., and Jun, B. 1999. Differential Power Analysis. In Proceedings of 19th Annual International Cryptology Conference (Santa Barbara, USA, August 15-19, 1999). CRYPTO'99. Springer-Verlag LNCS 1666, 388--397. DOI= http:\/\/doi.org\/10.1007\/3-540-48405-1_25."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of 6th International Workshop on Cryptographic Hardware and Embedded Systems","author":"Brier E.","year":"2004","unstructured":"Brier , E. , Clavier , C. , and Olivier , F . 2004. Correlation Power Analysis with a Leakage Model . In Proceedings of 6th International Workshop on Cryptographic Hardware and Embedded Systems ( Boston, USA , August 11-13, 2004 ). CHES 2004. Springer-Verlag LNCS 3156, 16--29. DOI= http:\/\/doi.org\/10.1007\/978-3-540-28632-5_2. 10.1007\/978-3-540-28632-5_2 Brier, E., Clavier, C., and Olivier, F. 2004. Correlation Power Analysis with a Leakage Model. In Proceedings of 6th International Workshop on Cryptographic Hardware and Embedded Systems (Boston, USA, August 11-13, 2004). CHES 2004. Springer-Verlag LNCS 3156, 16--29. DOI= http:\/\/doi.org\/10.1007\/978-3-540-28632-5_2."},{"key":"e_1_3_2_1_9_1","unstructured":"Mangard S. Oswald E. and Popp T. 2007. Power Analysis Attacks. Springer. DOI= 10.1007\/978-0-387-38162-6.  Mangard S. Oswald E. and Popp T. 2007. Power Analysis Attacks. Springer. DOI= 10.1007\/978-0-387-38162-6."},{"volume-title":"Proceedings of 14th International Conference on Applied Cryptography and Network Security (Guildford, UK, June 19--22, 2016). ACNS 2016. Springer LNCS 9696","author":"Biryukov A.","key":"e_1_3_2_1_10_1","unstructured":"Biryukov , A. Dinu , D. , and Gro\u00dfsch\u00e4dl , J . 2016. Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice . In Proceedings of 14th International Conference on Applied Cryptography and Network Security (Guildford, UK, June 19--22, 2016). ACNS 2016. Springer LNCS 9696 , 537--557. DOI= http:\/\/doi.org\/10.1007\/978-3-319-39555-5_29. 10.1007\/978-3-319-39555-5_29 Biryukov, A. Dinu, D., and Gro\u00dfsch\u00e4dl, J. 2016. Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice. In Proceedings of 14th International Conference on Applied Cryptography and Network Security (Guildford, UK, June 19--22, 2016). ACNS 2016. Springer LNCS 9696, 537--557. DOI= http:\/\/doi.org\/10.1007\/978-3-319-39555-5_29."},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of IEEE International Meeting for Future of Electron Devices, Kansai","author":"Nozaki Y.","year":"2015","unstructured":"Nozaki , Y. Asahi , K. , and Yoshikawa , M . 2015. Countermeasure of TWINE against power analysis attack . In Proceedings of IEEE International Meeting for Future of Electron Devices, Kansai ( Kyoto, Japan , June 4-5, 2015 ). IMFEDK 2015. IEEE. 68--69. DOI= http:\/\/doi.org\/10.1109\/IMFEDK.2015.7158553. 10.1109\/IMFEDK.2015.7158553 Nozaki, Y. Asahi, K., and Yoshikawa, M. 2015. Countermeasure of TWINE against power analysis attack. In Proceedings of IEEE International Meeting for Future of Electron Devices, Kansai (Kyoto, Japan, June 4-5, 2015). IMFEDK 2015. IEEE. 68--69. DOI= http:\/\/doi.org\/10.1109\/IMFEDK.2015.7158553."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of 2016 IEEE\/ACES International Conference on Wireless Information Technology and Systems and Applied Computational Electromagnetics","author":"Yoshikawa M.","year":"2016","unstructured":"Yoshikawa , M. , Nozaki , Y. , and Asahi , K . 2016. Electromagnetic analysis attack for a lightweight block cipher TWINE . In Proceedings of 2016 IEEE\/ACES International Conference on Wireless Information Technology and Systems and Applied Computational Electromagnetics ( Honolulu, USA , March 3-18, 2016 ). ICWITS and ACES. IEEE. 1--2. DOI= http:\/\/doi.org\/10.1109\/ROPACES.2016.7465354. 10.1109\/ROPACES.2016.7465354 Yoshikawa, M., Nozaki, Y., and Asahi, K. 2016. Electromagnetic analysis attack for a lightweight block cipher TWINE. In Proceedings of 2016 IEEE\/ACES International Conference on Wireless Information Technology and Systems and Applied Computational Electromagnetics (Honolulu, USA, March 3-18, 2016). ICWITS and ACES. IEEE. 1--2. DOI= http:\/\/doi.org\/10.1109\/ROPACES.2016.7465354."},{"key":"e_1_3_2_1_13_1","volume-title":"Tamper Resistance Evaluation Method for Energy Harvester. In Proceedings of 3rd International Conference on Computational Intelligence and Applications","author":"Nozaki Y.","year":"2018","unstructured":"Nozaki , Y. and Yoshikawa , M . 2018 . Tamper Resistance Evaluation Method for Energy Harvester. In Proceedings of 3rd International Conference on Computational Intelligence and Applications ( Hong Kong , July 28-30, 2018 ). ICCIA 2018. IEEE. 200--204. DOI= http:\/\/doi.org\/10.1109\/ICCIA.2018.00045. 10.1109\/ICCIA.2018.00045 Nozaki, Y. and Yoshikawa, M. 2018. Tamper Resistance Evaluation Method for Energy Harvester. In Proceedings of 3rd International Conference on Computational Intelligence and Applications (Hong Kong, July 28-30, 2018). ICCIA 2018. IEEE. 200--204. DOI= http:\/\/doi.org\/10.1109\/ICCIA.2018.00045."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44709-1_21"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of Design, Automation and Test in Europe Conf. and Exhibition","author":"Meynard O.","year":"2010","unstructured":"Meynard , O. , Guilley , S. , Danger , J.-L. , and Sauvage , L . 2010. Far Correlation-based EMA with a Precharacterized Leakage Model , In Proceedings of Design, Automation and Test in Europe Conf. and Exhibition ( Dresden, Germany, March 8--12 , 2010 ), DATE 2010, IEEE. 977--980. DOI= http:\/\/doi.org\/10.1109\/DATE.2010.5456906. 10.1109\/DATE.2010.5456906 Meynard, O., Guilley, S., Danger, J.-L., and Sauvage, L. 2010. Far Correlation-based EMA with a Precharacterized Leakage Model, In Proceedings of Design, Automation and Test in Europe Conf. and Exhibition (Dresden, Germany, March 8--12, 2010), DATE 2010, IEEE. 977--980. DOI= http:\/\/doi.org\/10.1109\/DATE.2010.5456906."}],"event":{"name":"ICSIM '20: The 3rd International Conference on Software Engineering and Information Management","sponsor":["University of Science and Technology of China University of Science and Technology of China"],"location":"Sydney NSW Australia","acronym":"ICSIM '20"},"container-title":["Proceedings of the 3rd International Conference on Software Engineering and Information Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3378936.3378980","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3378936.3378980","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:48Z","timestamp":1750203888000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3378936.3378980"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,12]]},"references-count":16,"alternative-id":["10.1145\/3378936.3378980","10.1145\/3378936"],"URL":"https:\/\/doi.org\/10.1145\/3378936.3378980","relation":{},"subject":[],"published":{"date-parts":[[2020,1,12]]},"assertion":[{"value":"2020-03-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}