{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T01:05:01Z","timestamp":1772240701598,"version":"3.50.1"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.23919\/date.2018.8342180","type":"proceedings-article","created":{"date-parts":[[2018,4,23]],"date-time":"2018-04-23T19:20:11Z","timestamp":1524511211000},"page":"1129-1134","source":"Crossref","is-referenced-by-count":13,"title":["SCADPA: Side-channel assisted differential-plaintext attack on bit permutation based ciphers"],"prefix":"10.23919","author":[{"given":"Jakub","family":"Breier","sequence":"first","affiliation":[]},{"given":"Dirmanto","family":"Jap","sequence":"additional","affiliation":[]},{"given":"Shivam","family":"Bhasin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"228","article-title":"A DPA Attack against the Modular Reduction within a CRT Implementation of RSA","volume":"2523","author":"den boer","year":"2002","journal-title":"CHES"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2015.91"},{"key":"ref12","author":"jean","year":"2016","journal-title":"TikZ for Cryptographers"},{"key":"ref13","first-page":"311","article-title":"197: Advanced encryption standard (AES)","volume":"197","author":"pub","year":"2001","journal-title":"Federal Information Processing Standards Publication"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53008-5_5"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34961-4_14"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747946"},{"key":"ref17","article-title":"Software Implementation of Dual-Rail Representation","author":"hoogvorst","year":"2011","journal-title":"COSADE"},{"key":"ref18","first-page":"142","article-title":"Masking against side-channel attacks: A formal security proof","author":"prouff","year":"2013","journal-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques"},{"key":"ref4","first-page":"789","article-title":"Differential power analysis","author":"kocher","year":"1999","journal-title":"Advances in cryptology &#x2014; CRYPTO'99"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_16"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03515-4_8"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39887-5_16"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13708-2_12"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-42033-7_27"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"ref1","article-title":"Report on lightweight cryptography","volume":"8114","author":"mckay","year":"2016","journal-title":"NIST DRAFT NISTIR"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0055858"}],"event":{"name":"2018 Design, Automation & Test in Europe Conference & Exhibition (DATE)","location":"Dresden, Germany","start":{"date-parts":[[2018,3,19]]},"end":{"date-parts":[[2018,3,23]]}},"container-title":["2018 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8337149\/8341968\/08342180.pdf?arnumber=8342180","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,8]],"date-time":"2018-05-08T14:30:59Z","timestamp":1525789859000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8342180\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":18,"URL":"https:\/\/doi.org\/10.23919\/date.2018.8342180","relation":{},"subject":[],"published":{"date-parts":[[2018,3]]}}}