{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,7]],"date-time":"2024-12-07T05:21:31Z","timestamp":1733548891727,"version":"3.30.1"},"reference-count":45,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2023,1,26]],"date-time":"2023-01-26T00:00:00Z","timestamp":1674691200000},"content-version":"vor","delay-in-days":25,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.32604\/csse.2023.035576","type":"journal-article","created":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T07:39:52Z","timestamp":1674545992000},"page":"389-402","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["An Anti-Physical Attack Scheme of ARX Lightweight Algorithms for IoT Applications"],"prefix":"10.32604","volume":"46","author":[{"given":"Qiang","family":"Zhi","sequence":"first","affiliation":[]},{"given":"Xiang","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Hangying","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhengshu","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Jianguo","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Tong","family":"Huang","sequence":"additional","affiliation":[]}],"member":"17807","reference":[{"journal-title":"Securing the Internet of Things","year":"2017","author":"Li","key":"ref1"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"10474","DOI":"10.1109\/JIOT.2021.3062630","article-title":"Internet of Things (IoT): A review of its enabling technologies in healthcare applications, standards protocols, security, and market opportunities","volume":"8","author":"Bhuiyan","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"key":"ref3","first-page":"87","author":"Sandhya","year":"2022","journal-title":"Society 5.0: Smart Future Towards Enhancing the Quality of Society"},{"key":"ref4","doi-asserted-by":"crossref","unstructured":"M. S. Turan, K. McKay, D. Chang, \u00c7. \u00c7al\u0131k, L. Bassham et al., \u201cStatus report on the second round of the NIST lightweight cryptography standardization process,\u201d NISTIR 8369, 2021.","DOI":"10.6028\/NIST.IR.8454"},{"key":"ref5","series-title":"Design, Automation & Test in Europe Conf. & Exhibition (DATE)","first-page":"565","article-title":"Side-channel attack on rainbow post-quantum signature","author":"Pokorn\u00fd","year":"2021"},{"key":"ref6","series-title":"NIST Lightweight Cryptography Workshop, Virtual Conference","article-title":"Toolchain for timing leakage analysis of NIST lightweight crypto candidates","author":"Hansen","year":"2020"},{"key":"ref7","first-page":"1165","article-title":"Survey of side-channel attacks and countermeasures on post-quantum cryptography (in Chinese)","volume":"32","author":"Wu","year":"2021","journal-title":"Journal of Software"},{"key":"ref8","first-page":"3992","article-title":"Survey on RISC-V system architecture research (in Chinese)","volume":"32","author":"Liu","year":"2021","journal-title":"Journal of Software"},{"key":"ref9","series-title":"ACM Int. Conf. on Computing Frontiers","first-page":"373","article-title":"Examining the practical side channel resilience of ARX-boxes","author":"Yan","year":"2019"},{"key":"ref10","series-title":"Int. Conf. on Field-Programmable Logic and Applications (FPL)","first-page":"193","article-title":"Side channel resistance at a cost: A comparison of ARX-based authenticated encryption","author":"Coleman","year":"2020"},{"key":"ref11","series-title":"Design, Automation & Test in Europe Conf. & Exhibition (DATE)","first-page":"401","article-title":"Exploiting on-chip power management for side-channel security","author":"Singh","year":"2018"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3330392","article-title":"Verifying and quantifying side-channel resistance of masked software implementations","volume":"28","author":"Gao","year":"2019","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"283","DOI":"10.46586\/tches.v2021.i4.283-325","article-title":"An instruction set extension to support software-based masking","volume":"2021","author":"Gao","year":"2021","journal-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"627","DOI":"10.46586\/tches.v2018.i3.627-653","article-title":"Efficient side-channel protections of ARX ciphers","volume":"2018","author":"Jungk","year":"2018","journal-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"no pagination","DOI":"10.1177\/1550147719874180","article-title":"Fast implementations of ARX-based lightweight block ciphers (SPARX, CHAM) on 32-bit processor","volume":"15","author":"Seok","year":"2019","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"1434","DOI":"10.1109\/TC.2017.2757921","article-title":"Lightweight ciphers and their side-channel resilience","volume":"69","author":"Heuser","year":"2020","journal-title":"IEEE Transactions on Computers"},{"key":"ref17","first-page":"1836","article-title":"Side channel analysis and evaluation on cryptographic products (in Chinese)","volume":"42","author":"Chen","year":"2020","journal-title":"Journal of Electronics & Information Technology"},{"key":"ref18","series-title":"26th USENIX Security Symp.","first-page":"199","article-title":"Towards practical tools for side channel aware software engineering: \u2018Grey Box\u2019 modelling for instruction leakages","author":"McCann","year":"2017"},{"key":"ref19","series-title":"Network and Distributed Systems Security (NDSS) Symp., Virtual Conference","first-page":"1","article-title":"ROSITA: Towards automatic elimination of power-analysis leakage in ciphers","author":"Shelton","year":"2021"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"136023","DOI":"10.1109\/ACCESS.2019.2940330","article-title":"Loong: A family of involutional lightweight block cipher based on SPN structure","volume":"7","author":"Liu","year":"2019","journal-title":"IEEE Access"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.micpro.2018.04.009","article-title":"SFN: A new lightweight block cipher","volume":"60","author":"Li","year":"2018","journal-title":"Microprocessors and Microsystems"},{"key":"ref22","series-title":"Int. Conf. on Cryptographic Hardware and Embedded Systems","first-page":"321","article-title":"GIFT: A small present","author":"Banik","year":"2017"},{"key":"ref23","series-title":"NIST Workshop Lightweight Cryptogr","article-title":"FELICS-fair evaluation of lightweight cryptographic","author":"Dinu","year":"2015"},{"key":"ref24","series-title":"Int. Conf. on Information Security and Cryptology","first-page":"3","article-title":"CHAM: A family of lightweight block ciphers for resource-constrained devices","author":"Koo","year":"2017"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"13014","DOI":"10.1109\/JIOT.2021.3064203","article-title":"Shadow: A lightweight block cipher for IoT","volume":"8","author":"Guo","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"key":"ref26","first-page":"306","author":"Mouha","year":"2014","journal-title":"Selected Areas in Cryptography"},{"key":"ref27","first-page":"1","author":"Roh","year":"2019","journal-title":"Information Security and Cryptology"},{"key":"ref28","series-title":"Int. Scientific-Practical Conf. Problems of Infocommunications, Science and Technology","first-page":"228","article-title":"Open problems of proving security of ARX-based ciphers to differential cryptanalysis","author":"Rodinko","year":"2017"},{"key":"ref29","series-title":"Annual Int. Conf. on the Theory and Applications of Cryptographic Techniques","first-page":"711","article-title":"Improved linear approximations to ARX ciphers and attacks against chacha","author":"Coutinho","year":"2021"},{"key":"ref30","series-title":"Int. Conf. on Smart Card Research and Advanced Applications","first-page":"22","article-title":"Optimal first-order boolean masking for embedded IoT devices","author":"Biryukov","year":"2017"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"275","DOI":"10.46586\/tches.v2021.i3.275-297","article-title":"Analysis and comparison of table-based arithmetic to boolean masking","volume":"2021","author":"Beirendonck","year":"2021","journal-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems"},{"key":"ref32","first-page":"708","article-title":"Masking the lightweight authenticated ciphers ACORN and Ascon in software","volume":"2018","author":"Adomnicai","year":"2018","journal-title":"Cryptology ePrint Archive"},{"key":"ref33","series-title":"ACM on Asia Conf. on Computer and Communications Security","first-page":"756","article-title":"SoK: Design tools for side-channel-aware implementations","author":"Buhan","year":"2022"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"73","DOI":"10.46586\/tches.v2020.i2.73-98","article-title":"FENL: An ISE to mitigate analogue micro-architectural leakage","volume":"2020","author":"Gao","year":"2020","journal-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems"},{"key":"ref35","series-title":"Int. Conf. on Information Security","first-page":"39","article-title":"Efficient masking of ARX-based block ciphers using carry-save addition on boolean shares","author":"Dinu","year":"2017"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"106352","DOI":"10.1016\/j.asoc.2020.106352","article-title":"Security analysis on dummy based side-channel countermeasures\u2014Case study: AES with dummy and shuffling","volume":"93","author":"Lee","year":"2020","journal-title":"Applied Soft Computing"},{"key":"ref37","series-title":"Design, Automation & Test in Europe Conference & Exhibition (DATE)","first-page":"1006","article-title":"Automated masking of software implementations on industrial microcontrollers","author":"Abromeit","year":"2021"},{"key":"ref38","series-title":"IEEE 31st Computer Security Foundations Symp.","first-page":"328","article-title":"Secure compilation of side-channel countermeasures: The case of cryptographic \u201cconstant-time\u201d","author":"Barthe","year":"2018"},{"key":"ref39","series-title":"Int. Conf. on Information Systems Security and Privacy","first-page":"89","article-title":"An analytic attack against ARX addition exploiting standard side-channel leakage","author":"Yan","year":"2021"},{"key":"ref40","series-title":"Design, Automation & Test in Europe Conf. & Exhibition (DATE)","first-page":"990","article-title":"SPARX\u2014A side-channel protected processor for ARX-based cryptography","author":"Bache","year":"2017"},{"key":"ref41","series-title":"Australasian Conf. on Information Security and Privacy","first-page":"379","article-title":"Automatic differential analysis of ARX block ciphers with application to SPECK and LEA","author":"Song","year":"2016"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"1054","DOI":"10.1109\/TIT.2020.3040543","article-title":"A new method for searching optimal differential and linear trails in ARX ciphers","volume":"67","author":"Liu","year":"2021","journal-title":"IEEE Transactions on Information Theory"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"189","DOI":"10.46586\/tches.v2021.i2.189-228","article-title":"Masking in fine-grained leakage models: Construction, implementation and verification","volume":"2021","author":"Barthe","year":"2021","journal-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"627","DOI":"10.46586\/tches.v2018.i3.627-653","article-title":"Efficient side-channel protections of ARX ciphers","volume":"2018","author":"Jungk","year":"2018","journal-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems"},{"key":"ref45","series-title":"TENCON, 2018-2018 IEEE Region 10 Conf.","first-page":"1784","article-title":"A survey on lightweight cryptographic algorithms","author":"Sallam","year":"2018"}],"container-title":["Computer Systems Science and Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/files\/csse\/2023\/TSP_CSSE-46-1\/TSP_CSSE_35576\/TSP_CSSE_35576.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T21:59:35Z","timestamp":1733522375000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/csse\/v46n1\/51357"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":45,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023]]}},"URL":"https:\/\/doi.org\/10.32604\/csse.2023.035576","relation":{},"ISSN":["0267-6192"],"issn-type":[{"type":"print","value":"0267-6192"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"2022-08-26","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-10-25","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-01-20","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}