{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:40:11Z","timestamp":1767339611781,"version":"3.41.2"},"reference-count":57,"publisher":"International Association for Cryptologic Research","issue":"4","license":[{"start":{"date-parts":[[2024,10,9]],"date-time":"2024-10-09T00:00:00Z","timestamp":1728432000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IACR CiC"],"accepted":{"date-parts":[[2024,12,3]]},"abstract":"<jats:p>        Profiled power analysis is one of the most powerful forms of         passive side-channel attacks.         Over the last two decades, many works have analyzed their impact on cryptographic         implementations as well as corresponding countermeasure techniques.         To date, the most advanced variants of profiled power analysis are based on         Soft-analytical Side-Channel Attacks (SASCA).         After the initial profiling phase, a SASCA adversary creates a         probabilistic graphical model, called a factor graph, of the target implementation         and encodes the results of the previous step as prior information.         Then, an inference algorithm such as loopy Belief Propagation (BP) can be used to recover         the distribution of a target variable in the graph, i.e., sensitive data\/keys.<\/jats:p>\n          <jats:p>        Designers of cryptographic implementations aim to reduce information leakage as much as possible and assess how much leakage can be allowed without compromising security requirements.         Despite the existence of many works on profiled power analysis,         it is still notoriously difficult to state under which conditions a cryptographic         implementation provides sufficient protection against a profiling attacker with         certain capabilities.         In particular, it is unknown when a BP-based attack is optimal or whether tuning some heuristics in that algorithm may significant strengthen the attack.<\/jats:p>\n          <jats:p>        This knowledge gap led us to investigate the effectiveness of BP for SASCAs         by studying the modes of failures of BP in the context of the SASCA, and         systematically analyzing the behavior of BP on practically-relevant factor graphs. We use exact         inference to gauge the quality of the approximation provided by BP. Through         this assessment, we show that there exists a significant disparity between BP  and         exact inference in terms of guessing entropy         when performing SASCAs on several classes of factor graphs.         We further review and analyze various BP improvement heuristics from the         literature. <\/jats:p>","DOI":"10.62056\/ayl8ksdja","type":"journal-article","created":{"date-parts":[[2025,1,13]],"date-time":"2025-01-13T17:00:52Z","timestamp":1736787652000},"update-policy":"https:\/\/doi.org\/10.62056\/adfjwm02dj","source":"Crossref","is-referenced-by-count":1,"title":["On Loopy Belief Propagation for SASCAs"],"prefix":"10.62056","volume":"1","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2756-2065","authenticated-orcid":false,"given":"Rishub","family":"Nagpal","sequence":"first","affiliation":[{"id":[{"id":"https:\/\/ror.org\/00d7xrm67","id-type":"ROR","asserted-by":"publisher"}],"name":"Graz University of Technology","place":["Graz, Austria"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5426-9345","authenticated-orcid":false,"given":"Ga\u00ebtan","family":"Cassiers","sequence":"additional","affiliation":[{"id":[{"id":"https:\/\/ror.org\/0030xrh72","id-type":"ROR","asserted-by":"publisher"}],"name":"CryptoExperts","place":["41 Boulevard des Capucines, Paris, 75002, France"]},{"id":[{"id":"https:\/\/ror.org\/02495e989","id-type":"ROR","asserted-by":"publisher"}],"name":"UCLouvain","place":["3 Place du Levant, Louvain-la-Neuve, 1348, Belgium"],"department":["ICTEAM, Crypto Group"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9569-8477","authenticated-orcid":false,"given":"Robert","family":"Primas","sequence":"additional","affiliation":[{"id":[{"id":"https:\/\/ror.org\/01ek73717","id-type":"ROR","asserted-by":"publisher"}],"name":"Intel Labs","place":["Portland, Oregon, USA"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3920-1419","authenticated-orcid":false,"given":"Christian","family":"Knoll","sequence":"additional","affiliation":[{"name":"Levata GmbH","place":["Graz, Austria"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6356-3367","authenticated-orcid":false,"given":"Franz","family":"Pernkopf","sequence":"additional","affiliation":[{"id":[{"id":"https:\/\/ror.org\/00d7xrm67","id-type":"ROR","asserted-by":"publisher"}],"name":"Graz University of Technology","place":["Graz, Austria"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9650-8041","authenticated-orcid":false,"given":"Stefan","family":"Mangard","sequence":"additional","affiliation":[{"id":[{"id":"https:\/\/ror.org\/00d7xrm67","id-type":"ROR","asserted-by":"publisher"}],"name":"Graz University of Technology","place":["Graz, Austria"]}]}],"member":"48349","published-online":{"date-parts":[[2025,1,13]]},"reference":[{"key":"ref1:DBLP:journals\/tches\/BronchainS21","doi-asserted-by":"publisher","first-page":"202","DOI":"10.46586\/TCHES.V2021.I3.202-234","article-title":"Breaking Masked Implementations with Many Shares on 32-bit\n  Software Platforms or When the Security Order Does Not Matter","volume":"2021","author":"Olivier Bronchain","year":"2021","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"ref2:DBLP:conf\/cardis\/ChoudaryK14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-3-319-16763-3_6","article-title":"Efficient Stochastic Methods: Profiled Attacks Beyond 8\n  Bits","volume":"8968","author":"Marios O. Choudary","year":"2014"},{"key":"ref3:DBLP:conf\/esmart\/QuisquaterS01","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/3-540-45418-7_17","article-title":"ElectroMagnetic Analysis (EMA): Measures and\n  Counter-Measures for Smart Cards","volume":"2140","author":"Jean-Jacques Quisquater","year":"2001"},{"key":"ref4:DBLP:journals\/tches\/NgoDGJ21","doi-asserted-by":"publisher","first-page":"676","DOI":"10.46586\/TCHES.V2021.I4.676-707","article-title":"A Side-Channel Attack on a Masked IND-CCA Secure Saber\n  KEM Implementation","volume":"2021","author":"Kalle Ngo","year":"2021","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"ref5:DBLP:journals\/corr\/abs-2002-11505","article-title":"Relaxed Scheduling for Scalable Belief Propagation","volume":"abs\/2002.11505","author":"Vitaly Aksenov","year":"2020","journal-title":"CoRR"},{"key":"ref6:DBLP:journals\/iacr\/HermelinkMSPR23","first-page":"98","article-title":"Belief Propagation Meets Lattice Reduction: Security\n  Estimates for Error-Tolerant Key Recovery from Decryption Errors","author":"Julius Hermelink","year":"2023","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref7:DBLP:conf\/crypto\/BronchainHMOS19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1007\/978-3-030-26948-7_25","article-title":"Leakage Certification Revisited: Bounding Model Errors in\n  Side-Channel Security Evaluations","volume":"11692","author":"Olivier Bronchain","year":"2019"},{"key":"ref8:DBLP:journals\/iacr\/BelaidCMRRST23","first-page":"1198","article-title":"Towards Achieving Provable Side-Channel Security in\n  Practice","author":"Sonia Bela\u00efd","year":"2023","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref9:DBLP:journals\/tches\/CassiersS19","doi-asserted-by":"publisher","first-page":"162","DOI":"10.13154\/TCHES.V2019.I2.162-198","article-title":"Towards Globally Optimized Masking: From Low Randomness to\n  Low Noise Rate or Probe Isolating Multiplications with Reduced Randomness and\n  Security against Horizontal Attacks","volume":"2019","author":"Ga\u00ebtan Cassiers","year":"2019","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"ref10:DBLP:journals\/neco\/Weiss00","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1162\/089976600300015880","article-title":"Correctness of Local Probability Propagation in Graphical\n  Models with Loops","volume":"12","author":"Yair Weiss","year":"2000","journal-title":"Neural Comput."},{"key":"ref11:DBLP:journals\/tches\/HamburgHPSSSSV21","doi-asserted-by":"publisher","first-page":"88","DOI":"10.46586\/TCHES.V2021.I4.88-113","article-title":"Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure\n  Kyber","volume":"2021","author":"Mike Hamburg","year":"2021","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"ref12:DBLP:journals\/tit\/MooijK07","doi-asserted-by":"publisher","first-page":"4422","DOI":"10.1109\/TIT.2007.909166","article-title":"Sufficient Conditions for Convergence of the Sum-Product\n  Algorithm","volume":"53","author":"Joris M. Mooij","year":"2007","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref13:DBLP:conf\/nips\/Storkey03","first-page":"433","article-title":"Generalised Propagation for Fast Fourier Transforms with\n  Partial or Missing Data","author":"Amos J. Storkey","year":"2003"},{"key":"ref14:DBLP:journals\/joc\/DucDF19","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/S00145-018-9284-1","article-title":"Unifying Leakage Models: From Probing Attacks to Noisy\n  Leakage","volume":"32","author":"Alexandre Duc","year":"2019","journal-title":"J. Cryptol."},{"key":"ref15:DBLP:conf\/uai\/MurphyWJ99","first-page":"467","article-title":"Loopy Belief Propagation for Approximate Inference: An\n  Empirical Study","author":"Kevin P. Murphy","year":"1999"},{"article-title":"On Loopy Belief Propagation - Local Stability Analysis for\n  Non-Vanishing Fields","year":"2017","author":"Christian Knoll","key":"ref16:DBLP:conf\/uai\/KnollP17"},{"key":"ref17:DBLP:conf\/asiacrypt\/BolboceanuBPS19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/978-3-030-34621-8_4","article-title":"Order-LWE and the Hardness of Ring-LWE with Entropic\n  Secrets","volume":"11922","author":"Madalina Bolboceanu","year":"2019"},{"key":"ref18:DBLP:journals\/tit\/YedidiaFW05","doi-asserted-by":"publisher","first-page":"2282","DOI":"10.1109\/TIT.2005.850085","article-title":"Constructing free-energy approximations and generalized\n  belief propagation algorithms","volume":"51","author":"Jonathan S. Yedidia","year":"2005","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref19:DBLP:conf\/aistats\/PingI17","series-title":"Proceedings of Machine Learning Research","first-page":"1141","article-title":"Belief Propagation in Conditional RBMs for Structured\n  Prediction","volume":"54","author":"Wei Ping","year":"2017"},{"key":"ref20:DBLP:conf\/crypto\/IshaiSW03","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1007\/978-3-540-45146-4_27","article-title":"Private Circuits: Securing Hardware against Probing\n  Attacks","volume":"2729","author":"Yuval Ishai","year":"2003"},{"key":"ref21:DBLP:conf\/cardis\/ChoudaryK13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-319-08302-5_17","article-title":"Efficient Template Attacks","volume":"8419","author":"Omar Choudary","year":"2013"},{"key":"ref22:DBLP:journals\/iacr\/BronchainCS21","first-page":"817","article-title":"Give Me 5 Minutes: Attacking ASCAD with a Single\n  Side-Channel Trace","author":"Olivier Bronchain","year":"2021","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref23:DBLP:conf\/ches\/SchindlerLP05","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/11545262_3","article-title":"A Stochastic Model for Differential Side Channel\n  Cryptanalysis","volume":"3659","author":"Werner Schindler","year":"2005"},{"key":"ref24:DBLP:journals\/tosc\/DobraunigEMMMPU20","doi-asserted-by":"publisher","first-page":"390","DOI":"10.13154\/TOSC.V2020.IS1.390-416","article-title":"Isap v2.0","volume":"2020","author":"Christoph Dobraunig","year":"2020","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"ref25:DBLP:books\/daglib\/0024906","isbn-type":"print","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511811357","volume-title":"Modeling and Reasoning with Bayesian Networks","author":"Adnan Darwiche","year":"2009","ISBN":"https:\/\/id.crossref.org\/isbn\/9780521884389"},{"key":"ref26:mooij2005properties","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2005\/11\/P11012","article-title":"On the properties of the Bethe approximation and loopy\n  belief propagation on binary networks","volume":"2005","author":"Joris M Mooij","year":"2005","journal-title":"Journal of Statistical Mechanics: Theory and Experiment"},{"key":"ref27:DBLP:conf\/sec\/BoyarP12","series-title":"IFIP Advances in Information and Communication\n  Technology","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/978-3-642-30436-1_24","article-title":"A Small Depth-16 Circuit for the AES S-Box","volume":"376","author":"Joan Boyar","year":"2012"},{"key":"ref28:DBLP:journals\/tches\/KannwischerPP20","doi-asserted-by":"publisher","first-page":"243","DOI":"10.13154\/TCHES.V2020.I3.243-268","article-title":"Single-Trace Attacks on Keccak","volume":"2020","author":"Matthias J. Kannwischer","year":"2020","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"ref29:DBLP:journals\/tit\/KschischangFL01","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1109\/18.910572","article-title":"Factor graphs and the sum-product algorithm","volume":"47","author":"Frank R. Kschischang","year":"2001","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref30:DBLP:journals\/jmlr\/IhlerFW05","first-page":"905","article-title":"Loopy Belief Propagation: Convergence and Effects of Message\n  Errors","volume":"6","author":"Alexander T. Ihler","year":"2005","journal-title":"J. Mach. Learn. Res."},{"key":"ref31:DBLP:conf\/cardis\/Green0O18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-030-15462-2_2","article-title":"A Systematic Study of the Impact of Graphical Models on\n  Inference-Based Attacks on AES","volume":"11389","author":"Joey Green","year":"2018"},{"key":"ref32:DBLP:conf\/eurosp\/BosDKLLSSSS18","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1109\/EUROSP.2018.00032","article-title":"CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based\n  KEM","author":"Joppe W. Bos","year":"2018"},{"key":"ref33:DBLP:conf\/crypto\/KocherJJ99","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","article-title":"Differential Power Analysis","volume":"1666","author":"Paul C. Kocher","year":"1999"},{"key":"ref34:DBLP:journals\/tches\/CamuratiDS23","doi-asserted-by":"publisher","first-page":"277","DOI":"10.46586\/TCHES.V2023.I1.277-300","article-title":"MCRank: Monte Carlo Key Rank Estimation for Side-Channel\n  Security Evaluations","volume":"2023","author":"Giovanni Camurati","year":"2023","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"ref35:DBLP:conf\/eurocrypt\/RenauldSVKF11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-642-20465-4_8","article-title":"A Formal Study of Power Variability Issues and Side-Channel\n  Attacks for Nanoscale Devices","volume":"6632","author":"Mathieu Renauld","year":"2011"},{"key":"ref36:DBLP:conf\/uai\/LeisenbergerKSP21","series-title":"Proceedings of Machine Learning Research","first-page":"1863","article-title":"Convergence behavior of belief propagation: estimating\n  regions of attraction via Lyapunov functions","volume":"161","author":"Harald Leisenberger","year":"2021"},{"key":"ref37:DBLP:journals\/tches\/GuoGSB20","doi-asserted-by":"publisher","first-page":"209","DOI":"10.13154\/TCHES.V2020.I4.209-238","article-title":"Modeling Soft Analytical Side-Channel Attacks from a Coding\n  Theory Viewpoint","volume":"2020","author":"Qian Guo","year":"2020","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"article-title":"Exact Soft Analytical Side-Channel Attacks using Tractable\n  Circuits","year":"2024","author":"Thomas Wedenig","key":"ref38:DBLP:conf\/icml\/WedenigNCMP24"},{"key":"ref39:DBLP:books\/daglib\/0013517","isbn-type":"print","volume-title":"Information theory, inference, and learning algorithms","author":"David J. C. MacKay","year":"2003","ISBN":"https:\/\/id.crossref.org\/isbn\/9780521642989"},{"key":"ref40:DBLP:journals\/corr\/PeyrardGFRSSV15","article-title":"Exact and approximate inference in graphical models:\n  variable elimination and beyond","volume":"abs\/1506.08544","author":"Nathalie Peyrard","year":"2015","journal-title":"CoRR"},{"key":"ref41:DBLP:conf\/cardis\/YouK21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-97348-3_1","article-title":"Single-Trace Fragment Template Attack on a 32-Bit\n  Implementation of Keccak","volume":"13173","author":"Shih-Chun You","year":"2021"},{"key":"ref42:DBLP:conf\/ches\/PrimasPM17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/978-3-319-66787-4_25","article-title":"Single-Trace Side-Channel Attacks on Masked Lattice-Based\n  Encryption","volume":"10529","author":"Robert Primas","year":"2017"},{"key":"ref43:DBLP:conf\/crypto\/ChowdhuryRBO24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/978-3-031-68391-6_13","article-title":"Leakage Certification Made Simple","volume":"14925","author":"Aakash Chowdhury","year":"2024"},{"key":"ref44:DBLP:conf\/aaai\/Pearl82","first-page":"133","article-title":"Reverend Bayes on Inference Engines: A Distributed\n  Hierarchical Approach","author":"Judea Pearl","year":"1982"},{"key":"ref45:DBLP:conf\/asiacrypt\/Veyrat-CharvillonGS14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/978-3-662-45611-8_15","article-title":"Soft Analytical Side-Channel Attacks","volume":"8873","author":"Nicolas Veyrat-Charvillon","year":"2014"},{"key":"ref46:DBLP:journals\/joc\/DobraunigEMS21","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/S00145-021-09398-9","article-title":"Ascon v1.2: Lightweight Authenticated Encryption and\n  Hashing","volume":"34","author":"Christoph Dobraunig","year":"2021","journal-title":"J. Cryptol."},{"key":"ref47:DBLP:conf\/isit\/Yedidia04","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1109\/ISIT.2004.1365296","article-title":"Sparse factor graph representations of Reed-Solomon and\n  related codes","author":"Jonathan S. Yedidia","year":"2004"},{"key":"ref48:DBLP:conf\/crypto\/BelliziaBCGGMPP20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/978-3-030-56784-2_13","article-title":"Mode-Level vs. Implementation-Level Physical Security in\n  Symmetric Cryptography - A Practical Guide Through the Leakage-Resistance\n  Jungle","volume":"12170","author":"Davide Bellizia","year":"2020"},{"key":"ref49:DBLP:journals\/tches\/MasureDP20","doi-asserted-by":"publisher","first-page":"348","DOI":"10.13154\/TCHES.V2020.I1.348-375","article-title":"A Comprehensive Study of Deep Learning for Side-Channel\n  Analysis","volume":"2020","author":"Lo\u00efc Masure","year":"2020","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"ref50:DBLP:conf\/ches\/PoussierSG16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-662-53140-2_4","article-title":"Simple Key Enumeration (and Rank Estimation) Using\n  Histograms: An Integrated Approach","volume":"9813","author":"Romain Poussier","year":"2016"},{"key":"ref51:DBLP:journals\/jossw\/CassiersB23","doi-asserted-by":"publisher","first-page":"5196","DOI":"10.21105\/JOSS.05196","article-title":"SCALib: A Side-Channel Analysis Library","volume":"8","author":"Ga\u00ebtan Cassiers","year":"2023","journal-title":"J. Open Source Softw."},{"key":"ref52:DBLP:journals\/tches\/CassiersDSU23","doi-asserted-by":"publisher","first-page":"270","DOI":"10.46586\/TCHES.V2023.I3.270-293","article-title":"Efficient Regression-Based Linear Discriminant Analysis for\n  Side-Channel Security Evaluations Towards Analytical Attacks against 32-bit\n  Implementations","volume":"2023","author":"Ga\u00ebtan Cassiers","year":"2023","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"ref53:DBLP:conf\/latincrypt\/PesslP19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/978-3-030-30530-7_7","article-title":"More Practical Single-Trace Attacks on the Number Theoretic\n  Transform","volume":"11774","author":"Peter Pessl","year":"2019"},{"key":"ref54:DBLP:conf\/ches\/ChariRR02","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-36400-5_3","article-title":"Template Attacks","volume":"2523","author":"Suresh Chari","year":"2002"},{"key":"ref55:DBLP:books\/daglib\/0023091","isbn-type":"print","volume-title":"Probabilistic Graphical Models - Principles and Techniques","author":"Daphne Koller","year":"2009","ISBN":"https:\/\/id.crossref.org\/isbn\/9780262013192"},{"key":"ref56:DBLP:journals\/tches\/MasureCHS23","doi-asserted-by":"publisher","first-page":"522","DOI":"10.46586\/TCHES.V2023.I3.522-569","article-title":"Information Bounds and Convergence Rates for Side-Channel\n  Security Evaluators","volume":"2023","author":"Lo\u00efc Masure","year":"2023","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"ref57:DBLP:journals\/tsp\/SuW15","doi-asserted-by":"publisher","first-page":"1144","DOI":"10.1109\/TSP.2015.2389755","article-title":"On Convergence Conditions of Gaussian Belief Propagation","volume":"63","author":"Qinliang Su","year":"2015","journal-title":"IEEE Trans. Signal Process."}],"container-title":["IACR Communications in Cryptology"],"original-title":[],"language":"en","deposited":{"date-parts":[[2025,1,13]],"date-time":"2025-01-13T17:11:27Z","timestamp":1736788287000},"score":1,"resource":{"primary":{"URL":"https:\/\/cic.iacr.org\/p\/1\/4\/15"}},"subtitle":["An Analysis and Empirical Study of the Inference Problem"],"short-title":[],"issued":{"date-parts":[[2025,1,13]]},"references-count":57,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2025,1,13]]}},"URL":"https:\/\/doi.org\/10.62056\/ayl8ksdja","archive":["Internet Archive","Internet Archive"],"relation":{},"ISSN":["3006-5496"],"issn-type":[{"type":"electronic","value":"3006-5496"}],"subject":[],"published":{"date-parts":[[2025,1,13]]},"assertion":[{"value":"2024-10-09","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-03","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"cc1-4-26"}}