{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:16:33Z","timestamp":1730214993622,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,8]]},"DOI":"10.1109\/dsd.2011.91","type":"proceedings-article","created":{"date-parts":[[2011,10,13]],"date-time":"2011-10-13T16:43:29Z","timestamp":1318524209000},"page":"674-681","source":"Crossref","is-referenced-by-count":9,"title":["How a Symmetry Metric Assists Side-Channel Evaluation - A Novel Model Verification Method for Power Analysis"],"prefix":"10.1109","author":[{"given":"Annelie","family":"Heuser","sequence":"first","affiliation":[{"name":"Integrated Circuits & Syst. Lab., Tech. Univ. Darmstadt, Darmstadt, Germany"}]},{"given":"Michael","family":"Kasper","sequence":"additional","affiliation":[{"name":"Secure Inf. Technol. (SIT), Fraunhofer Inst., Darmstadt, Germany"}]},{"given":"Werner","family":"Schindler","sequence":"additional","affiliation":[{"name":"Bundesamt fur Sicherheit in der Informationstechnik (BSI), Bonn, Germany"}]},{"given":"Marc","family":"Stottinger","sequence":"additional","affiliation":[{"name":"Integrated Circuits & Syst. Lab., Tech. Univ. Darmstadt, Darmstadt, Germany"}]}],"member":"263","reference":[{"year":"2001","key":"ref10","article-title":"Advanced Encryption Standard (AES)"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/978-3-540-30564-4_5","article-title":"Provably secure masking of aes","volume":"3357","author":"blamer","year":"2004","journal-title":"Proc Selected Areas in Cryptography (SAC 2001)"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1007\/11502760_28","article-title":"A side-channel analysis resistant description of the aes s-box","volume":"3557","author":"oswald","year":"2005","journal-title":"Fast Software Encryption sere Lecture Notes in Computer Science"},{"year":"0","key":"ref13"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1007\/978-3-642-01001-9_26","article-title":"A unified framework for the analysis of side-channel key recovery attacks","volume":"5479","author":"standaert","year":"2009","journal-title":"Advances in Cryptology - EUROCRYPT 2009 sere Lecture Notes in Computer Science"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1007\/11545262_3","article-title":"A stochastic model for differential side channel cryptanalysis","volume":"3659","author":"schindler","year":"2005","journal-title":"CHES sere Lecture Notes in Computer Science"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1007\/978-3-540-85053-3_27","article-title":"Mutual information analysis","volume":"5154","author":"gierlichs","year":"2008","journal-title":"CHES sere Lecture Notes in Computer Science"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74835-9_30"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/11894063_2","article-title":"Templates vs. stochastic methods","volume":"4249","author":"gierlichs","year":"2006","journal-title":"CHES sere Lecture Notes in Computer Science"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01957-9_30"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1515\/JMC.2008.013"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","article-title":"Correlation power analysis with a leakage model","volume":"3156","author":"brier","year":"2004","journal-title":"CHES sere Lecture Notes in Computer Science"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","article-title":"Differential power anal-ysis","volume":"1666","author":"kocher","year":"1999","journal-title":"CR YPTO sere Lecture Notes in Computer Science"},{"key":"ref9","first-page":"146","article-title":"A stochastic method for security evaluation of cryptographic fpga im-plementations","author":"kasper","year":"2010","journal-title":"IEEE International Conference on Field-Programmable Technology (FPT)"}],"event":{"name":"2011 14th Euromicro Conference on Digital System Design (DSD)","start":{"date-parts":[[2011,8,31]]},"location":"Oulu, Finland","end":{"date-parts":[[2011,9,2]]}},"container-title":["2011 14th Euromicro Conference on Digital System Design"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6036122\/6037383\/06037475.pdf?arnumber=6037475","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T02:54:10Z","timestamp":1623120850000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6037475\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/dsd.2011.91","relation":{},"subject":[],"published":{"date-parts":[[2011,8]]}}}