{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T20:14:49Z","timestamp":1648844089756},"reference-count":30,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Fundamentals"],"published-print":{"date-parts":[[2013]]},"DOI":"10.1587\/transfun.e96.a.697","type":"journal-article","created":{"date-parts":[[2013,3,1]],"date-time":"2013-03-01T14:19:30Z","timestamp":1362147570000},"page":"697-704","source":"Crossref","is-referenced-by-count":1,"title":["Correlation Power Analysis and Countermeasure on the Stream Cipher Enocoro-128v2"],"prefix":"10.1587","volume":"E96.A","author":[{"given":"Shugo","family":"MIKAMI","sequence":"first","affiliation":[{"name":"Hitachi Yokohama Research Laboratory"}]},{"given":"Hirotaka","family":"YOSHIDA","sequence":"additional","affiliation":[{"name":"Hitachi Yokohama Research Laboratory"}]},{"given":"Dai","family":"WATANABE","sequence":"additional","affiliation":[{"name":"Hitachi Yokohama Research Laboratory"}]},{"given":"Kazuo","family":"SAKIYAMA","sequence":"additional","affiliation":[{"name":"University of Electro-Communications"}]}],"member":"532","reference":[{"key":"1","unstructured":"[1] The eSTREAM Project, available at http:\/\/www.ecrypt.eu.org\/stream\/"},{"key":"2","unstructured":"[2] M. Hell, T. Johansson, A. Maximov, and W. Meier, “A stream cipher proposal: Grain-128,” available at http:\/\/www.ecrypt.eu.org\/stream\/p3ciphers\/grain\/Grain128_p3.pdf"},{"key":"3","unstructured":"[3] M. Hell, T. Johansson, and W. Meier, “Grain — A stream cipher for constrained environments,” available at http:\/\/www.ecrypt.eu.org\/stream\/p3ciphers\/grain\/Grain_p3.pdf"},{"key":"4","unstructured":"[4] C.D. Cannière and B. Preneel, “TRIVIUM specifications,” available at http:\/\/www.ecrypt.eu.org\/stream\/p3ciphers\/trivium\/trivium_p3.pdf"},{"key":"5","unstructured":"[5] S. Babbage and M. Dodd, “The stream cipher MICKEY 2.0,” available at http:\/\/www.ecrypt.eu.org\/stream\/p3ciphers\/mickey\/mickey_p3.pdf"},{"key":"6","unstructured":"[6] S. Babbage and M. Dodd, “The stream cipher MICKEY-128 2.0,” available at http:\/\/www.ecrypt.eu.org\/stream\/p3ciphers\/mickey\/mickey128_p3.pdf"},{"key":"7","unstructured":"[7] Hitachi, Ltd., “Stream cipher enocoro,” available at http:\/\/www.hitachi.com\/rd\/yrl\/crypto\/enocoro\/index.html"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] B. den Boer, K. Lemke, and G. Wicke, “A DPA attack against the modular reduction within a CRT implementation of RSA,” CHES 2002, LNCS 2523, pp.228-243, 2003.","DOI":"10.1007\/3-540-36400-5_18"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] K. Chen, M. Henricksen, W. Millan, J. Fuller, L. Simpson, E. Dawson, H. Lee, and S. Moon, “Dragon: A fast word based stream cipher,” Symmetric Key Encryption Workshop, Workshop Record, ECRYPT Network of Excellence in Cryptography, 2005.","DOI":"10.1007\/11496618_5"},{"key":"10","unstructured":"[10] A. Biryukov, “A new 128-bit key stream cipher LEX,” Symmetric Key Encryption Workshop, Workshop Record, ECRYPT Network of Excellence in Cryptography, 2005."},{"key":"11","unstructured":"[11] E. Biham and J. Seberry, “Py: A fast and secure stream cipher,” Symmetric Key Encryption Workshop, Workshop Record, ECRYPT Network of Excellence in Cryptography, 2005."},{"key":"12","unstructured":"[12] L. An-Ping, “A new stream cipher: Dicing,” Symmetric Key Encryption Workshop, Workshop Record, ECRYPT Network of Excellence in Cryptography, 2005."},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] A. Biryukov, A. Shamir, and D. Wagner, “Real time cryptoanalysis of A5\/1 on a PC,” FSE 2000, LNCS 1978, pp.1-18, 2001.","DOI":"10.1007\/3-540-44706-7_1"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] Y. Lu and S. Vaudenay, “Cryptoanalysis of bluetooth keystream generator two-level E0,” ASIACRYPT 2004, LNCS 3329, pp.483-499, 2004.","DOI":"10.1007\/978-3-540-30539-2_34"},{"key":"15","unstructured":"[15] M. Boesgaard, T. Pedersen, M. Vesterager, and E. Zenner, “The rabbit stream cipher — Design and security analysis,” SASC 2004, pp.7-29, 2004."},{"key":"16","unstructured":"[16] T. Hisakado, Y. Tsunoo, H. Fukazawa, T. Shouji, S. Goto, and T. Ikenaga, “The reports of DPA against stream cipher on eSTREAM project,” SCIS2007, 2007."},{"key":"17","unstructured":"[17] D. Strobel, C. Paar, and M. Kasper, “Side channel analysis attacks on stream ciphers,” master thesis, 2009."},{"key":"18","unstructured":"[18] H. Zhao and S. Li, “Power analysis attacks on a hardware implementation of the stream cipher MICKEY,” master thesis, 2009."},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] J. Liu and D. Gu, “Correlation power analysis against stream cipher MICKEY v2,” Computational Intelligence and Security, 2010 International Conference on Computational Intelligence and Security, 2010.","DOI":"10.1109\/CIS.2010.75"},{"key":"20","doi-asserted-by":"crossref","unstructured":"[20] K. Bae, M. Ahn, H. Lee, J. Ha, and S. Moon, “Power analysis attack and countermeasure on the rabbit stream cipher (position paper),” SESS'11 Proc. 7th International Workshop on Software Engineering for Secure Systems, 2011.","DOI":"10.1145\/1988630.1988640"},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] K. Wu, H. Li, B. Peng, and F. Yu, “Correlation power analysis attack against synchronous stream ciphers,” The 9th International Conference for Young Computer Scientists, 2008.","DOI":"10.1109\/ICYCS.2008.8"},{"key":"22","doi-asserted-by":"crossref","unstructured":"[22] M. Henricksen, W.S. Yap, C.H. Yian, S. Kiyomoto, and T. Tanaka, “Side-channel analysis of the K2 stream cipher,” ACISP 2010, LNCS 6168, pp.53-73, 2010.","DOI":"10.1007\/978-3-642-14081-5_4"},{"key":"23","doi-asserted-by":"crossref","unstructured":"[23] W. Fischer, B.M. Gammel, O. Kniffler, and J. Velten, “Differential power analysis of stream ciphers,” CT-RSA 2007, LNCS 4377, pp.257-270, 2007.","DOI":"10.1007\/11967668_17"},{"key":"24","unstructured":"[24] Side-channel Attack Standard Evaluation Board (SASEBO-GII). Future information are available at http:\/\/www.morita-tech.co.jp\/SASEBO\/en\/board\/sasebo-g2.html"},{"key":"25","doi-asserted-by":"crossref","unstructured":"[25] P. Kocher, “Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems,” CRYPTO 96, LNCS 1109, pp.101-113, 1996.","DOI":"10.1007\/3-540-68697-5_9"},{"key":"26","doi-asserted-by":"crossref","unstructured":"[26] P. Kocher, J. Jaffe, and B. Jun, “Differential power analysis,” CRYPTO 99, LNCS 1666, pp.388-397, 1999.","DOI":"10.1007\/3-540-48405-1_25"},{"key":"27","doi-asserted-by":"crossref","unstructured":"[27] K. Gandolfi, C. Mourtel, and F. Oliver, “Electromagnetic analysis: Concrete results,” CHES 2001, LNCS 2162, pp.251-261, 2001.","DOI":"10.1007\/3-540-44709-1_21"},{"key":"28","unstructured":"[28] S. Mangard, E. Oswald, and T. Popp, Power Analysis Attacks Revealing the Secrets of Smart Cards, Springer, 2007."},{"key":"29","doi-asserted-by":"crossref","unstructured":"[29] E. Brier, C. Clavier, and F. Olivier, “Correlation power analysis with a leakage model,” CHES 2004, LNCS 3156, pp.16-29, 2004.","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"30","doi-asserted-by":"crossref","unstructured":"[30] S. Nikova, C. Rechberger, and V. Rijmen, “Threshold implementations against side-channel attacks and glitches,” The 8th International Conference on Information and Communications Security (ICICS2006), LNCS4307, pp.529-545, 2006.","DOI":"10.1007\/11935308_38"}],"container-title":["IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E96.A\/3\/E96.A_697\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T06:02:07Z","timestamp":1619416927000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E96.A\/3\/E96.A_697\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013]]}},"URL":"https:\/\/doi.org\/10.1587\/transfun.e96.a.697","relation":{},"ISSN":["0916-8508","1745-1337"],"issn-type":[{"value":"0916-8508","type":"print"},{"value":"1745-1337","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}