J. Pan, J. I. den Hartog, Jiqiang Lu. You Cannot Hide behind the Mask: Power Analysis on a Provably Secure ::::S::::-Box Implementation. In Heung-Youl Youm, Moti Yung, editors, Information Security Applications, 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers. Volume 5932 of Lecture Notes in Computer Science, pages 178-192, Springer, 2009. [doi]
@inproceedings{PanHL09-1, title = {You Cannot Hide behind the Mask: Power Analysis on a Provably Secure ::::S::::-Box Implementation}, author = {J. Pan and J. I. den Hartog and Jiqiang Lu}, year = {2009}, doi = {10.1007/978-3-642-10838-9_14}, url = {http://dx.doi.org/10.1007/978-3-642-10838-9_14}, tags = {analysis}, researchr = {https://researchr.org/publication/PanHL09-1}, cites = {0}, citedby = {0}, pages = {178-192}, booktitle = {Information Security Applications, 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, editor = {Heung-Youl Youm and Moti Yung}, volume = {5932}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-642-10837-2}, }