You Cannot Hide behind the Mask: Power Analysis on a Provably Secure ::::S::::-Box Implementation

J. Pan, J. I. den Hartog, Jiqiang Lu. You Cannot Hide behind the Mask: Power Analysis on a Provably Secure ::::S::::-Box Implementation. In Heung-Youl Youm, Moti Yung, editors, Information Security Applications, 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers. Volume 5932 of Lecture Notes in Computer Science, pages 178-192, Springer, 2009. [doi]

@inproceedings{PanHL09-1,
  title = {You Cannot Hide behind the Mask: Power Analysis on a Provably Secure ::::S::::-Box Implementation},
  author = {J. Pan and J. I. den Hartog and Jiqiang Lu},
  year = {2009},
  doi = {10.1007/978-3-642-10838-9_14},
  url = {http://dx.doi.org/10.1007/978-3-642-10838-9_14},
  tags = {analysis},
  researchr = {https://researchr.org/publication/PanHL09-1},
  cites = {0},
  citedby = {0},
  pages = {178-192},
  booktitle = {Information Security Applications, 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  editor = {Heung-Youl Youm and Moti Yung},
  volume = {5932},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {978-3-642-10837-2},
}