A New Type of Countermeasure against DPA in Multi-Sbox of Block Cipher
The Internet of Things (IoT) provides the network for physical devices, like home appliances, embedded with electronics, sensors, and software, to share and exchange data. With its fast development, security of IoT has become a crucial problem. Among the methods of attack, side-channel attack has pr...
        Saved in:
      
    
          | Published in | Wireless communications and mobile computing Vol. 2018; no. 2018; pp. 1 - 11 | 
|---|---|
| Main Authors | , | 
| Format | Journal Article | 
| Language | English | 
| Published | 
        Cairo, Egypt
          Hindawi Publishing Corporation
    
        01.01.2018
     Hindawi John Wiley & Sons, Inc  | 
| Subjects | |
| Online Access | Get full text | 
| ISSN | 1530-8669 1530-8677 1530-8677  | 
| DOI | 10.1155/2018/5945312 | 
Cover
| Abstract | The Internet of Things (IoT) provides the network for physical devices, like home appliances, embedded with electronics, sensors, and software, to share and exchange data. With its fast development, security of IoT has become a crucial problem. Among the methods of attack, side-channel attack has proven to be an effective tool to compromise the security of different devices with improving techniques of data processing, like DPA and CPA. Meanwhile, many countermeasures have risen accordingly as well, such as masking and noise addition. However, their common deficiency was that every single countermeasure might not be able to protect the key information completely after statistical analysis. Sensitive information will be disclosed during differential power analysis of Sbox, since it is the only nonlinear component in block cipher. Thus, how to protect Sbox effectively was the highlight of researches. Based on Sbox-reuse concept proposed by Bilgin, this paper put forward a new type of a countermeasure scheme against DPA in multi-Sbox of block cipher. We first converted the multi-Sbox into 4 × 4 permutations and then reused permutation with the algebraic degree of more than one so as to turn it into a special reusable Sbox and then numbered 4 × 4 permutation input. Finally, we made these inputs of permutations completely random by masking. Since it was necessary to make the collected power consumption curve subject to alignment process in DPA by chosen-plaintext attack, this scheme combined the concept from DPA countermeasures of masking and noise addition. After the experiment with the proposed implementation, successful prevention of the attacker from accurately aligning the power consumption curve of the target Sbox has been proven, and the level of security has been improved by adding more random noise to protect key information and decrease the accuracy of statistical analysis. | 
    
|---|---|
| AbstractList | The Internet of Things (IoT) provides the network for physical devices, like home appliances, embedded with electronics, sensors, and software, to share and exchange data. With its fast development, security of IoT has become a crucial problem. Among the methods of attack, side-channel attack has proven to be an effective tool to compromise the security of different devices with improving techniques of data processing, like DPA and CPA. Meanwhile, many countermeasures have risen accordingly as well, such as masking and noise addition. However, their common deficiency was that every single countermeasure might not be able to protect the key information completely after statistical analysis. Sensitive information will be disclosed during differential power analysis of Sbox, since it is the only nonlinear component in block cipher. Thus, how to protect Sbox effectively was the highlight of researches. Based on Sbox-reuse concept proposed by Bilgin, this paper put forward a new type of a countermeasure scheme against DPA in multi-Sbox of block cipher. We first converted the multi-Sbox into 4 × 4 permutations and then reused permutation with the algebraic degree of more than one so as to turn it into a special reusable Sbox and then numbered 4 × 4 permutation input. Finally, we made these inputs of permutations completely random by masking. Since it was necessary to make the collected power consumption curve subject to alignment process in DPA by chosen-plaintext attack, this scheme combined the concept from DPA countermeasures of masking and noise addition. After the experiment with the proposed implementation, successful prevention of the attacker from accurately aligning the power consumption curve of the target Sbox has been proven, and the level of security has been improved by adding more random noise to protect key information and decrease the accuracy of statistical analysis. | 
    
| Author | Zhang, ShuaiWei Zhong, Weidong  | 
    
| Author_xml | – sequence: 1 fullname: Zhang, ShuaiWei – sequence: 2 fullname: Zhong, Weidong  | 
    
| BookMark | eNqF0M1LwzAYBvAgE9ymN88S8Kh1-WiS9jirU2F-gPNc0ix1mV1S05a5_96ODgVBdnrfw-99eXgGoGed1QCcYnSFMWMjgnA0YnHIKCYHoI8ZRUHEhej97Dw-AoOqWiKEKCK4DyZj-KTXcLYpNXQ5TFxja-1XWlaN11C-S2OrGt68jKGx8LEpahO8Zu5ra68Lpz5gYsqF9sfgMJdFpU92cwjeJrez5D6YPt89JONpoChHdSCiMA65oHpOmeIsi4XgTLM2No0iRjKkaE5jJeMwQyTCguAICU1jqRhRQmk6BEH3t7Gl3KxlUaSlNyvpNylG6baEdFtCuiuh9eedL737bHRVp0vXeNtGTEmIBCci5lGrSKeUd1XldZ4qU8vaOFt7aYr_Xl_-OdqT5KLjC2Pncm326bNO69boXP5qgjluwTc8xo5P | 
    
| CitedBy_id | crossref_primary_10_3390_app112110314 | 
    
| Cites_doi | 10.1007/978-3-540-25937-4_21 10.1007/s13389-011-0023-x 10.1007/11545262_12 10.1007/978-3-662-45608-8_18 10.1109/MDT.2007.186 10.1007/3-540-44709-1_21 10.1109/TC.2016.2614504 10.1109/TCAD.2015.2419623 10.1109/JIOT.2016.2584538 10.1007/978-3-319-66787-4_3 10.1007/978-3-540-30574-3_24 10.1007/3-540-68697-5_9 10.1109/DATE.2004.1268856 10.1016/j.vlsi.2005.12.013 10.1109/TST.2016.7442503 10.13164/re.2017.0890 10.1007/3-540-36400-5_3 10.1109/MCOM.2011.6069711 10.1049/el.2017.1460 10.1109/APCCAS.2016.7804081 10.1007/3-540-44709-1_26 10.1007/11935308_38 10.1109/TIFS.2017.2787985 10.1007/978-3-662-44709-3_9 10.1007/s11276-014-0761-7 10.1007/978-3-319-31271-2_17 10.1016/j.comnet.2014.11.008 10.1007/978-3-540-45238-6_7 10.1049/iet-ifs.2015.0574 10.1007/3-540-48405-1_25  | 
    
| ContentType | Journal Article | 
    
| Copyright | Copyright © 2018 Shuaiwei Zhang and Weidong Zhong. Copyright © 2018 Shuaiwei Zhang and Weidong Zhong. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.  | 
    
| Copyright_xml | – notice: Copyright © 2018 Shuaiwei Zhang and Weidong Zhong. – notice: Copyright © 2018 Shuaiwei Zhang and Weidong Zhong. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.  | 
    
| DBID | ADJCN AHFXO RHU RHW RHX AAYXX CITATION 7SC 7SP 7XB 8FD 8FE 8FG ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- L7M L~C L~D M0N P5Z P62 PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS Q9U ADTOC UNPAY  | 
    
| DOI | 10.1155/2018/5945312 | 
    
| DatabaseName | الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete Hindawi Publishing Complete Hindawi Publishing Subscription Journals Hindawi Publishing Open Access CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts ProQuest Central (purchase pre-March 2016) Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Advanced Technologies & Aerospace Database ProQuest Central Essentials ProQuest Central Technology Collection ProQuest One Community College ProQuest Central ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection ProQuest Computer Science Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts  Academic Computer and Information Systems Abstracts Professional Computing Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China ProQuest Central Basic Unpaywall for CDI: Periodical Content Unpaywall  | 
    
| DatabaseTitle | CrossRef Publicly Available Content Database Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Central (New) Advanced Technologies Database with Aerospace Advanced Technologies & Aerospace Collection ProQuest Computing ProQuest Central Basic ProQuest One Academic Eastern Edition Electronics & Communications Abstracts ProQuest Technology Collection ProQuest SciTech Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New)  | 
    
| DatabaseTitleList | CrossRef Publicly Available Content Database  | 
    
| Database_xml | – sequence: 1 dbid: RHX name: Hindawi Publishing Open Access url: http://www.hindawi.com/journals/ sourceTypes: Publisher – sequence: 2 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository – sequence: 3 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database  | 
    
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Engineering | 
    
| EISSN | 1530-8677 | 
    
| Editor | Liu, Ximeng | 
    
| Editor_xml | – sequence: 1 givenname: Ximeng surname: Liu fullname: Liu, Ximeng  | 
    
| EndPage | 11 | 
    
| ExternalDocumentID | 10.1155/2018/5945312 10_1155_2018_5945312 1216112  | 
    
| GrantInformation_xml | – fundername: National Cryptography Development Fund of China grantid: MMJJ20170112 – fundername: National Natural Science Foundation of China grantid: U1636114; 61772550; 61572521 – fundername: National Key R&D Program of China grantid: 2017YFB0802000  | 
    
| GroupedDBID | .3N .DC .GA .Y3 05W 0R~ 123 1L6 24P 31~ 3SF 3WU 4.4 4ZD 50Y 50Z 52M 52O 52T 52U 52W 5VS 66C 6OB 702 7PT 8-0 8-1 8-3 8-4 8-5 8UM 930 A03 AAESR AAEVG AAFWJ AAMMB AANHP AAONW AAZKR ABIJN ABPVW ACBWZ ACCMX ACGFO ACRPL ACXQS ACYXJ ADBBV ADIZJ ADJCN ADNMO AEFGJ AEIMD AENEX AEUCX AFBPY AFKRA AFZJQ AGQPQ AGXDD AHFXO AIAGR AIDQK AIDYY AJXKR ALAGY ALMA_UNASSIGNED_HOLDINGS AMBMR ARAPS ASPBG ATUGU AVWKF AZBYB AZFZN AZQEC AZVAB BAFTC BCNDV BDRZF BENPR BFHJK BGLVJ BHBCM BNHUX BROTX BRXPI CCPQU CS3 D-E D-F DPXWK DR2 DU5 DWQXO EBS EJD F00 F01 F04 F21 FEDTE G-S G.N GNP GNUQQ GODZA H.T H.X H13 HCIFZ HF~ HVGLF HZ~ ITG ITH IX1 JPC K7- KQQ LAW LH4 LITHE LP6 LP7 LW6 MK4 MY~ N04 N05 NF~ O9- OIG OK1 P2P P2X P4D PHGZM PHGZT PIMPY PQGLB PUEGO Q.N QB0 QRW R.K ROL RX1 RYL SUPJJ UB1 W8V W99 WBKPD WYUIH XPP XV2 ~IA ~WT .4S 1OC 33P AAJEY AEUQT ARCSS EDO GROUPED_DOAJ I-F IAO ITC M0N O66 P2W RHU RHW RHX RWI TUS WIH WLBEL AAYXX CITATION 7SC 7SP 7XB 8FD 8FE 8FG ABUWG JQ2 L7M L~C L~D P62 PKEHL PQEST PQQKQ PQUKI PRINS Q9U ADTOC UNPAY  | 
    
| ID | FETCH-LOGICAL-c360t-78494673ed35c65b97765e501838852b0c3f39ca94b0281721807e39ac52c7ce3 | 
    
| IEDL.DBID | UNPAY | 
    
| ISSN | 1530-8669 1530-8677  | 
    
| IngestDate | Tue Aug 19 19:12:00 EDT 2025 Fri Jul 25 09:28:45 EDT 2025 Thu Apr 24 23:02:03 EDT 2025 Wed Oct 01 01:08:50 EDT 2025 Sun Jun 02 18:54:49 EDT 2024 Thu Sep 25 15:07:38 EDT 2025  | 
    
| IsDoiOpenAccess | true | 
    
| IsOpenAccess | true | 
    
| IsPeerReviewed | true | 
    
| IsScholarly | true | 
    
| Issue | 2018 | 
    
| Language | English | 
    
| License | This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. cc-by  | 
    
| LinkModel | DirectLink | 
    
| MergedId | FETCHMERGED-LOGICAL-c360t-78494673ed35c65b97765e501838852b0c3f39ca94b0281721807e39ac52c7ce3 | 
    
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14  | 
    
| ORCID | 0000-0003-3830-3712 | 
    
| OpenAccessLink | https://proxy.k.utb.cz/login?url=http://downloads.hindawi.com/journals/wcmc/2018/5945312.pdf | 
    
| PQID | 2407627968 | 
    
| PQPubID | 2034344 | 
    
| PageCount | 11 | 
    
| ParticipantIDs | unpaywall_primary_10_1155_2018_5945312 proquest_journals_2407627968 crossref_citationtrail_10_1155_2018_5945312 crossref_primary_10_1155_2018_5945312 hindawi_primary_10_1155_2018_5945312 emarefa_primary_1216112  | 
    
| ProviderPackageCode | CITATION AAYXX  | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 2018-01-01 | 
    
| PublicationDateYYYYMMDD | 2018-01-01 | 
    
| PublicationDate_xml | – month: 01 year: 2018 text: 2018-01-01 day: 01  | 
    
| PublicationDecade | 2010 | 
    
| PublicationPlace | Cairo, Egypt | 
    
| PublicationPlace_xml | – name: Cairo, Egypt – name: Oxford  | 
    
| PublicationTitle | Wireless communications and mobile computing | 
    
| PublicationYear | 2018 | 
    
| Publisher | Hindawi Publishing Corporation Hindawi John Wiley & Sons, Inc  | 
    
| Publisher_xml | – name: Hindawi Publishing Corporation – name: Hindawi – name: John Wiley & Sons, Inc  | 
    
| References | e_1_2_10_22_2 e_1_2_10_23_2 e_1_2_10_20_2 e_1_2_10_21_2 Tang S. (e_1_2_10_24_2) 2017 e_1_2_10_19_2 e_1_2_10_1_2 e_1_2_10_3_2 e_1_2_10_17_2 e_1_2_10_2_2 e_1_2_10_5_2 e_1_2_10_4_2 e_1_2_10_16_2 e_1_2_10_7_2 e_1_2_10_13_2 e_1_2_10_6_2 e_1_2_10_14_2 e_1_2_10_35_2 e_1_2_10_9_2 e_1_2_10_11_2 e_1_2_10_34_2 e_1_2_10_8_2 e_1_2_10_12_2 Zhang S. (e_1_2_10_18_2) 2016; 17 e_1_2_10_33_2 e_1_2_10_32_2 e_1_2_10_10_2 e_1_2_10_31_2 e_1_2_10_30_2 Lerman L. (e_1_2_10_15_2) 2017 e_1_2_10_28_2 e_1_2_10_29_2 e_1_2_10_26_2 e_1_2_10_27_2 e_1_2_10_25_2  | 
    
| References_xml | – ident: e_1_2_10_26_2 doi: 10.1007/978-3-540-25937-4_21 – ident: e_1_2_10_19_2 doi: 10.1007/s13389-011-0023-x – ident: e_1_2_10_16_2 doi: 10.1007/11545262_12 – ident: e_1_2_10_33_2 doi: 10.1007/978-3-662-45608-8_18 – ident: e_1_2_10_13_2 doi: 10.1109/MDT.2007.186 – ident: e_1_2_10_10_2 doi: 10.1007/3-540-44709-1_21 – ident: e_1_2_10_32_2 doi: 10.1109/TC.2016.2614504 – ident: e_1_2_10_31_2 doi: 10.1109/TCAD.2015.2419623 – ident: e_1_2_10_4_2 doi: 10.1109/JIOT.2016.2584538 – ident: e_1_2_10_20_2 doi: 10.1007/978-3-319-66787-4_3 – ident: e_1_2_10_17_2 doi: 10.1007/978-3-540-30574-3_24 – ident: e_1_2_10_6_2 doi: 10.1007/3-540-68697-5_9 – ident: e_1_2_10_29_2 doi: 10.1109/DATE.2004.1268856 – ident: e_1_2_10_11_2 doi: 10.1016/j.vlsi.2005.12.013 – ident: e_1_2_10_35_2 doi: 10.1109/TST.2016.7442503 – ident: e_1_2_10_21_2 doi: 10.13164/re.2017.0890 – start-page: 1 year: 2017 ident: e_1_2_10_15_2 article-title: Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version publication-title: Journal of Cryptographic Engineering – year: 2017 ident: e_1_2_10_24_2 article-title: Power analysis attacks against FPGA implementation of KLEIN publication-title: Security and Communication Networks – ident: e_1_2_10_14_2 doi: 10.1007/3-540-36400-5_3 – ident: e_1_2_10_1_2 doi: 10.1109/MCOM.2011.6069711 – ident: e_1_2_10_23_2 doi: 10.1049/el.2017.1460 – volume: 17 start-page: 157 year: 2016 ident: e_1_2_10_18_2 article-title: An improved combinational side-channel attack on S-box in block cipher publication-title: Journal of Internet Technology – ident: e_1_2_10_5_2 doi: 10.1109/APCCAS.2016.7804081 – ident: e_1_2_10_25_2 doi: 10.1007/3-540-44709-1_26 – ident: e_1_2_10_30_2 doi: 10.1007/11935308_38 – ident: e_1_2_10_8_2 doi: 10.1109/TIFS.2017.2787985 – ident: e_1_2_10_27_2 doi: 10.1007/978-3-662-44709-3_9 – ident: e_1_2_10_28_2 – ident: e_1_2_10_2_2 doi: 10.1007/s11276-014-0761-7 – ident: e_1_2_10_9_2 doi: 10.1007/3-540-44709-1_26 – ident: e_1_2_10_34_2 doi: 10.1007/978-3-319-31271-2_17 – ident: e_1_2_10_3_2 doi: 10.1016/j.comnet.2014.11.008 – ident: e_1_2_10_12_2 doi: 10.1007/978-3-540-45238-6_7 – ident: e_1_2_10_22_2 doi: 10.1049/iet-ifs.2015.0574 – ident: e_1_2_10_7_2 doi: 10.1007/3-540-48405-1_25  | 
    
| SSID | ssj0003021 | 
    
| Score | 2.1499941 | 
    
| Snippet | The Internet of Things (IoT) provides the network for physical devices, like home appliances, embedded with electronics, sensors, and software, to share and... | 
    
| SourceID | unpaywall proquest crossref hindawi emarefa  | 
    
| SourceType | Open Access Repository Aggregation Database Enrichment Source Index Database Publisher  | 
    
| StartPage | 1 | 
    
| SubjectTerms | Algorithms Costs Data processing Electronic devices Encryption Household appliances Internet of Things Masking Permutations Power consumption Power management Random noise Statistical analysis  | 
    
| SummonAdditionalLinks | – databaseName: Hindawi Publishing Open Access dbid: RHX link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEF60IOpBfFutsgf1IsGYfWT3WKuleBBRC72FzWajxZqKrVT_vTPttlrFxy0hkw3M7M583z6-ELKfqjADWmIDk2ZxwDMe4fpuHhidKS14jFP9uNviUjaa_KIlWl4kqfd9CR-qHdDzE3UsNIfeArl2VkncuXXdaE0SLgsjL4saBkpKPd7f_uXdqcoz5x4NXEA5mrtH8jtoT0HM-ZfiybwNTKfzqdrUl8mSh4m0OorrCplxxSpZ_CQeuEbqVQoZiiKRpN2c4uFyTLOjOT9q7oDy9_r07KpK2wUdnrMNbtLuK9qeQgV7oLU2Sgqsk2b9_LbWCPxfEQLLZNgPYsU1ZDfmMiasFCkAOCkc6vIxpUSUhpblTFujeQrYARmeCmPHtLEisrF1bIOUim7htgjFZTqhrGEqMtzCYGR5bjlQHIB1TjteJkdjjyXWS4bjnys6yZA6CJGgfxPv3zI5mFg_jaQyfrDb9M7_MIsAeOKTfR-MPxqojCOV-BHXS5CZyijWUpXJ4SR6v7az_b_P7ZAFvB3Nu1RIqf_84nYBifTTvWE_fAcNwc2a priority: 102 providerName: Hindawi Publishing – databaseName: ProQuest Central dbid: BENPR link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwhV1LTxsxEB5BIgQcqvIohKaVD8AFWVn5sWsfUJUEoqiHCNEicVt5vV4aNd2kJVHg3-NJvAEOhdtKO_JhPJ75Zuz5BuA4U1Hu0xJLTZYnVOSC4f1uQY3OlZYiwVI_vrYYxP0b8f1W3q7BoOqFwWeVlU9cOOp8bLFG3sLMI2aJjtW3yV-KU6PwdrUaoWHCaIX8fEExtg51hsxYNah3LgdX1yvfzCMWGFQjquJYV0_hpWz5SKhaUgtvlOxVkNpwf4z_8JFr4xfmyfPhKzS6OSsn5nFuRqMXgan3ET4EREnaSxPYgTVX7sL2C57BPei1iXdmBHNOMi4I9qGjR16WB4m5M0MPEsnFVZsMS7JoyaU_svEDynZ8sPtNukNkH9iHm97lz26fhgEK1PI4mtJECe0dIXc5lzaWmcd6sXRI4ceVkiyLLC-4tkaLzMMMTAZVlDiujZXMJtbxT1Arx6U7BII3elJZwxUzwvpzy4vCCp8NeQTotBMNOKs0ltrALo5DLkbpIsuQMkX9pkG_DThZSU-WrBr_kTsIyn8WYx6j4p_jsBnvLNCsdioNh_M-fTalBpyudu_NdY7eXuczbKH0sjTThNr038x98WBlmn0NFvgEfP_ebA priority: 102 providerName: ProQuest  | 
    
| Title | A New Type of Countermeasure against DPA in Multi-Sbox of Block Cipher | 
    
| URI | https://search.emarefa.net/detail/BIM-1216112 https://dx.doi.org/10.1155/2018/5945312 https://www.proquest.com/docview/2407627968 http://downloads.hindawi.com/journals/wcmc/2018/5945312.pdf  | 
    
| UnpaywallVersion | publishedVersion | 
    
| Volume | 2018 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 1530-8677 dateEnd: 20250131 omitProxy: true ssIdentifier: ssj0003021 issn: 1530-8677 databaseCode: BENPR dateStart: 20170101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVWIB databaseName: Wiley Online Library - Core collection (SURFmarket) issn: 1530-8677 databaseCode: DR2 dateStart: 20010101 customDbUrl: isFulltext: true eissn: 1530-8677 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0003021 providerName: Wiley-Blackwell – providerCode: PRVWIB databaseName: Wiley Online Library Open Access customDbUrl: eissn: 1530-8677 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0003021 issn: 1530-8677 databaseCode: 24P dateStart: 20170101 isFulltext: true titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html providerName: Wiley-Blackwell  | 
    
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lj9MwEB7ttloBB54LFJbKh4ULSjfEdmIfu49ScaiqQqUiIUWO40C13XTFtipw4ifwG_klzDTOshXiIS6Ro4ysxDOZ-T4_ZgD2MxXmSEtsYLI8CUQuIlrfLQKjc6WlSGiqn3ZbDOL-WLyayMkW1GXucsoQPzf5RecDUdLVdO2s_bBeHKzsmUW6_kIdSC3QepAU5sU2NGOJQLwBzfFg2H1bZUgNAxWvC9r5dpLU296l3OhiIyDtuDODDYxSO_4FNpDntWV5bj6vzGx2JQj1bsG7-ihPtffktLNcZB375dfMjv_zfbfhpgenrFtZ0x3YcuVduHElZeE96HcZ-kVG9JXNC0ZH2sm5VzONzLw3U8Sb7HjYZdOSrU_3fv_67XU2_0TShxg5T9nRlFIZ7MK4d_LmqB_4agyB5XG4CBIlNHpV7nIubSwzBI6xdJQPkCsloyy0vODaGi0yxCzELFWYOK6NlZFNrOP3oVHOS_cQGC0PSmUNV5ERFp0ALworkFohnHTaiRY8r1WSWp-qnCpmzNI1ZZEypTFK_Ri14Oml9HmVouM3cg-8dn-KRQh46cm-V8dfOtirTSGtVZYSI46jRMeqBc8uzeOP_Tz6V8HHcJ1uqxmfPWgsPi7dE8RAi6wN26r3sg3Nw5PBcIR3x6MIr6P-pO3_gh8BS__q | 
    
| linkProvider | Unpaywall | 
    
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9NAEB6VVlXhgHgTKLCHlgtaxdqHvXuoUPqIUlqiClqpN7NeryEiOIGmCv1z_DZmknXaHiin3ix5PIfZ9Xzzze7MAGwUJimRlnjuijLjqlSCzncr7mxprFYZpfrptkU_7Z2oD6f6dAn-NLUwdK2y8YkzR12OPOXI28Q8UpHZ1Lwf_-Q0NYpOV5sRGi6OVii3Zi3GYmHHQbiYIoU729rfxfXeFKK7d7zT43HKAPcyTSY8M4rGzMtQSu1TXWBAlOpAfe6kMVoUiZeVtN5ZVSAWE2MySRakdV4Ln_kgUe8dWFFSWSR_K9t7_aNPCyyQiYgdWxNu0tQ2V--1biPymra2Cn8CcQ0UV8MPhw-IlKvfiJdPB9ei37Xzeuwupm44vAKE3QdwP0awrDPfcg9hKdSP4N6VvoaPodth6DwZcVw2qhjVvRMCzNORzH11AwxK2e5Rhw1qNisB5p-L0W-S3UZw_c52BtTt4Amc3Iopn8JyParDc2B0gqiNd9IIpzz6CVlVXiH7wogz2KBa8K6xWO5jN3MaqjHMZ6xG65zsm0f7tmBzIT2ed_H4h9yzaPxLMYExMb3ZiIvxHwXrzUrl0Rmc5ZdbtwVvF6t3o54XN-t5A2u944-H-eF-_-Al3KUv52mhdVie_DoPrzBQmhSv425k8OW2f4C_PhkYxw | 
    
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LbxNBDLZKUXkcEG8CBebQckGjrOaxO3NAKDQsLUVVJajU23Z2dhYiwibQVKF_jV-HnZ1N2wPl1FukeH2wLdufxw-AjdIkFcISz11ZZVxVStD7bs2drYzVKqNSP3Vb7KXbB-rjoT5cgT_dLAy1VXY-ceGoq4mnGnmfkEcqMpuafh3bIvaH-dvpT04XpOiltTun0ZrIbjidI3w7frMzRF1vCpG__7K1zeOFAe5lmsx4ZhSdmJehktqnusRkKNWBdtxJY7QoEy9rab2zqsQ4TGjJJFmQ1nktfOaDRL7X4HpGW9xpSj3_sIwCMhFxV2vCTZrarule6z7GXNPXVqH5iwvhcC38cPgDY-TaN0Lk89GFvPfmSTN1p3M3Hp8LgflduBNzVzZoje0erITmPtw-t9HwAeQDhm6TEbplk5rRxDv5_rYQydxXN8J0lA33B2zUsMXwL_9cTn4T7TsMq9_Z1oj2HDyEgysR5CNYbSZNeAKM3g618U4a4ZRHDyHr2ivEXZhrBhtUD153Eit83GNO5zTGxQLPaF2QfIso3x5sLqmn7f6Of9A9jsI_IxOYDdM_G1EZ_2Gw3mmqiG7guDgz2h68WmrvUj5PL-fzEm6g2RefdvZ2n8Et-rCtB63D6uzXSXiOGdKsfLEwRQZHV237fwFeKhZh | 
    
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1NT9wwEB3RRQg4UCiULqXIB-gFZUljO7GPWyha9YCQYCUqVYocx4EVSxaVXS1w6k_ob-wv6czGAVZVW9Sbo4ysxDMav-ePNwDbmQpzpCU2MFmeBCIXEe3vFoHRudJSJLTUT6ctjuJOV3w-k2czUJe5y0khfmDym9YFUdJxb5Ks_bDe7I3tlUW6_kHtSS0wepAU5sULmI0lAvEGzHaPjttfKoXUMFDxpKCdbydJfexdyqkupiakOXdlsIGz1Jz_gCnkOT8qr83d2PT7Tyahw5fwtb7KU509uWyNhlnL3v-u7Pg__7cMSx6csnYVTSsw48pXsPhEsnAVOm2GeZERfWWDgtGVdkru1UojM-emh3iTHRy3Wa9kk9u9P7__OMkGt2T9EWfOS7bfIymDNegefjrd7wS-GkNgeRwOg0QJjVmVu5xLG8sMgWMsHekBcqVklIWWF1xbo0WGmIWYpQoTx7WxMrKJdfw1NMpB6d4Ao-1BqazhKjLCYhLgRWEFUiuEk0470YTd2iWp9VLlVDGjn04oi5QpjVHqx6gJOw_W15VExx_s1r13H80iBLz0Ztu74x8dbNahkNYuS4kRx1GiY9WE9w_h8dd-Np5r-BYW6LFa8dmExvDbyL1DDDTMtnys_wJHcPtu | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+New+Type+of+Countermeasure+against+DPA+in+Multi-Sbox+of+Block+Cipher&rft.jtitle=Wireless+communications+and+mobile+computing&rft.au=Zhang%2C+Shuaiwei&rft.au=Zhong%2C+Weidong&rft.date=2018-01-01&rft.pub=John+Wiley+%26+Sons%2C+Inc&rft.issn=1530-8669&rft.eissn=1530-8677&rft.volume=2018&rft_id=info:doi/10.1155%2F2018%2F5945312&rft.externalDBID=HAS_PDF_LINK | 
    
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1530-8669&client=summon | 
    
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1530-8669&client=summon | 
    
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1530-8669&client=summon |