A New Type of Countermeasure against DPA in Multi-Sbox of Block Cipher

The Internet of Things (IoT) provides the network for physical devices, like home appliances, embedded with electronics, sensors, and software, to share and exchange data. With its fast development, security of IoT has become a crucial problem. Among the methods of attack, side-channel attack has pr...

Full description

Saved in:
Bibliographic Details
Published inWireless communications and mobile computing Vol. 2018; no. 2018; pp. 1 - 11
Main Authors Zhang, ShuaiWei, Zhong, Weidong
Format Journal Article
LanguageEnglish
Published Cairo, Egypt Hindawi Publishing Corporation 01.01.2018
Hindawi
John Wiley & Sons, Inc
Subjects
Online AccessGet full text
ISSN1530-8669
1530-8677
1530-8677
DOI10.1155/2018/5945312

Cover

Abstract The Internet of Things (IoT) provides the network for physical devices, like home appliances, embedded with electronics, sensors, and software, to share and exchange data. With its fast development, security of IoT has become a crucial problem. Among the methods of attack, side-channel attack has proven to be an effective tool to compromise the security of different devices with improving techniques of data processing, like DPA and CPA. Meanwhile, many countermeasures have risen accordingly as well, such as masking and noise addition. However, their common deficiency was that every single countermeasure might not be able to protect the key information completely after statistical analysis. Sensitive information will be disclosed during differential power analysis of Sbox, since it is the only nonlinear component in block cipher. Thus, how to protect Sbox effectively was the highlight of researches. Based on Sbox-reuse concept proposed by Bilgin, this paper put forward a new type of a countermeasure scheme against DPA in multi-Sbox of block cipher. We first converted the multi-Sbox into 4 × 4 permutations and then reused permutation with the algebraic degree of more than one so as to turn it into a special reusable Sbox and then numbered 4 × 4 permutation input. Finally, we made these inputs of permutations completely random by masking. Since it was necessary to make the collected power consumption curve subject to alignment process in DPA by chosen-plaintext attack, this scheme combined the concept from DPA countermeasures of masking and noise addition. After the experiment with the proposed implementation, successful prevention of the attacker from accurately aligning the power consumption curve of the target Sbox has been proven, and the level of security has been improved by adding more random noise to protect key information and decrease the accuracy of statistical analysis.
AbstractList The Internet of Things (IoT) provides the network for physical devices, like home appliances, embedded with electronics, sensors, and software, to share and exchange data. With its fast development, security of IoT has become a crucial problem. Among the methods of attack, side-channel attack has proven to be an effective tool to compromise the security of different devices with improving techniques of data processing, like DPA and CPA. Meanwhile, many countermeasures have risen accordingly as well, such as masking and noise addition. However, their common deficiency was that every single countermeasure might not be able to protect the key information completely after statistical analysis. Sensitive information will be disclosed during differential power analysis of Sbox, since it is the only nonlinear component in block cipher. Thus, how to protect Sbox effectively was the highlight of researches. Based on Sbox-reuse concept proposed by Bilgin, this paper put forward a new type of a countermeasure scheme against DPA in multi-Sbox of block cipher. We first converted the multi-Sbox into 4 × 4 permutations and then reused permutation with the algebraic degree of more than one so as to turn it into a special reusable Sbox and then numbered 4 × 4 permutation input. Finally, we made these inputs of permutations completely random by masking. Since it was necessary to make the collected power consumption curve subject to alignment process in DPA by chosen-plaintext attack, this scheme combined the concept from DPA countermeasures of masking and noise addition. After the experiment with the proposed implementation, successful prevention of the attacker from accurately aligning the power consumption curve of the target Sbox has been proven, and the level of security has been improved by adding more random noise to protect key information and decrease the accuracy of statistical analysis.
Author Zhang, ShuaiWei
Zhong, Weidong
Author_xml – sequence: 1
  fullname: Zhang, ShuaiWei
– sequence: 2
  fullname: Zhong, Weidong
BookMark eNqF0M1LwzAYBvAgE9ymN88S8Kh1-WiS9jirU2F-gPNc0ix1mV1S05a5_96ODgVBdnrfw-99eXgGoGed1QCcYnSFMWMjgnA0YnHIKCYHoI8ZRUHEhej97Dw-AoOqWiKEKCK4DyZj-KTXcLYpNXQ5TFxja-1XWlaN11C-S2OrGt68jKGx8LEpahO8Zu5ra68Lpz5gYsqF9sfgMJdFpU92cwjeJrez5D6YPt89JONpoChHdSCiMA65oHpOmeIsi4XgTLM2No0iRjKkaE5jJeMwQyTCguAICU1jqRhRQmk6BEH3t7Gl3KxlUaSlNyvpNylG6baEdFtCuiuh9eedL737bHRVp0vXeNtGTEmIBCci5lGrSKeUd1XldZ4qU8vaOFt7aYr_Xl_-OdqT5KLjC2Pncm326bNO69boXP5qgjluwTc8xo5P
CitedBy_id crossref_primary_10_3390_app112110314
Cites_doi 10.1007/978-3-540-25937-4_21
10.1007/s13389-011-0023-x
10.1007/11545262_12
10.1007/978-3-662-45608-8_18
10.1109/MDT.2007.186
10.1007/3-540-44709-1_21
10.1109/TC.2016.2614504
10.1109/TCAD.2015.2419623
10.1109/JIOT.2016.2584538
10.1007/978-3-319-66787-4_3
10.1007/978-3-540-30574-3_24
10.1007/3-540-68697-5_9
10.1109/DATE.2004.1268856
10.1016/j.vlsi.2005.12.013
10.1109/TST.2016.7442503
10.13164/re.2017.0890
10.1007/3-540-36400-5_3
10.1109/MCOM.2011.6069711
10.1049/el.2017.1460
10.1109/APCCAS.2016.7804081
10.1007/3-540-44709-1_26
10.1007/11935308_38
10.1109/TIFS.2017.2787985
10.1007/978-3-662-44709-3_9
10.1007/s11276-014-0761-7
10.1007/978-3-319-31271-2_17
10.1016/j.comnet.2014.11.008
10.1007/978-3-540-45238-6_7
10.1049/iet-ifs.2015.0574
10.1007/3-540-48405-1_25
ContentType Journal Article
Copyright Copyright © 2018 Shuaiwei Zhang and Weidong Zhong.
Copyright © 2018 Shuaiwei Zhang and Weidong Zhong. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: Copyright © 2018 Shuaiwei Zhang and Weidong Zhong.
– notice: Copyright © 2018 Shuaiwei Zhang and Weidong Zhong. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID ADJCN
AHFXO
RHU
RHW
RHX
AAYXX
CITATION
7SC
7SP
7XB
8FD
8FE
8FG
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
L7M
L~C
L~D
M0N
P5Z
P62
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
Q9U
ADTOC
UNPAY
DOI 10.1155/2018/5945312
DatabaseName الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals
معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete
Hindawi Publishing Complete
Hindawi Publishing Subscription Journals
Hindawi Publishing Open Access
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
ProQuest Central (purchase pre-March 2016)
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Advanced Technologies & Aerospace Database
ProQuest Central Essentials
ProQuest Central
Technology Collection
ProQuest One Community College
ProQuest Central
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
ProQuest Computer Science Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Computing Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest Central Basic
Unpaywall for CDI: Periodical Content
Unpaywall
DatabaseTitle CrossRef
Publicly Available Content Database
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Central Korea
ProQuest Central (New)
Advanced Technologies Database with Aerospace
Advanced Technologies & Aerospace Collection
ProQuest Computing
ProQuest Central Basic
ProQuest One Academic Eastern Edition
Electronics & Communications Abstracts
ProQuest Technology Collection
ProQuest SciTech Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList
CrossRef

Publicly Available Content Database
Database_xml – sequence: 1
  dbid: RHX
  name: Hindawi Publishing Open Access
  url: http://www.hindawi.com/journals/
  sourceTypes: Publisher
– sequence: 2
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
– sequence: 3
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1530-8677
Editor Liu, Ximeng
Editor_xml – sequence: 1
  givenname: Ximeng
  surname: Liu
  fullname: Liu, Ximeng
EndPage 11
ExternalDocumentID 10.1155/2018/5945312
10_1155_2018_5945312
1216112
GrantInformation_xml – fundername: National Cryptography Development Fund of China
  grantid: MMJJ20170112
– fundername: National Natural Science Foundation of China
  grantid: U1636114; 61772550; 61572521
– fundername: National Key R&D Program of China
  grantid: 2017YFB0802000
GroupedDBID .3N
.DC
.GA
.Y3
05W
0R~
123
1L6
24P
31~
3SF
3WU
4.4
4ZD
50Y
50Z
52M
52O
52T
52U
52W
5VS
66C
6OB
702
7PT
8-0
8-1
8-3
8-4
8-5
8UM
930
A03
AAESR
AAEVG
AAFWJ
AAMMB
AANHP
AAONW
AAZKR
ABIJN
ABPVW
ACBWZ
ACCMX
ACGFO
ACRPL
ACXQS
ACYXJ
ADBBV
ADIZJ
ADJCN
ADNMO
AEFGJ
AEIMD
AENEX
AEUCX
AFBPY
AFKRA
AFZJQ
AGQPQ
AGXDD
AHFXO
AIAGR
AIDQK
AIDYY
AJXKR
ALAGY
ALMA_UNASSIGNED_HOLDINGS
AMBMR
ARAPS
ASPBG
ATUGU
AVWKF
AZBYB
AZFZN
AZQEC
AZVAB
BAFTC
BCNDV
BDRZF
BENPR
BFHJK
BGLVJ
BHBCM
BNHUX
BROTX
BRXPI
CCPQU
CS3
D-E
D-F
DPXWK
DR2
DU5
DWQXO
EBS
EJD
F00
F01
F04
F21
FEDTE
G-S
G.N
GNP
GNUQQ
GODZA
H.T
H.X
H13
HCIFZ
HF~
HVGLF
HZ~
ITG
ITH
IX1
JPC
K7-
KQQ
LAW
LH4
LITHE
LP6
LP7
LW6
MK4
MY~
N04
N05
NF~
O9-
OIG
OK1
P2P
P2X
P4D
PHGZM
PHGZT
PIMPY
PQGLB
PUEGO
Q.N
QB0
QRW
R.K
ROL
RX1
RYL
SUPJJ
UB1
W8V
W99
WBKPD
WYUIH
XPP
XV2
~IA
~WT
.4S
1OC
33P
AAJEY
AEUQT
ARCSS
EDO
GROUPED_DOAJ
I-F
IAO
ITC
M0N
O66
P2W
RHU
RHW
RHX
RWI
TUS
WIH
WLBEL
AAYXX
CITATION
7SC
7SP
7XB
8FD
8FE
8FG
ABUWG
JQ2
L7M
L~C
L~D
P62
PKEHL
PQEST
PQQKQ
PQUKI
PRINS
Q9U
ADTOC
UNPAY
ID FETCH-LOGICAL-c360t-78494673ed35c65b97765e501838852b0c3f39ca94b0281721807e39ac52c7ce3
IEDL.DBID UNPAY
ISSN 1530-8669
1530-8677
IngestDate Tue Aug 19 19:12:00 EDT 2025
Fri Jul 25 09:28:45 EDT 2025
Thu Apr 24 23:02:03 EDT 2025
Wed Oct 01 01:08:50 EDT 2025
Sun Jun 02 18:54:49 EDT 2024
Thu Sep 25 15:07:38 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 2018
Language English
License This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
cc-by
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c360t-78494673ed35c65b97765e501838852b0c3f39ca94b0281721807e39ac52c7ce3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0003-3830-3712
OpenAccessLink https://proxy.k.utb.cz/login?url=http://downloads.hindawi.com/journals/wcmc/2018/5945312.pdf
PQID 2407627968
PQPubID 2034344
PageCount 11
ParticipantIDs unpaywall_primary_10_1155_2018_5945312
proquest_journals_2407627968
crossref_citationtrail_10_1155_2018_5945312
crossref_primary_10_1155_2018_5945312
hindawi_primary_10_1155_2018_5945312
emarefa_primary_1216112
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2018-01-01
PublicationDateYYYYMMDD 2018-01-01
PublicationDate_xml – month: 01
  year: 2018
  text: 2018-01-01
  day: 01
PublicationDecade 2010
PublicationPlace Cairo, Egypt
PublicationPlace_xml – name: Cairo, Egypt
– name: Oxford
PublicationTitle Wireless communications and mobile computing
PublicationYear 2018
Publisher Hindawi Publishing Corporation
Hindawi
John Wiley & Sons, Inc
Publisher_xml – name: Hindawi Publishing Corporation
– name: Hindawi
– name: John Wiley & Sons, Inc
References e_1_2_10_22_2
e_1_2_10_23_2
e_1_2_10_20_2
e_1_2_10_21_2
Tang S. (e_1_2_10_24_2) 2017
e_1_2_10_19_2
e_1_2_10_1_2
e_1_2_10_3_2
e_1_2_10_17_2
e_1_2_10_2_2
e_1_2_10_5_2
e_1_2_10_4_2
e_1_2_10_16_2
e_1_2_10_7_2
e_1_2_10_13_2
e_1_2_10_6_2
e_1_2_10_14_2
e_1_2_10_35_2
e_1_2_10_9_2
e_1_2_10_11_2
e_1_2_10_34_2
e_1_2_10_8_2
e_1_2_10_12_2
Zhang S. (e_1_2_10_18_2) 2016; 17
e_1_2_10_33_2
e_1_2_10_32_2
e_1_2_10_10_2
e_1_2_10_31_2
e_1_2_10_30_2
Lerman L. (e_1_2_10_15_2) 2017
e_1_2_10_28_2
e_1_2_10_29_2
e_1_2_10_26_2
e_1_2_10_27_2
e_1_2_10_25_2
References_xml – ident: e_1_2_10_26_2
  doi: 10.1007/978-3-540-25937-4_21
– ident: e_1_2_10_19_2
  doi: 10.1007/s13389-011-0023-x
– ident: e_1_2_10_16_2
  doi: 10.1007/11545262_12
– ident: e_1_2_10_33_2
  doi: 10.1007/978-3-662-45608-8_18
– ident: e_1_2_10_13_2
  doi: 10.1109/MDT.2007.186
– ident: e_1_2_10_10_2
  doi: 10.1007/3-540-44709-1_21
– ident: e_1_2_10_32_2
  doi: 10.1109/TC.2016.2614504
– ident: e_1_2_10_31_2
  doi: 10.1109/TCAD.2015.2419623
– ident: e_1_2_10_4_2
  doi: 10.1109/JIOT.2016.2584538
– ident: e_1_2_10_20_2
  doi: 10.1007/978-3-319-66787-4_3
– ident: e_1_2_10_17_2
  doi: 10.1007/978-3-540-30574-3_24
– ident: e_1_2_10_6_2
  doi: 10.1007/3-540-68697-5_9
– ident: e_1_2_10_29_2
  doi: 10.1109/DATE.2004.1268856
– ident: e_1_2_10_11_2
  doi: 10.1016/j.vlsi.2005.12.013
– ident: e_1_2_10_35_2
  doi: 10.1109/TST.2016.7442503
– ident: e_1_2_10_21_2
  doi: 10.13164/re.2017.0890
– start-page: 1
  year: 2017
  ident: e_1_2_10_15_2
  article-title: Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version
  publication-title: Journal of Cryptographic Engineering
– year: 2017
  ident: e_1_2_10_24_2
  article-title: Power analysis attacks against FPGA implementation of KLEIN
  publication-title: Security and Communication Networks
– ident: e_1_2_10_14_2
  doi: 10.1007/3-540-36400-5_3
– ident: e_1_2_10_1_2
  doi: 10.1109/MCOM.2011.6069711
– ident: e_1_2_10_23_2
  doi: 10.1049/el.2017.1460
– volume: 17
  start-page: 157
  year: 2016
  ident: e_1_2_10_18_2
  article-title: An improved combinational side-channel attack on S-box in block cipher
  publication-title: Journal of Internet Technology
– ident: e_1_2_10_5_2
  doi: 10.1109/APCCAS.2016.7804081
– ident: e_1_2_10_25_2
  doi: 10.1007/3-540-44709-1_26
– ident: e_1_2_10_30_2
  doi: 10.1007/11935308_38
– ident: e_1_2_10_8_2
  doi: 10.1109/TIFS.2017.2787985
– ident: e_1_2_10_27_2
  doi: 10.1007/978-3-662-44709-3_9
– ident: e_1_2_10_28_2
– ident: e_1_2_10_2_2
  doi: 10.1007/s11276-014-0761-7
– ident: e_1_2_10_9_2
  doi: 10.1007/3-540-44709-1_26
– ident: e_1_2_10_34_2
  doi: 10.1007/978-3-319-31271-2_17
– ident: e_1_2_10_3_2
  doi: 10.1016/j.comnet.2014.11.008
– ident: e_1_2_10_12_2
  doi: 10.1007/978-3-540-45238-6_7
– ident: e_1_2_10_22_2
  doi: 10.1049/iet-ifs.2015.0574
– ident: e_1_2_10_7_2
  doi: 10.1007/3-540-48405-1_25
SSID ssj0003021
Score 2.1499941
Snippet The Internet of Things (IoT) provides the network for physical devices, like home appliances, embedded with electronics, sensors, and software, to share and...
SourceID unpaywall
proquest
crossref
hindawi
emarefa
SourceType Open Access Repository
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1
SubjectTerms Algorithms
Costs
Data processing
Electronic devices
Encryption
Household appliances
Internet of Things
Masking
Permutations
Power consumption
Power management
Random noise
Statistical analysis
SummonAdditionalLinks – databaseName: Hindawi Publishing Open Access
  dbid: RHX
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEF60IOpBfFutsgf1IsGYfWT3WKuleBBRC72FzWajxZqKrVT_vTPttlrFxy0hkw3M7M583z6-ELKfqjADWmIDk2ZxwDMe4fpuHhidKS14jFP9uNviUjaa_KIlWl4kqfd9CR-qHdDzE3UsNIfeArl2VkncuXXdaE0SLgsjL4saBkpKPd7f_uXdqcoz5x4NXEA5mrtH8jtoT0HM-ZfiybwNTKfzqdrUl8mSh4m0OorrCplxxSpZ_CQeuEbqVQoZiiKRpN2c4uFyTLOjOT9q7oDy9_r07KpK2wUdnrMNbtLuK9qeQgV7oLU2Sgqsk2b9_LbWCPxfEQLLZNgPYsU1ZDfmMiasFCkAOCkc6vIxpUSUhpblTFujeQrYARmeCmPHtLEisrF1bIOUim7htgjFZTqhrGEqMtzCYGR5bjlQHIB1TjteJkdjjyXWS4bjnys6yZA6CJGgfxPv3zI5mFg_jaQyfrDb9M7_MIsAeOKTfR-MPxqojCOV-BHXS5CZyijWUpXJ4SR6v7az_b_P7ZAFvB3Nu1RIqf_84nYBifTTvWE_fAcNwc2a
  priority: 102
  providerName: Hindawi Publishing
– databaseName: ProQuest Central
  dbid: BENPR
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwhV1LTxsxEB5BIgQcqvIohKaVD8AFWVn5sWsfUJUEoqiHCNEicVt5vV4aNd2kJVHg3-NJvAEOhdtKO_JhPJ75Zuz5BuA4U1Hu0xJLTZYnVOSC4f1uQY3OlZYiwVI_vrYYxP0b8f1W3q7BoOqFwWeVlU9cOOp8bLFG3sLMI2aJjtW3yV-KU6PwdrUaoWHCaIX8fEExtg51hsxYNah3LgdX1yvfzCMWGFQjquJYV0_hpWz5SKhaUgtvlOxVkNpwf4z_8JFr4xfmyfPhKzS6OSsn5nFuRqMXgan3ET4EREnaSxPYgTVX7sL2C57BPei1iXdmBHNOMi4I9qGjR16WB4m5M0MPEsnFVZsMS7JoyaU_svEDynZ8sPtNukNkH9iHm97lz26fhgEK1PI4mtJECe0dIXc5lzaWmcd6sXRI4ceVkiyLLC-4tkaLzMMMTAZVlDiujZXMJtbxT1Arx6U7BII3elJZwxUzwvpzy4vCCp8NeQTotBMNOKs0ltrALo5DLkbpIsuQMkX9pkG_DThZSU-WrBr_kTsIyn8WYx6j4p_jsBnvLNCsdioNh_M-fTalBpyudu_NdY7eXuczbKH0sjTThNr038x98WBlmn0NFvgEfP_ebA
  priority: 102
  providerName: ProQuest
Title A New Type of Countermeasure against DPA in Multi-Sbox of Block Cipher
URI https://search.emarefa.net/detail/BIM-1216112
https://dx.doi.org/10.1155/2018/5945312
https://www.proquest.com/docview/2407627968
http://downloads.hindawi.com/journals/wcmc/2018/5945312.pdf
UnpaywallVersion publishedVersion
Volume 2018
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl: http://www.proquest.com/pqcentral?accountid=15518
  eissn: 1530-8677
  dateEnd: 20250131
  omitProxy: true
  ssIdentifier: ssj0003021
  issn: 1530-8677
  databaseCode: BENPR
  dateStart: 20170101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVWIB
  databaseName: Wiley Online Library - Core collection (SURFmarket)
  issn: 1530-8677
  databaseCode: DR2
  dateStart: 20010101
  customDbUrl:
  isFulltext: true
  eissn: 1530-8677
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0003021
  providerName: Wiley-Blackwell
– providerCode: PRVWIB
  databaseName: Wiley Online Library Open Access
  customDbUrl:
  eissn: 1530-8677
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0003021
  issn: 1530-8677
  databaseCode: 24P
  dateStart: 20170101
  isFulltext: true
  titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html
  providerName: Wiley-Blackwell
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lj9MwEB7ttloBB54LFJbKh4ULSjfEdmIfu49ScaiqQqUiIUWO40C13XTFtipw4ifwG_klzDTOshXiIS6Ro4ysxDOZ-T4_ZgD2MxXmSEtsYLI8CUQuIlrfLQKjc6WlSGiqn3ZbDOL-WLyayMkW1GXucsoQPzf5RecDUdLVdO2s_bBeHKzsmUW6_kIdSC3QepAU5sU2NGOJQLwBzfFg2H1bZUgNAxWvC9r5dpLU296l3OhiIyDtuDODDYxSO_4FNpDntWV5bj6vzGx2JQj1bsG7-ihPtffktLNcZB375dfMjv_zfbfhpgenrFtZ0x3YcuVduHElZeE96HcZ-kVG9JXNC0ZH2sm5VzONzLw3U8Sb7HjYZdOSrU_3fv_67XU2_0TShxg5T9nRlFIZ7MK4d_LmqB_4agyB5XG4CBIlNHpV7nIubSwzBI6xdJQPkCsloyy0vODaGi0yxCzELFWYOK6NlZFNrOP3oVHOS_cQGC0PSmUNV5ERFp0ALworkFohnHTaiRY8r1WSWp-qnCpmzNI1ZZEypTFK_Ri14Oml9HmVouM3cg-8dn-KRQh46cm-V8dfOtirTSGtVZYSI46jRMeqBc8uzeOP_Tz6V8HHcJ1uqxmfPWgsPi7dE8RAi6wN26r3sg3Nw5PBcIR3x6MIr6P-pO3_gh8BS__q
linkProvider Unpaywall
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9NAEB6VVlXhgHgTKLCHlgtaxdqHvXuoUPqIUlqiClqpN7NeryEiOIGmCv1z_DZmknXaHiin3ix5PIfZ9Xzzze7MAGwUJimRlnjuijLjqlSCzncr7mxprFYZpfrptkU_7Z2oD6f6dAn-NLUwdK2y8YkzR12OPOXI28Q8UpHZ1Lwf_-Q0NYpOV5sRGi6OVii3Zi3GYmHHQbiYIoU729rfxfXeFKK7d7zT43HKAPcyTSY8M4rGzMtQSu1TXWBAlOpAfe6kMVoUiZeVtN5ZVSAWE2MySRakdV4Ln_kgUe8dWFFSWSR_K9t7_aNPCyyQiYgdWxNu0tQ2V--1biPymra2Cn8CcQ0UV8MPhw-IlKvfiJdPB9ei37Xzeuwupm44vAKE3QdwP0awrDPfcg9hKdSP4N6VvoaPodth6DwZcVw2qhjVvRMCzNORzH11AwxK2e5Rhw1qNisB5p-L0W-S3UZw_c52BtTt4Amc3Iopn8JyParDc2B0gqiNd9IIpzz6CVlVXiH7wogz2KBa8K6xWO5jN3MaqjHMZ6xG65zsm0f7tmBzIT2ed_H4h9yzaPxLMYExMb3ZiIvxHwXrzUrl0Rmc5ZdbtwVvF6t3o54XN-t5A2u944-H-eF-_-Al3KUv52mhdVie_DoPrzBQmhSv425k8OW2f4C_PhkYxw
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LbxNBDLZKUXkcEG8CBebQckGjrOaxO3NAKDQsLUVVJajU23Z2dhYiwibQVKF_jV-HnZ1N2wPl1FukeH2wLdufxw-AjdIkFcISz11ZZVxVStD7bs2drYzVKqNSP3Vb7KXbB-rjoT5cgT_dLAy1VXY-ceGoq4mnGnmfkEcqMpuafh3bIvaH-dvpT04XpOiltTun0ZrIbjidI3w7frMzRF1vCpG__7K1zeOFAe5lmsx4ZhSdmJehktqnusRkKNWBdtxJY7QoEy9rab2zqsQ4TGjJJFmQ1nktfOaDRL7X4HpGW9xpSj3_sIwCMhFxV2vCTZrarule6z7GXNPXVqH5iwvhcC38cPgDY-TaN0Lk89GFvPfmSTN1p3M3Hp8LgflduBNzVzZoje0erITmPtw-t9HwAeQDhm6TEbplk5rRxDv5_rYQydxXN8J0lA33B2zUsMXwL_9cTn4T7TsMq9_Z1oj2HDyEgysR5CNYbSZNeAKM3g618U4a4ZRHDyHr2ivEXZhrBhtUD153Eit83GNO5zTGxQLPaF2QfIso3x5sLqmn7f6Of9A9jsI_IxOYDdM_G1EZ_2Gw3mmqiG7guDgz2h68WmrvUj5PL-fzEm6g2RefdvZ2n8Et-rCtB63D6uzXSXiOGdKsfLEwRQZHV237fwFeKhZh
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1NT9wwEB3RRQg4UCiULqXIB-gFZUljO7GPWyha9YCQYCUqVYocx4EVSxaVXS1w6k_ob-wv6czGAVZVW9Sbo4ysxDMav-ePNwDbmQpzpCU2MFmeBCIXEe3vFoHRudJSJLTUT6ctjuJOV3w-k2czUJe5y0khfmDym9YFUdJxb5Ks_bDe7I3tlUW6_kHtSS0wepAU5sULmI0lAvEGzHaPjttfKoXUMFDxpKCdbydJfexdyqkupiakOXdlsIGz1Jz_gCnkOT8qr83d2PT7Tyahw5fwtb7KU509uWyNhlnL3v-u7Pg__7cMSx6csnYVTSsw48pXsPhEsnAVOm2GeZERfWWDgtGVdkru1UojM-emh3iTHRy3Wa9kk9u9P7__OMkGt2T9EWfOS7bfIymDNegefjrd7wS-GkNgeRwOg0QJjVmVu5xLG8sMgWMsHekBcqVklIWWF1xbo0WGmIWYpQoTx7WxMrKJdfw1NMpB6d4Ao-1BqazhKjLCYhLgRWEFUiuEk0470YTd2iWp9VLlVDGjn04oi5QpjVHqx6gJOw_W15VExx_s1r13H80iBLz0Ztu74x8dbNahkNYuS4kRx1GiY9WE9w_h8dd-Np5r-BYW6LFa8dmExvDbyL1DDDTMtnys_wJHcPtu
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+New+Type+of+Countermeasure+against+DPA+in+Multi-Sbox+of+Block+Cipher&rft.jtitle=Wireless+communications+and+mobile+computing&rft.au=Zhang%2C+Shuaiwei&rft.au=Zhong%2C+Weidong&rft.date=2018-01-01&rft.pub=John+Wiley+%26+Sons%2C+Inc&rft.issn=1530-8669&rft.eissn=1530-8677&rft.volume=2018&rft_id=info:doi/10.1155%2F2018%2F5945312&rft.externalDBID=HAS_PDF_LINK
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1530-8669&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1530-8669&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1530-8669&client=summon