{"id":"https://openalex.org/W4417090538","doi":"https://doi.org/10.1007/978-981-95-5096-8_14","title":"Towards Combined Countermeasures against Differential Computation and Fault Analyses: An Approach with the ASASA Structure","display_name":"Towards Combined Countermeasures against Differential Computation and Fault Analyses: An Approach with the ASASA Structure","publication_year":2025,"publication_date":"2025-12-07","ids":{"openalex":"https://openalex.org/W4417090538","doi":"https://doi.org/10.1007/978-981-95-5096-8_14"},"language":"en","primary_location":{"id":"doi:10.1007/978-981-95-5096-8_14","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-981-95-5096-8_14","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-981-95-5096-8_14.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://link.springer.com/content/pdf/10.1007/978-981-95-5096-8_14.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079638367","display_name":"Yufeng Tang","orcid":"https://orcid.org/0000-0003-0899-6351"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]},{"id":"https://openalex.org/I187400657","display_name":"South China Normal University","ror":"https://ror.org/01kq0pv72","country_code":"CN","type":"education","lineage":["https://openalex.org/I187400657"]},{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN","SG"],"is_corresponding":true,"raw_author_name":"Yufeng Tang","raw_affiliation_strings":["Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, People\u2019s Republic of China","School of Computer Science, South China Normal University, Guangzhou, People\u2019s Republic of China","School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, People\u2019s Republic of China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"School of Computer Science, South China Normal University, Guangzhou, People\u2019s Republic of China","institution_ids":["https://openalex.org/I187400657"]},{"raw_affiliation_string":"School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101593687","display_name":"Zheng Gong","orcid":"https://orcid.org/0000-0002-1794-816X"},"institutions":[{"id":"https://openalex.org/I187400657","display_name":"South China Normal University","ror":"https://ror.org/01kq0pv72","country_code":"CN","type":"education","lineage":["https://openalex.org/I187400657"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zheng Gong","raw_affiliation_strings":["School of Computer Science, South China Normal University, Guangzhou, People\u2019s Republic of China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, South China Normal University, Guangzhou, People\u2019s Republic of China","institution_ids":["https://openalex.org/I187400657"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000314015","display_name":"Jian Guo","orcid":"https://orcid.org/0000-0002-1667-1701"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Jian Guo","raw_affiliation_strings":["School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038484143","display_name":"Xiaoyang Dong","orcid":"https://orcid.org/0000-0002-6723-6013"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyang Dong","raw_affiliation_strings":["Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, People\u2019s Republic of China","State Key Laboratory of Cryptography and Digital Economy Security, Tsinghua University, Beijing, People\u2019s Republic of China","Zhongguancun Laboratory, Beijing, People\u2019s Republic of China"],"affiliations":[{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, People\u2019s Republic of China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"State Key Laboratory of Cryptography and Digital Economy Security, Tsinghua University, Beijing, People\u2019s Republic of China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"Zhongguancun Laboratory, Beijing, People\u2019s Republic of China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109892770","display_name":"Liangju Zhao","orcid":null},"institutions":[{"id":"https://openalex.org/I187400657","display_name":"South China Normal University","ror":"https://ror.org/01kq0pv72","country_code":"CN","type":"education","lineage":["https://openalex.org/I187400657"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liangju Zhao","raw_affiliation_strings":["School of Computer Science, South China Normal University, Guangzhou, People\u2019s Republic of China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, South China Normal University, Guangzhou, People\u2019s Republic of China","institution_ids":["https://openalex.org/I187400657"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5079638367"],"corresponding_institution_ids":["https://openalex.org/I172675005","https://openalex.org/I187400657","https://openalex.org/I99065089"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.58720556,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"441","last_page":"474"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.968999981880188,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.968999981880188,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.015200000256299973,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.005100000184029341,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6808000206947327},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.6118999719619751},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.54339998960495},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.48750001192092896},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.4625000059604645},{"id":"https://openalex.org/keywords/differential","display_name":"Differential (mechanical device)","score":0.4075999855995178},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.4050000011920929},{"id":"https://openalex.org/keywords/masking","display_name":"Masking (illustration)","score":0.3407999873161316},{"id":"https://openalex.org/keywords/fault","display_name":"Fault (geology)","score":0.32820001244544983}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.861299991607666},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6808000206947327},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.6118999719619751},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.54339998960495},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.48750001192092896},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.46880000829696655},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4625000059604645},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.4075999855995178},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.4050000011920929},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.36629998683929443},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.35100001096725464},{"id":"https://openalex.org/C2777402240","wikidata":"https://www.wikidata.org/wiki/Q6783436","display_name":"Masking (illustration)","level":2,"score":0.3407999873161316},{"id":"https://openalex.org/C175551986","wikidata":"https://www.wikidata.org/wiki/Q47089","display_name":"Fault (geology)","level":2,"score":0.32820001244544983},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.32109999656677246},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.320499986410141},{"id":"https://openalex.org/C167391956","wikidata":"https://www.wikidata.org/wiki/Q1401211","display_name":"Fault model","level":3,"score":0.30219998955726624},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.30169999599456787},{"id":"https://openalex.org/C21308566","wikidata":"https://www.wikidata.org/wiki/Q7169365","display_name":"Permutation (music)","level":2,"score":0.2976999878883362},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.2955000102519989},{"id":"https://openalex.org/C46331935","wikidata":"https://www.wikidata.org/wiki/Q4651362","display_name":"AES implementations","level":4,"score":0.29339998960494995},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.28519999980926514},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2827000021934509},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.2793000042438507},{"id":"https://openalex.org/C45235069","wikidata":"https://www.wikidata.org/wiki/Q278425","display_name":"Table (database)","level":2,"score":0.27649998664855957},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.26750001311302185},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.26080000400543213},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.2597000002861023},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2542000114917755},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.25209999084472656}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-981-95-5096-8_14","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-981-95-5096-8_14","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-981-95-5096-8_14.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.1007/978-981-95-5096-8_14","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-981-95-5096-8_14","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-981-95-5096-8_14.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1891047864","display_name":null,"funder_award_id":"U2336209","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2700453646","display_name":null,"funder_award_id":"2022A1515140090","funder_id":"https://openalex.org/F4320337111","funder_display_name":"Basic and Applied Basic Research Foundation of Guangdong Province"},{"id":"https://openalex.org/G4488680036","display_name":null,"funder_award_id":"2022A15","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6522409156","display_name":null,"funder_award_id":"62072192","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320337111","display_name":"Basic and Applied Basic Research Foundation of Guangdong Province","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4417090538.pdf","grobid_xml":"https://content.openalex.org/works/W4417090538.grobid-xml"},"referenced_works_count":51,"referenced_works":["https://openalex.org/W11078255","https://openalex.org/W17122945","https://openalex.org/W153516704","https://openalex.org/W182571705","https://openalex.org/W1505973206","https://openalex.org/W1572300106","https://openalex.org/W1592625985","https://openalex.org/W1599175145","https://openalex.org/W1820473293","https://openalex.org/W1894646615","https://openalex.org/W1904699185","https://openalex.org/W1938099525","https://openalex.org/W1959383191","https://openalex.org/W2015388549","https://openalex.org/W2124167991","https://openalex.org/W2128197017","https://openalex.org/W2166531223","https://openalex.org/W2168130438","https://openalex.org/W2234839359","https://openalex.org/W2296754065","https://openalex.org/W2491381336","https://openalex.org/W2504919933","https://openalex.org/W2523955279","https://openalex.org/W2551407130","https://openalex.org/W2557103463","https://openalex.org/W2621243127","https://openalex.org/W2741840250","https://openalex.org/W2768348791","https://openalex.org/W2784274257","https://openalex.org/W2794597406","https://openalex.org/W2798267696","https://openalex.org/W2893337833","https://openalex.org/W2919040637","https://openalex.org/W2933066117","https://openalex.org/W3013637996","https://openalex.org/W3024909990","https://openalex.org/W3135037544","https://openalex.org/W3157937103","https://openalex.org/W3173439069","https://openalex.org/W3185456757","https://openalex.org/W3204034662","https://openalex.org/W3207279180","https://openalex.org/W3207691340","https://openalex.org/W4212860423","https://openalex.org/W4256518655","https://openalex.org/W4285225977","https://openalex.org/W4310480139","https://openalex.org/W4312298187","https://openalex.org/W4386328223","https://openalex.org/W4390657957","https://openalex.org/W4400836760"],"related_works":[],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-12-07T00:00:00"}
