{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“邮件”:{“索引”:{-“日期-部件”:[[2023,5,3]],“日期-时间”:“2023-05-03T04:24:36Z”,“时间戳”:1683087876626},“引用-计数”:18,“发布者”:“Elsevier BV”,“许可证”:[{“开始”:{:“日期-部分”:[2022,8,1]],:00Z“,”timestamp“:1659312000000},”content-version“:“tdm”,“delay-in-days”:0,“URL”:“https:\/\/www.elsevier.com//tdm\/userlicense\/1.0\/”},{“start”:{“date-parts”:[2022,8,1]],“date-time”:“2022-08-01T00:00:00Z”,“timestamp”:1659312000000},“content-version”:“stm-asf”,“delay-in-days”:“0”,“URL“https:\\/doi.org\/10.15223\/policy-017“},{“start”:{“date-parts”:[[2022,8,1]],“date-time”:“2022-08-01T00:00:00Z”,“timestamp”:1659312000000},“content-version”:“stm-asf”,“delay-in-days”:0,“URL”:“https:\/\/doi.org\/10.15223\/policy-037”},{“start”:{“date-parts”:[[2022,8,1]],“date-time”:“2022-08-01T00:00:00Z”,“timetamp”:1.65931200000}、“content-version”:“stm-asf”、“delay-in-days“:0,”URL“https:”\/\/doi.org\/10.15223\/policy-012“},{“start”:{“date-parts”:[[2022,8,1]],“date-time”:“2022-08-01T00:00:00Z”,“timestamp”:1659312000000},“content-version”:“stm-asf”,“delay-in-days”:0,“URL”:“https:\/\/doi.org\/10.15223\/policy-029”},{“start”:{“date-parts”:[2022,8,1]],“date-time”:“2022-008-01T00:00”,“时间戳”:16593 12000000},f“,”delay-in-days“:0,”URL“:”https:\/\/doi.org\/10.15223\/policy-004“}],“content-domain”:{“domain”:[“elsevier.com”,“sciencedirect.com”],“crossmark-restriction”:true},“short-container-title”:[“Journal of Information Security and Applications”],”published-print“:{”date-parts“:[2022,8]},”DOI“:”10.1016\/j.jisa.2022.103222“,”type“:”Journal-article“,”created“:”{“date-part”:[2022,6,15]],“date-time”:“2022-06-15T17:54:14Z”,“时间戳”:1655315654000},“页面”:“103222”,“更新策略”:“http://\/dx.doi.org\/10.1016\/elsevier_cm_policy”,“源”:“Crossref”,”is-referenced-by-count“:0,”title“:[”基于比特策略的chosen-plantext对重用mask AES的冲突攻击“],”前缀“:”10.1016“,”卷“:”68“,”作者“:[{”给定“:“美玲”、“家人”:“张”,“sequence”:“first”,“affiliation”:[]},{“ORCID”:“http:\/\/ORCID.org/0000-0002-9164-4105”,“authenticated ORCID”:false,“given”:“柳生”,“family”:“Wang”,“sequence”:“additional”,“affiliation”:[]},{“given”:“Bingyu”,“family”:“Zhao”,“sequence”:“additional”,“affiliation”:[]},{“given”:“Dong”,“family”:“Zheng”,“sequence”:“additional”,“affiliation”:[]}]中,“member”:“78”,“reference”:[{“key”:“10.1016\/j.jisa.2022.103222_b1”,“series-title”:“密码学的进展:CRYPTO\u201996的议事录”,“首页”:“104”,“文章标题”:“对Diffie\u2013Hellman、RSA、DSS和其他系统实现的定时攻击”,“author”:“Kocher”,“year”:“1996”},{“key”:”10.1016\/j.jasa.2022.10.3222_b2“series-title”“”:“密码学进展:CRYPTO\u201999会议录”,“第一页”:“388”,“文章标题”:“差分功率分析”,“作者”:“Kocher”,“年份”:“1999”},{“密钥”:“10.1016\/j.jisa.2022.103222-b3”,“doi-asserted-by”:“crossref”,“非结构化”:“Schramm\u00a0K,Wollinger\u00a0 T,Paar\u00a 0C。一类新的碰撞攻击及其在DES中的应用。In:Proc.int.workshop fast soft.encryption,2003,p.206\u201322.”,“DOI”:“10.1007\/978-3540-39887-5_16”},{“key”:“101016\/j.jisa.2022.103222-b4”,“DOI-asserted-by”:“crossref”,”unstructured“:“Schramm\u00a0K,Leander\u00a 0G,Felke\u00a-0P,Paar\u00a/0C。AES侧面通道和差分攻击相结合的碰撞攻击。In:Proc.int.workshop cryptographic hardware and embedded systems.2004,p.163\u201375。”,“DOI”:“10.1007\/978-3-540-28632-5_12”},{“key”:“101016\/j.jisa.2022.10322_b5”,“DOI-asserted-by”:“crossref”,“非结构化”“”:“Bogdanov\u00a0A.改进的AES侧通道碰撞攻击。In:Proc.int.workshop sel.areas cryptogr.2007,p.84\u201395.”,“DOI”:“10.1007\/978-3-540-77360-3_6”},{“key”:“101016\/j.jisa.2022.103222-b6”,“series-title”:“Proc.int:workshop cryptographic hardwares and embedded systems,Vol.5154”,“first page”:”30“article-title”:“对AES的多重差分旁道碰撞攻击”,“author”:“Bogdanov”,“year”:“2008”},{“key”:“10.1016\/j.jisa.2022.10322_b7”,“series-title”:“密码硬件和嵌入式系统国际研讨会”,“first page”:《49》,“article-title”:《一阶受保护AES的改进碰撞相关功率分析》,“auther”:“Clavier”,“year”:“2011”},{“key”:“10.1016\/j.jisa.2022.103222-b8”,“doi-asserted-by”:“crossref”,“first page”:”104218“,“doi”:“101109\/ACCES.2019.2932036”,“article-title”:“基于假设测试的并行通道冲突分析”,“volume”::“7”,“author”:“Zheng”,“年份”:“2019”,“日志标题”:“IEEE ACCESS”}\/j.jisa.2022.103222_b9“,“doi-asserted-by”:“crossref”,“first page”:“18734”,“doi”:“10.1109\/ACCESS.2019.2896256”,“article-title”:“边缘计算中对AES加密的有效碰撞威力攻击”,“volume”:”7“,“author”:“Niu”,“year”:“2019”,“journal-title“:”IEEE ACCESS“},{“key”:《10.1016\/j.jisa.2022.10322_b10》,“series-title”:“Proc.22nd int.conf.sel.areas cryptogr,Vol.9566”,“first page”:“277”,“article-title”:“近碰撞侧通道攻击”,“author”:“Ege”,“year”:“2015”},{“issue”:“5”,“key”:”10.1016\/j.jisa.2022.103222-b11“,“first-page”:“1”,“article-title”:“对屏蔽AES智能卡实现的高效碰撞攻击”,”volume“:”58“,“auther”:“Wang”,“年份”:“2015”,“期刊标题”:“Sci-China-Inf-Sci”},{“密钥”:“10.1016\/j.gisa.2022.103222_b12”,“doi断言者”:“crossref”,“首页”:“63217”,“doi”:“10.1109\/ACCESS.20192916553”,“文章标题”:“边缘计算中屏蔽AES的自适应选择明文冲突攻击”,“卷”:“7”,“作者”:“丁”,“年份”:“2019”,“期刊标题”:“IEEE ACCESS”},{“key”:“10.1016\/j.jisa.2022.103222-b13”,“series-title”:“构造性侧通道分析和安全设计(计算机科学课堂讲稿),第8622卷”,“首页”:“243”,“article-title”:”Chipwhisperer:硬件嵌入式安全研究的开源平台“,“author”:“O\u2019Flynn”,“year”:“2014”},{“key”:“10.1016\/j.jisa.2022.103222-b14”,“doi-asserted-by”:“crossref”,“unstructured”:“Chari\u00a0S,Rao\u00a 0JR,Rohatgi\u00 a0P.模板攻击。In:Proc.Proc.int.workshop cryptographic hardware and embedded systems.2002,p.13\u201328.”,《doi》:“10.1007\/3-540-36400-5_3”},{“key”:“10.106\/j.jisa.2022.0322_b15”,“doi-asserted”by“:”crossref“,“非结构化”:“Akkar \u00a0M-L,Giraud \u00a 0C。DES和AES的一种实现,可抵抗一些攻击。摘自:Proc.int.workshop cryptographic hardware and embedded systems.2001,p.309 \u201318.”,“DOI”:“10.1007 \/3-540-44709-1_26”},{“key”:“101016 \/j.jisa.2022.10322_b16”,“series-title”:“随机函数的数学统计和理论”,“article-title”:“概率论中的问题”,“author”:“Gelbaum\u00a0Bernard”,“year”:“1979”},{“key”:“10.1016\/j.jisa.2022.10322_b17”,“doi-asserted-by”:“crossref”,“unstructured”:“Chari\u00a0S,Jutla\u00a/0CS,Rao\u00a 0JR,Rohatgi\u00 a0P。对抗功率分析攻击的可靠方法。摘自:Proc.annu.int.cryptol.conf.1999,p.398\u2013412.”,“DOI”:“10.1007\/3-540-48405-1_26”},{“key”:“101016\/j.jisa.2022.10322_b18”,“series-title”:“功率分析攻击:揭示智能卡的秘密”,“isbn-t键入“:“print”,“author”:“Mangard”,“year”:“2007”,“ISBN”:“http://\/id.crossref.org\/ISBN\/9780387308579”}],“container-title”:[“信息安全与应用杂志”],“original-title“:[],“language”:“en”,“link”:[{“URL”:“https:\/\/api.elsevier.com/content\/article\/PII:S2214212622000965?httpAccept=text\/xml”,“content-type”“:”text\/xml“,“content-version”:“vor”,“intended-application”:“text-mining”},{“URL”:“https:\/\/api.elsevier.com/content\/article\/PII:S2214212622000965?httpAccept=text\/plain”,“content-type”:“text\/plaine”,“content-version“:”vor“,”intended-application“:”text-mining}],“deposed”:{“date-parts”:[2023,5,2],“date-time”:”2023-05-02T04:10:43Z“,”时间戳“:1683000643000},“score”:1,“resource”:{“primary”:{“URL”:“https:\/\/linkinghub.elsevier.com/retrieve\/pii\/S2214212622000965”}},”subtitle“:[],”shorttitle“:[],”issued“:{”date-parts“:[2022,8]]},‘references-count’:18,”alternative-id“:[”S22142126220009965“],”URL“:”http://\/dx.doi.org \/10.1016 \/j.jisa.2022.103222“,”关系“:{},”ISSN“:[”2214-2126“],“issn-type”:[{“value”:“2214-2126”,“type”:“print”}],“subject”:[],“published”:{“date-parts”:[2022,8]]},“assertion”:[[{”value“:”Elsevier“,”name“:”publisher“,”label“:”此文章由“}维护,{“value”:“重用mask AES上基于位策略的chosen-platext冲突攻击”,“name”:“article”,“label”:“article Title”},{:“信息安全与应用杂志”,“name”:“journaltitle”,“label”:“Journal Title”},{“value”:“https:\/\/doi.org\/101016\/j.jisa.2022.103222”,“name:”articlelink“,”label“:”CrossRef doi link to publisher maintained version“},”{“value”:“article”,”name“:”content_type“,”标签“:”content-type“}”,{”value“:”\u00a9 2022 Elsevier Ltd。保留所有权利。“,”name“:“版权”,”label“:”copyright“}],”article-number“:”103222“}}