{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:40:24Z","timestamp":1767321624780,"version":"3.48.0"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032105356","type":"print"},{"value":"9783032105363","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-10536-3_26","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:38:17Z","timestamp":1767321497000},"page":"703-723","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Picking up\u00a0the\u00a0Fallen Mask: Breaking and\u00a0Fixing the\u00a0RS-Mask Countermeasure"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4551-6775","authenticated-orcid":false,"given":"Dilara","family":"Toprakhisar","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3133-9261","authenticated-orcid":false,"given":"Svetla","family":"Nikova","sequence":"additional","affiliation":[]},{"given":"Ventzislav","family":"Nikov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"26_CR1","doi-asserted-by":"publisher","unstructured":"Aghaie, A., Moradi, A., Rasoolzadeh, S., Shahmirzadi, A.R., Schellenberg, F., Schneider, T.: Impeccable circuits. IEEE Trans. Computers 69(3), 361\u2013376 (2020). https:\/\/doi.org\/10.1109\/TC.2019.2948617","DOI":"10.1109\/TC.2019.2948617"},{"key":"26_CR2","doi-asserted-by":"publisher","unstructured":"Anderson, R.J., Kuhn, M.G.: Low cost attacks on tamper resistant devices. In: Christianson, B., Crispo, B., Lomas, T.M.A., Roe, M. (eds.) Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings. Lecture Notes in Computer Science, vol.\u00a01361, pp. 125\u2013136. Springer (1997https:\/\/doi.org\/10.1007\/BFb0028165","DOI":"10.1007\/BFb0028165"},{"key":"26_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201997","author":"D Boneh","year":"1997","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the Importance of Checking Cryptographic Protocols for Faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37\u201351. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/3-540-69053-0_4"},{"key":"26_CR4","doi-asserted-by":"publisher","unstructured":"Canright, D.: A very compact s-box for AES. In: Rao, J.R., Sunar, B. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings. Lecture Notes in Computer Science, vol.\u00a03659, pp. 441\u2013455. Springer (2005).https:\/\/doi.org\/10.1007\/11545262_32","DOI":"10.1007\/11545262_32"},{"key":"26_CR5","doi-asserted-by":"publisher","unstructured":"Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards sound approaches to counteract power-analysis attacks. In: Wiener, M.J. (ed.) Advances in Cryptology - CRYPTO \u201999, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings. Lecture Notes in Computer Science, vol.\u00a01666, pp. 398\u2013412. Springer (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_26","DOI":"10.1007\/3-540-48405-1_26"},{"key":"26_CR6","doi-asserted-by":"publisher","unstructured":"Cnudde, T.D., Reparaz, O., Bilgin, B., Nikova, S., Nikov, V., Rijmen, V.: Masking AES with d+1 shares in hardware. In: Gierlichs, B., Poschmann, A.Y. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings. Lecture Notes in Computer Science, vol.\u00a09813, pp. 194\u2013212. Springer (2016). https:\/\/doi.org\/10.1007\/978-3-662-53140-2_10","DOI":"10.1007\/978-3-662-53140-2_10"},{"key":"26_CR7","unstructured":"Cooper, J., et\u00a0al.: Test vector leakage assessment (TVLA) methodology in practice. In: International Cryptographic Module Conference. vol.\u00a020 (2013)"},{"key":"26_CR8","doi-asserted-by":"publisher","unstructured":"Daemen, J., Dobraunig, C., Eichlseder, M., Gro\u00df, H., Mendel, F., Primas, R.: Protecting against statistical ineffective fault attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3), 508\u2013543 (2020). https:\/\/doi.org\/10.13154\/TCHES.V2020.I3.508-543","DOI":"10.13154\/TCHES.V2020.I3.508-543"},{"key":"26_CR9","doi-asserted-by":"publisher","unstructured":"Dehbaoui, A., Dutertre, J., Robisson, B., Tria, A.: Electromagnetic transient faults injection on a hardware and a software implementations of AES. In: Bertoni, G., Gierlichs, B. (eds.) 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven, Belgium, September 9, 2012, pp. 7\u201315. IEEE Computer Society (2012). https:\/\/doi.org\/10.1109\/FDTC.2012.15","DOI":"10.1109\/FDTC.2012.15"},{"issue":"1","key":"26_CR10","doi-asserted-by":"publisher","first-page":"229","DOI":"10.46586\/tches.v2024.i1.229-263","volume":"2024","author":"S Dhooghe","year":"2024","unstructured":"Dhooghe, S., Ovchinnikov, A., Toprakhisar, D.: Stati: protecting against fault attacks using stable threshold implementations. IACR Trans. Cryptographic Hardw. Embed. Syst. 2024(1), 229\u2013263 (2024)","journal-title":"IACR Trans. Cryptographic Hardw. Embed. Syst."},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Dhooghe, S., Ovchinnikov, A., Toprakhisar, D.: Stamac: fault protection via stable-mac tags. Cryptology ePrint Archive (2025)","DOI":"10.1007\/978-981-95-5096-8_13"},{"key":"26_CR12","doi-asserted-by":"publisher","unstructured":"Dobraunig, C., Eichlseder, M., Gro\u00df, H., Mangard, S., Mendel, F., Primas, R.: Statistical ineffective fault attacks on masked AES with fault countermeasures. In: Peyrin, T., Galbraith, S.D. (eds.) Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II. Lecture Notes in Computer Science, vol. 11273, pp. 315\u2013342. Springer (2018). https:\/\/doi.org\/10.1007\/978-3-030-03329-3_11","DOI":"10.1007\/978-3-030-03329-3_11"},{"key":"26_CR13","doi-asserted-by":"publisher","unstructured":"Dobraunig, C., Eichlseder, M., Korak, T., Mangard, S., Mendel, F., Primas, R.: SIFA: exploiting ineffective fault inductions on symmetric cryptography. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3), 547\u2013572 (2018). https:\/\/doi.org\/10.13154\/tches.v2018.i3.547-572","DOI":"10.13154\/tches.v2018.i3.547-572"},{"key":"26_CR14","doi-asserted-by":"publisher","unstructured":"Faust, S., Grosso, V., Pozo, S.M.D., Paglialonga, C., Standaert, F.: Composable masking schemes in the presence of physical defaults and the robust probing model. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3), 89\u2013120 (2018). https:\/\/doi.org\/10.13154\/TCHES.V2018.I3.89-120","DOI":"10.13154\/TCHES.V2018.I3.89-120"},{"key":"26_CR15","doi-asserted-by":"publisher","unstructured":"Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: Concrete results. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings. Lecture Notes in Computer Science, vol.\u00a02162, pp. 251\u2013261. Springer (2001). https:\/\/doi.org\/10.1007\/3-540-44709-1_21","DOI":"10.1007\/3-540-44709-1_21"},{"key":"26_CR16","doi-asserted-by":"publisher","unstructured":"Gro\u00df, H., Mangard, S., Korak, T.: Domain-oriented masking: compact masked hardware implementations with arbitrary protection order. In: Bilgin, B., Nikova, S., Rijmen, V. (eds.) Proceedings of the ACM Workshop on Theory of Implementation Security, TIS@CCS 2016 Vienna, Austria, October, 2016, p.\u00a03. ACM (2016). https:\/\/doi.org\/10.1145\/2996366.2996426","DOI":"10.1145\/2996366.2996426"},{"issue":"5","key":"26_CR17","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/TNS.1965.4323904","volume":"12","author":"DH Habing","year":"1965","unstructured":"Habing, D.H.: The use of lasers to simulate radiation-induced transients in semiconductor devices and circuits. IEEE Trans. Nucl. Sci. 12(5), 91\u2013100 (1965)","journal-title":"IEEE Trans. Nucl. Sci."},{"issue":"1","key":"26_CR18","doi-asserted-by":"publisher","first-page":"133","DOI":"10.46586\/tches.v2024.i1.133-156","volume":"2024","author":"H Hirata","year":"2024","unstructured":"Hirata, H., et al.: All you need is fault: Zero-value attacks on AES and a new $$\\lambda $$-detection m &m. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(1), 133\u2013156 (2024)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"26_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1007\/11761679_19","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"Y Ishai","year":"2006","unstructured":"Ishai, Y., Prabhakaran, M., Sahai, A., Wagner, D.: Private Circuits II: Keeping Secrets in Tamperable Circuits. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 308\u2013327. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11761679_19"},{"key":"26_CR20","doi-asserted-by":"publisher","unstructured":"Ishai, Y., Sahai, A., Wagner, D.A.: Private circuits: securing hardware against probing attacks. In: Boneh, D. (ed.) Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings. Lecture Notes in Computer Science, vol.\u00a02729, pp. 463\u2013481. Springer (2003). https:\/\/doi.org\/10.1007\/978-3-540-45146-4_27","DOI":"10.1007\/978-3-540-45146-4_27"},{"key":"26_CR21","doi-asserted-by":"publisher","unstructured":"Kocher, P.C.: Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems. In: Koblitz, N. (ed.) Advances in Cryptology - CRYPTO \u201996, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings. Lecture Notes in Computer Science, vol.\u00a01109, pp. 104\u2013113. Springer (1996). https:\/\/doi.org\/10.1007\/3-540-68697-5_9","DOI":"10.1007\/3-540-68697-5_9"},{"key":"26_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_25"},{"key":"26_CR23","doi-asserted-by":"publisher","unstructured":"Meyer, L.D., Arribas, V., Nikova, S., Nikov, V., Rijmen, V.: M &m: masks and macs against physical attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(1), 25\u201350 (2019). https:\/\/doi.org\/10.13154\/tches.v2019.i1.25-50","DOI":"10.13154\/tches.v2019.i1.25-50"},{"key":"26_CR24","doi-asserted-by":"publisher","unstructured":"Nikova, S., Rechberger, C., Rijmen, V.: Threshold implementations against side-channel attacks and glitches. In: Ning, P., Qing, S., Li, N. (eds.) Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings. Lecture Notes in Computer Science, vol.\u00a04307, pp. 529\u2013545. Springer (2006). https:\/\/doi.org\/10.1007\/11935308_38","DOI":"10.1007\/11935308_38"},{"key":"26_CR25","doi-asserted-by":"publisher","unstructured":"Ramezanpour, K., Ampadu, P., Diehl, W.: Rs-mask: random space masking as an integrated countermeasure against power and fault analysis. In: 2020 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2020, San Jose, CA, USA, December 7-11, 2020, pp. 176\u2013187. IEEE (2020). https:\/\/doi.org\/10.1109\/HOST45689.2020.9300266","DOI":"10.1109\/HOST45689.2020.9300266"},{"key":"26_CR26","doi-asserted-by":"publisher","unstructured":"Rasoolzadeh, S., Shahmirzadi, A.R., Moradi, A.: Impeccable circuits III. In: IEEE International Test Conference, ITC 2021, Anaheim, CA, USA, October 10-15, 2021, pp. 163\u2013169. IEEE (2021). https:\/\/doi.org\/10.1109\/ITC50571.2021.00024","DOI":"10.1109\/ITC50571.2021.00024"},{"key":"26_CR27","doi-asserted-by":"publisher","unstructured":"Reparaz, O., Bilgin, B., Nikova, S., Gierlichs, B., Verbauwhede, I.: Consolidating masking schemes. In: Gennaro, R., Robshaw, M. (eds.) Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I. Lecture Notes in Computer Science, vol.\u00a09215, pp. 764\u2013783. Springer (2015). https:\/\/doi.org\/10.1007\/978-3-662-47989-6_37","DOI":"10.1007\/978-3-662-47989-6_37"},{"key":"26_CR28","doi-asserted-by":"publisher","unstructured":"Reparaz, O., Meyer, L.D., Bilgin, B., Arribas, V., Nikova, S., Nikov, V., Smart, N.P.: CAPA: the spirit of beaver against physical attacks. In: Shacham, H., Boldyreva, A. (eds.) Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part I. Lecture Notes in Computer Science, vol. 10991, pp. 121\u2013151. Springer (2018). https:\/\/doi.org\/10.1007\/978-3-319-96884-1_5","DOI":"10.1007\/978-3-319-96884-1_5"},{"key":"26_CR29","unstructured":"Saha, S., Jap, D., Roy, D.B., Chakraborti, A., Bhasin, S., Mukhopadhyay, D.: Transform-and-encode: A countermeasure framework for statistical ineffective fault attacks on block ciphers. IACR Cryptol. ePrint Arch. p.\u00a0545 (2019). https:\/\/eprint.iacr.org\/2019\/545"},{"key":"26_CR30","unstructured":"SAKURA: side-channel Attack User Reference Architecture. http:\/\/satoh.cs.uec.ac.jp\/SAKURA\/index.html"},{"key":"26_CR31","doi-asserted-by":"publisher","unstructured":"Schneider, T., Moradi, A., G\u00fcneysu, T.: Parti - towards combined hardware countermeasures against side-channel and fault-injection attacks. In: Robshaw, M., Katz, J. (eds.) Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II. Lecture Notes in Computer Science, vol.\u00a09815, pp. 302\u2013332. Springer (2016). https:\/\/doi.org\/10.1007\/978-3-662-53008-5_11","DOI":"10.1007\/978-3-662-53008-5_11"},{"key":"26_CR32","doi-asserted-by":"publisher","unstructured":"Shahmirzadi, A.R., Rasoolzadeh, S., Moradi, A.: Impeccable circuits II. In: 57th ACM\/IEEE Design Automation Conference, DAC 2020, San Francisco, CA, USA, July 20-24, 2020, pp.\u00a01\u20136. IEEE (2020). https:\/\/doi.org\/10.1109\/DAC18072.2020.9218615","DOI":"10.1109\/DAC18072.2020.9218615"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography \u2013 SAC 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-10536-3_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:38:19Z","timestamp":1767321499000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-10536-3_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032105356","9783032105363"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-10536-3_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Selected Areas in Cryptography","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toronto, ON","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"32","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sacrypt2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sacworkshop.org\/SAC25\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}