{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T11:29:04Z","timestamp":1769858944015,"version":"3.49.0"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032155405","type":"print"},{"value":"9783032155412","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-15541-2_11","type":"book-chapter","created":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T20:07:45Z","timestamp":1769803665000},"page":"198-211","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Protecting AES-128 Against First-Order Side-Channel Analysis in\u00a0Micro-Architectures by\u00a0Enforcing Threshold Implementation Principles"],"prefix":"10.1007","author":[{"given":"Charles-Antoine","family":"De Paepe","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1626-6175","authenticated-orcid":false,"given":"John","family":"Gaspoz","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4551-6775","authenticated-orcid":false,"given":"Dilara","family":"Toprakhisar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3133-9261","authenticated-orcid":false,"given":"Svetla","family":"Nikova","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,31]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Adomnicai, A., Peyrin, T.: Fixslicing AES-like ciphers: new bitsliced AES speed records on ARM-Cortex M and RISC-V. Cryptology ePrint Archive, Paper 2020\/1123 (2020). https:\/\/eprint.iacr.org\/2020\/1123","DOI":"10.46586\/tches.v2021.i1.402-425"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Beckers, A., Wouters, L., Gierlichs, B., Preneel, B., Verbauwhede, I.: Provable secure software masking in the real-world. Cryptology ePrint Archive, Paper 2022\/327 (2022). https:\/\/eprint.iacr.org\/2022\/327","DOI":"10.1007\/978-3-030-99766-3_10"},{"key":"11_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/BFb0052352","volume-title":"Fast Software Encryption","author":"E Biham","year":"1997","unstructured":"Biham, E.: A fast new DES implementation in software. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 260\u2013272. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/BFb0052352"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/11545262_32","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"D Canright","year":"2005","unstructured":"Canright, D.: A very compact S-box for AES. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 441\u2013455. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11545262_32"},{"key":"11_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1007\/3-540-48405-1_26","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"S Chari","year":"1999","unstructured":"Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards sound approaches to counteract power-analysis attacks. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 398\u2013412. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_26"},{"key":"11_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/978-3-319-66787-4_7","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2017","author":"J Daemen","year":"2017","unstructured":"Daemen, J.: Changing of the guards: a simple and efficient method for achieving uniformity in threshold sharing. In: Fischer, W., Homma, N. (eds.) CHES 2017. LNCS, vol. 10529, pp. 137\u2013153. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66787-4_7"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Daemen, J., Dobraunig, C., Eichlseder, M., Gro\u00df, H., Mendel, F., Primas, R.: Protecting against statistical ineffective fault attacks. IACR Trans. Cryptogr. Hardware Embed. Syst., 508\u2013543 (2020)","DOI":"10.46586\/tches.v2020.i3.508-543"},{"key":"11_CR8","unstructured":"Faust, S., Grosso, V., Pozo, S.M.D., Paglialonga, C., Standaert, F.X.: Composable masking schemes in the presence of physical defaults and the robust probing model. Cryptology ePrint Archive, Paper 2017\/711 (2017). https:\/\/eprint.iacr.org\/2017\/711"},{"key":"11_CR9","doi-asserted-by":"publisher","unstructured":"Gao, S., Marshall, B., Page, D., Oswald, E.: Share-slicing: friend or foe? IACR Trans. Cryptogr. Hardware Embed. Syst. 2020(1), 152\u2013174 (2019). https:\/\/doi.org\/10.13154\/tches.v2020.i1.152-174, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/8396","DOI":"10.13154\/tches.v2020.i1.152-174"},{"key":"11_CR10","unstructured":"Gao, S., Oswald, E., Page, D.: Reverse engineering the microarchitectural leakage features of a commercial processor (2021). https:\/\/eprint.iacr.org\/2021\/794"},{"key":"11_CR11","unstructured":"Gaspoz, J., Dhooghe, S.: Threshold implementations in software: micro-architectural leakages in algorithms. Cryptology ePrint Archive, Paper 2022\/1546 (2022). https:\/\/eprint.iacr.org\/2022\/1546"},{"key":"11_CR12","unstructured":"Gigerl, B., Hadzic, V., Primas, R., Mangard, S., Bloem, R.: Coco: co-design and co-verification of masked software implementations on CPUs. In: USENIX Security Symposium, January 2021 (2021). https:\/\/www.usenix.net\/system\/files\/sec21fall-gigerl.pdf"},{"key":"11_CR13","unstructured":"Gohr, A., Jacob, S., Schindler, W.: CHES 2018 side channel contest CTF - solution of the AES challenges. Cryptology ePrint Archive, Paper 2019\/094 (2019). https:\/\/eprint.iacr.org\/2019\/094"},{"key":"11_CR14","unstructured":"Goodwill, G., Jun, B., Jaffe, J., Rohatgi, P.: A testing methodology for side channel resistance validation (2011). https:\/\/csrc.nist.gov\/csrc\/media\/events\/non-invasive-attack-testing-workshop\/documents\/08_goodwill.pdf. Retrieved 18 Apr 2025"},{"key":"11_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/3-540-48059-5_15","volume-title":"Cryptographic Hardware and Embedded Systems","author":"L Goubin","year":"1999","unstructured":"Goubin, L., Patarin, J.: DES and differential power analysis the \u201cduplication\u2019\u2019 method. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 158\u2013172. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48059-5_15"},{"key":"11_CR16","unstructured":"Gross, H., Stoffelen, K., Meyer, L.D., Krenn, M., Mangard, S.: Masking the AES with only two random bits. Cryptology ePrint Archive, Paper 2018\/1007 (2018). https:\/\/eprint.iacr.org\/2018\/1007"},{"key":"11_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201996","author":"PC Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104\u2013113. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-68697-5_9"},{"key":"11_CR18","doi-asserted-by":"publisher","unstructured":"Marshall, B., Page, D., Webb, J.: Miracle: Micro-architectural leakage evaluation. IACR Trans. Cryptogr. Hardware Embed. Syst., 175\u2013220 (2021).https:\/\/doi.org\/10.46586\/tches.v2022.i1.175-220","DOI":"10.46586\/tches.v2022.i1.175-220"},{"key":"11_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/10718964_10","volume-title":"Information Security and Privacy","author":"L May","year":"2000","unstructured":"May, L., Penna, L., Clark, A.: An implementation of bitsliced DES on the Pentium MMXTM processor. In: Dawson, E.P., Clark, A., Boyd, C. (eds.) ACISP 2000. LNCS, vol. 1841, pp. 112\u2013122. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/10718964_10"},{"key":"11_CR20","unstructured":"NewAE: CW308 UFO. https:\/\/rtfm.newae.com\/Targets\/CW308%20UFO\/. Accessed 24 May 2025"},{"key":"11_CR21","unstructured":"NewAE: CW308T-STM32F. https:\/\/rtfm.newae.com\/Targets\/UFO%20Targets\/CW308T-STM32F\/. Accessed 24 May 2025"},{"key":"11_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1007\/11935308_38","volume-title":"Information and Communications Security","author":"S Nikova","year":"2006","unstructured":"Nikova, S., Rechberger, C., Rijmen, V.: Threshold implementations against side-channel attacks and glitches. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 529\u2013545. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11935308_38"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Papagiannopoulos, K., Veshchikov, N.: Mind the gap: towards secure 1st-order masking in software. Cryptology ePrint Archive, Paper 2017\/345 (2017). https:\/\/eprint.iacr.org\/2017\/345","DOI":"10.1007\/978-3-319-64647-3_17"},{"key":"11_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-642-20465-4_8","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2011","author":"M Renauld","year":"2011","unstructured":"Renauld, M., Standaert, F.-X., Veyrat-Charvillon, N., Kamel, D., Flandre, D.: A formal study of power variability issues and side-channel attacks for nanoscale devices. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 109\u2013128. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-20465-4_8"},{"key":"11_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/978-3-319-69453-5_10","volume-title":"Selected Areas in Cryptography \u2013 SAC 2016","author":"P Schwabe","year":"2017","unstructured":"Schwabe, P., Stoffelen, K.: All the AES you need on Cortex-M3 and M4. In: Avanzi, R., Heys, H. (eds.) SAC 2016. LNCS, vol. 10532, pp. 180\u2013194. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-69453-5_10"},{"key":"11_CR26","doi-asserted-by":"publisher","unstructured":"Shelton, M.A., Samwel, N., Batina, L., Regazzoni, F., Wagner, M., Yarom, Y.: ROSITA: towards automatic elimination of power-analysis leakage in ciphers. Cryptology ePrint Archive, Paper 2019\/1445 (2019). https:\/\/doi.org\/10.14722\/ndss.2021.23137, https:\/\/eprint.iacr.org\/2019\/1445","DOI":"10.14722\/ndss.2021.23137"},{"key":"11_CR27","unstructured":"STMicroelectronics: STM32F415RG. https:\/\/www.st.com\/en\/microcontrollers-microprocessors\/stm32f415rg.html. Accessed 19 May 2025"},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"Sugawara, T.: 3-share threshold implementation of AES S-box without fresh randomness. IACR Trans. Cryptogr. Hardware Embed. Syst., 123\u2013145 (2019)","DOI":"10.46586\/tches.v2019.i1.123-145"}],"container-title":["Lecture Notes in Computer Science","Lightweight Cryptography for Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-15541-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T20:07:49Z","timestamp":1769803669000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-15541-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032155405","9783032155412"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-15541-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"31 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"LightSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Lightweight Cryptography for Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Istanbul","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"T\u00fcrkiye","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"lightsec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.encrypt-on.com\/activities\/conferences\/lightsec-2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}