{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T12:55:25Z","timestamp":1770814525818,"version":"3.50.1"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032163417","type":"print"},{"value":"9783032163424","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-16342-4_2","type":"book-chapter","created":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T08:58:08Z","timestamp":1770800288000},"page":"21-40","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Efficient Time Share Masking of\u00a0AES"],"prefix":"10.1007","author":[{"given":"Subhadeep","family":"Banik","sequence":"first","affiliation":[]},{"given":"Francesco","family":"Regazzoni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,12]]},"reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-319-49890-4_10","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2016","author":"S Banik","year":"2016","unstructured":"Banik, S., Bogdanov, A., Regazzoni, F.: Atomic-AES: a compact implementation of the AES encryption\/decryption core. In: Dunkelman, O., Sanadhya, S.K. (eds.) INDOCRYPT 2016. LNCS, vol. 10095, pp. 173\u2013190. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-49890-4_10"},{"issue":"1","key":"2_CR2","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/s13389-017-0176-3","volume":"9","author":"S Banik","year":"2019","unstructured":"Banik, S., Bogdanov, A., Regazzoni, F.: Compact circuits for combined AES encryption\/decryption. J. Cryptogr. Eng. 9(1), 69\u201383 (2019)","journal-title":"J. Cryptogr. Eng."},{"issue":"1","key":"2_CR3","first-page":"239","volume":"2021","author":"F Balli","year":"2021","unstructured":"Balli, F., Caforio, A., Banik, S.: The area-latency symbiosis: towards improved serial encryption circuits. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(1), 239\u2013278 (2021)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"2_CR4","doi-asserted-by":"publisher","first-page":"2542","DOI":"10.1109\/TIFS.2020.2971153","volume":"15","author":"G Cassiers","year":"2020","unstructured":"Cassiers, G., Standaert, F.-X.: Trivially and efficiently composing masked gadgets with probe isolating non-interference. IEEE Trans. Inf. Forensics Secur. 15, 2542\u20132555 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Dhooghe, S., Nikova, S., Rijmen, V.: Threshold implementations in the robust probing model. In: Bilgin, B., Petkova-Nikova, S., Rijmen, V. (eds.) Proceedings of ACM Workshop on Theory of Implementation Security, TIS@CCS 2019, London, UK, 11 November 2019, pp. 30\u201337. ACM (2019)","DOI":"10.1145\/3338467.3358949"},{"issue":"2","key":"2_CR6","first-page":"1","volume":"2018","author":"H Gro\u00df","year":"2018","unstructured":"Gro\u00df, H., Iusupov, R., Bloem, R.: Generic low-latency masking in hardware. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(2), 1\u201321 (2018)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Gro\u00df, H., Mangard, S., Korak, T.: Domain-oriented masking: compact masked hardware implementations with arbitrary protection order. In: Bilgin, B., Nikova, S., Rijmen, V. (eds.) Proceedings of the ACM Workshop on Theory of Implementation Security, TIS@CCS 2016, Vienna, Austria, October 2016, p.\u00a03. ACM (2016)","DOI":"10.1145\/2996366.2996426"},{"key":"2_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1007\/978-3-319-66787-4_33","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2017","author":"J Jean","year":"2017","unstructured":"Jean, J., Moradi, A., Peyrin, T., Sasdrich, P.: Bit-Sliding: a generic technique for bit-serial implementations of SPN-based primitives. In: Fischer, W., Homma, N. (eds.) CHES 2017. LNCS, vol. 10529, pp. 687\u2013707. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66787-4_33"},{"key":"2_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"787","DOI":"10.1007\/978-3-030-64837-4_26","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2020","author":"D Knichel","year":"2020","unstructured":"Knichel, D., Sasdrich, P., Moradi, A.: SILVER \u2013 statistical independence and\u00a0leakage verification. In: Moriai, S., Wang, H. (eds.) ASIACRYPT 2020. LNCS, vol. 12491, pp. 787\u2013816. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-64837-4_26"},{"key":"2_CR10","unstructured":"Maximov, A.: AES mixcolumn with 92 XOR gates. IACR Cryptol. ePrint Arch. 833 (2019)"},{"key":"2_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-642-20465-4_6","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2011","author":"A Moradi","year":"2011","unstructured":"Moradi, A., Poschmann, A., Ling, S., Paar, C., Wang, H.: Pushing the limits: a very compact and a threshold implementation of AES. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 69\u201388. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-20465-4_6"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Moradi, A., Standaert, F.X.: Moments-correlating dpa. In: Proceedings of the 2016 ACM Workshop on Theory of Implementation Security, pp. 5\u201315 (2016)","DOI":"10.1145\/2996366.2996369"},{"key":"2_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"764","DOI":"10.1007\/978-3-662-47989-6_37","volume-title":"Advances in Cryptology \u2013 CRYPTO 2015","author":"O Reparaz","year":"2015","unstructured":"Reparaz, O., Bilgin, B., Nikova, S., Gierlichs, B., Verbauwhede, I.: Consolidating masking schemes. In: Gennaro, R., Robshaw, M. (eds.) CRYPTO 2015. LNCS, vol. 9215, pp. 764\u2013783. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-47989-6_37"},{"key":"2_CR14","unstructured":"Time share masking. https:\/\/github.com\/KULeuven-COSIC\/TSM"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Dilip Kumar, S.V., Dhooghe, S., Balasch, J., Gierlichs, B., Verbauwhede, I.: Time sharing-a novel approach to low-latency masking. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(3), 249\u2013272 (2024)","DOI":"10.46586\/tches.v2024.i3.249-272"},{"issue":"3","key":"2_CR16","doi-asserted-by":"publisher","first-page":"1114","DOI":"10.1007\/s00145-019-09342-y","volume":"33","author":"F Wegener","year":"2020","unstructured":"Wegener, F., De Meyer, L., Moradi, A.: Spin me right round rotational symmetry for fpga-specific AES: extended version. J. Cryptol. 33(3), 1114\u20131155 (2020)","journal-title":"J. Cryptol."}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Applied Cryptography Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-16342-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T08:58:13Z","timestamp":1770800293000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-16342-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032163417","9783032163424"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-16342-4_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"12 February 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPACE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy, and Applied Cryptography Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guwahati","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 December 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"space2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/event.iitg.ac.in\/space2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}