{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T13:05:35Z","timestamp":1765112735825},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642299117"},{"type":"electronic","value":"9783642299124"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29912-4_6","type":"book-chapter","created":{"date-parts":[[2012,4,19]],"date-time":"2012-04-19T07:19:30Z","timestamp":1334819970000},"page":"69-81","source":"Crossref","is-referenced-by-count":59,"title":["Conversion of Security Proofs from One Leakage Model to Another: A New Issue"],"prefix":"10.1007","author":[{"given":"Jean-S\u00e9bastien","family":"Coron","sequence":"first","affiliation":[]},{"given":"Christophe","family":"Giraud","sequence":"additional","affiliation":[]},{"given":"Emmanuel","family":"Prouff","sequence":"additional","affiliation":[]},{"given":"Soline","family":"Renner","sequence":"additional","affiliation":[]},{"given":"Matthieu","family":"Rivain","sequence":"additional","affiliation":[]},{"given":"Praveen Kumar","family":"Vadnala","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-540-30564-4_5","volume-title":"Selected Areas in Cryptography","author":"J. Bl\u00f6mer","year":"2004","unstructured":"Bl\u00f6mer, J., Guajardo, J., Krummel, V.: Provably Secure Masking of AES. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol.\u00a03357, pp. 69\u201383. Springer, Heidelberg (2004)"},{"key":"6_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1007\/3-540-48405-1_26","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"S. Chari","year":"1999","unstructured":"Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards Sound Approaches to Counteract Power-Analysis Attacks. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 398\u2013412. Springer, Heidelberg (1999)"},{"issue":"2","key":"6_CR3","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/s13389-011-0010-2","volume":"1","author":"Julien Doget","year":"2011","unstructured":"Doget, J., Prouff, E., Rivain, M., Standaert, F.: Univariate side channel attacks and leakage modeling. In: Schindler, W., Huss, S. (eds.) Second International Workshop on Constructive Side-Channel Analysis and Secure Design \u2013 COSADE 2011 (2011)","journal-title":"Journal of Cryptographic Engineering"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1007\/978-3-642-23951-9_16","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"L. Genelle","year":"2011","unstructured":"Genelle, L., Prouff, E., Quisquater, M.: Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol.\u00a06917, pp. 240\u2013255. Springer, Heidelberg (2011)"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/3-540-48059-5_15","volume-title":"Cryptographic Hardware and Embedded Systems","author":"L. Goubin","year":"1999","unstructured":"Goubin, L., Patarin, J.: DES and Differential Power Analysis \u2013 The Duplication Method. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol.\u00a01717, pp. 158\u2013172. Springer, Heidelberg (1999)"},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/3-540-44706-7_11","volume-title":"Fast Software Encryption","author":"T.S. Messerges","year":"2001","unstructured":"Messerges, T.S.: Securing the AES Finalists Against Power Analysis Attacks. In: Schneier, B. (ed.) FSE 2000. LNCS, vol.\u00a01978, pp. 150\u2013164. Springer, Heidelberg (2001)"},{"key":"6_CR7","unstructured":"Oswald, E., Mangard, S., Pramstaller, N.: Secure and Efficient Masking of AES \u2013 A Mission Impossible? Cryptology ePrint Archive, Report 2004\/134 (2004)"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/11604938_23","volume-title":"Information Security Applications","author":"E. Oswald","year":"2006","unstructured":"Oswald, E., Schramm, K.: An Efficient Masking Scheme for AES Software Implementations. In: Song, J., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, vol.\u00a03786, pp. 292\u2013305. Springer, Heidelberg (2006)"},{"issue":"1","key":"6_CR9","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.vlsi.2005.12.013","volume":"40","author":"E. Peeters","year":"2007","unstructured":"Peeters, E., Standaert, F.-X., Quisquater, J.-J.: Power and Electromagnetic Analysis: Improved Model, Consequences and Comparisons. Integration\u00a040(1), 52\u201360 (2007)","journal-title":"Integration"},{"key":"6_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-3-540-77535-5_17","volume-title":"Information Security Applications","author":"E. Prouff","year":"2008","unstructured":"Prouff, E., Rivain, M.: A Generic Method for Secure SBox Implementation. In: Kim, S., Yung, M., Lee, H.-W. (eds.) WISA 2007. LNCS, vol.\u00a04867, pp. 227\u2013244. Springer, Heidelberg (2008)"},{"issue":"6","key":"6_CR11","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1109\/TC.2009.15","volume":"58","author":"E. Prouff","year":"2009","unstructured":"Prouff, E., Rivain, M., B\u00e9van, R.: Statistical Analysis of Second Order Differential Power Analysis. IEEE Trans. Comput.\u00a058(6), 799\u2013811 (2009)","journal-title":"IEEE Trans. Comput."},{"key":"6_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-642-23951-9_5","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"E. Prouff","year":"2011","unstructured":"Prouff, E., Roche, T.: Higher-Order Glitches Free Implementation of the AES Using Secure Multi-party Computation Protocols. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol.\u00a06917, pp. 63\u201378. Springer, Heidelberg (2011)"},{"key":"6_CR13","unstructured":"Rivain, M., Dottax, E., Prouff, E.: Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis. Cryptology ePrint Archive, Report 2008\/021 (2008), \n                    \n                      http:\/\/eprint.iacr.org\/"},{"key":"6_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-3-540-71039-4_8","volume-title":"Fast Software Encryption","author":"M. Rivain","year":"2008","unstructured":"Rivain, M., Dottax, E., Prouff, E.: Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol.\u00a05086, pp. 127\u2013143. Springer, Heidelberg (2008)"},{"key":"6_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/978-3-642-15031-9_28","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"M. Rivain","year":"2010","unstructured":"Rivain, M., Prouff, E.: Provably Secure Higher-Order Masking of AES. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol.\u00a06225, pp. 413\u2013427. Springer, Heidelberg (2010)"},{"key":"6_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/11545262_3","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"W. Schindler","year":"2005","unstructured":"Schindler, W., Lemke, K., Paar, C.: A Stochastic Model for Differential Side Channel Cryptanalysis. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol.\u00a03659, pp. 30\u201346. Springer, Heidelberg (2005)"},{"key":"6_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/11605805_14","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"K. Schramm","year":"2006","unstructured":"Schramm, K., Paar, C.: Higher Order Masking of the AES. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol.\u00a03860, pp. 208\u2013225. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Constructive Side-Channel Analysis and Secure Design"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29912-4_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T00:38:40Z","timestamp":1558312720000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29912-4_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642299117","9783642299124"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29912-4_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}