{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:01:07Z","timestamp":1772283667097,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":49,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642312830","type":"print"},{"value":"9783642312847","type":"electronic"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31284-7_19","type":"book-chapter","created":{"date-parts":[[2012,6,13]],"date-time":"2012-06-13T06:15:58Z","timestamp":1339568158000},"page":"311-328","source":"Crossref","is-referenced-by-count":64,"title":["PICARO \u2013 A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance"],"prefix":"10.1007","author":[{"given":"Gilles","family":"Piret","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Roche","sequence":"additional","affiliation":[]},{"given":"Claude","family":"Carlet","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1007\/3-540-48285-7_34","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"E. Biham","year":"1994","unstructured":"Biham, E.: New Types of Cryptanalytic Attacks Using Related Keys. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 398\u2013409. Springer, Heidelberg (1994)"},{"key":"19_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1007\/BFb0053464","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"E. Biham","year":"1995","unstructured":"Biham, E., Biryukov, A.: An Improvement of Davies\u2019 Attack on DES. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 461\u2013467. Springer, Heidelberg (1995)"},{"key":"19_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/3-540-38424-3_1","volume-title":"Advances in Cryptology - CRYPTO \u201990","author":"E. Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystems. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol.\u00a0537, pp. 2\u201321. Springer, Heidelberg (1991)"},{"issue":"1","key":"19_CR4","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystems. Journal of Cryptology\u00a04(1), 3\u201372 (1991)","journal-title":"Journal of Cryptology"},{"key":"19_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/3-540-48519-8_18","volume-title":"Fast Software Encryption","author":"A. Biryukov","year":"1999","unstructured":"Biryukov, A., Wagner, D.: Slide Attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol.\u00a01636, pp. 245\u2013259. Springer, Heidelberg (1999)"},{"key":"19_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1007\/3-540-45539-6_41","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"A. Biryukov","year":"2000","unstructured":"Biryukov, A., Wagner, D.: Advanced Slide Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 589\u2013606. Springer, Heidelberg (2000)"},{"key":"19_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/3-540-60590-8_8","volume-title":"Fast Software Encryption","author":"M. Blaze","year":"1995","unstructured":"Blaze, M., Schneier, B.: The MacGuffin Block Cipher Algorithm. In: Preneel, B. (ed.) FSE 1994. LNCS, vol.\u00a01008, pp. 97\u2013110. Springer, Heidelberg (1995)"},{"key":"19_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-540-30564-4_5","volume-title":"Selected Areas in Cryptography","author":"J. Bl\u00f6mer","year":"2004","unstructured":"Bl\u00f6mer, J., Guajardo, J., Krummel, V.: Provably Secure Masking of AES. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol.\u00a03357, pp. 69\u201383. Springer, Heidelberg (2004)"},{"key":"19_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"E. Brier","year":"2004","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 16\u201329. Springer, Heidelberg (2004)"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Carlet, C.: Vectorial Boolean Functions for Cryptography (Chapter 9). In: Crama, Y., Hammer, P.L. (eds.) Boolean Models and Methods in Mathematics, Computer Science, and Engineering, pp. 398\u2013469. Cambridge University Press (2010), Prel. version: \n                    \n                      http:\/\/www.math.univ-paris13.fr\/~carlet\/pubs.html","DOI":"10.1017\/CBO9780511780448.012"},{"issue":"1-3","key":"19_CR11","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/s10623-010-9468-7","volume":"59","author":"C. Carlet","year":"2011","unstructured":"Carlet, C.: Relating three nonlinearity parameters of vectorial functions and building APN functions from bent functions. Des. Codes Cryptogr.\u00a059(1-3), 89\u2013109 (2011)","journal-title":"Des. Codes Cryptogr."},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Chari, S., Jutla, C., Rao, J., Rohatgi, P.: Towards Sound Approaches to Counteract Power-Analysis Attacks. In: Wiener (ed.) [49], pp. 398\u2013412","DOI":"10.1007\/3-540-48405-1_26"},{"key":"19_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/3-540-36492-7_13","volume-title":"Selected Areas in Cryptography","author":"P. Charpin","year":"2003","unstructured":"Charpin, P., Pasalic, E.: On Propagation Characteristics of Resilient Functions. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol.\u00a02595, pp. 175\u2013195. Springer, Heidelberg (2003)"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Coron, J.-S., Kizhvatov, I.: Analysis and improvement of the random delay countermeasure of ches 2009. In: Mangard, Standaert (eds.) [31], pp. 95\u2013109","DOI":"10.1007\/978-3-642-15031-9_7"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael. Springer (2002)","DOI":"10.1007\/978-3-662-04722-4"},{"issue":"1","key":"19_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BF00204799","volume":"8","author":"D.W. Davies","year":"1995","unstructured":"Davies, D.W., Murphy, S.: Pairs and triplets of DES s-boxes. J. Cryptology\u00a08(1), 1\u201325 (1995)","journal-title":"J. Cryptology"},{"key":"19_CR17","unstructured":"Durvaux, F., Renauld, M., Standaert, F.-X., van Oldeneel tot Oldenzeel, L., Veyrat-Charvillon, N.: Cryptanalysis of the ches 2009\/2010 random delay countermeasure. Cryptology ePrint Archive, Report 2012\/038 (2012), \n                    \n                      http:\/\/eprint.iacr.org\/"},{"key":"19_CR18","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"J. Feigenbaum","year":"1991","unstructured":"Feigenbaum, J.: EUROCRYPT 1991. LNCS, vol.\u00a0547. Springer, Heidelberg (1991)"},{"key":"19_CR19","doi-asserted-by":"crossref","unstructured":"Genelle, L., Prouff, E., Quisquater, M.: Thwarting higher-order side channel analysis with additive and multiplicative maskings. In: Preneel, Takagi (eds.) [38], pp. 240\u2013255","DOI":"10.1007\/978-3-642-23951-9_16"},{"key":"19_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/978-3-540-85053-3_27","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"B. Gierlichs","year":"2008","unstructured":"Gierlichs, B., Batina, L., Tuyls, P., Preneel, B.: Mutual Information Analysis. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol.\u00a05154, pp. 426\u2013442. Springer, Heidelberg (2008)"},{"key":"19_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/3-540-48059-5_15","volume-title":"Cryptographic Hardware and Embedded Systems","author":"L. Goubin","year":"1999","unstructured":"Goubin, L., Patarin, J.: DES and Differential Power Analysis. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol.\u00a01717, pp. 158\u2013172. Springer, Heidelberg (1999)"},{"key":"19_CR22","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","year":"1994","unstructured":"Helleseth, T. (ed.): EUROCRYPT 1993. LNCS, vol.\u00a0765. Springer, Heidelberg (1994)"},{"key":"19_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1007\/978-3-540-45146-4_27","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"Y. Ishai","year":"2003","unstructured":"Ishai, Y., Sahai, A., Wagner, D.: Private Circuits: Securing Hardware against Probing Attacks. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 463\u2013481. Springer, Heidelberg (2003)"},{"key":"19_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/3-540-68697-5_19","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"J. Kelsey","year":"1996","unstructured":"Kelsey, J., Schneier, B., Wagner, D.: Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 237\u2013251. Springer, Heidelberg (1996)"},{"key":"19_CR25","doi-asserted-by":"crossref","unstructured":"Kim, H., Hong, S., Lim, J.: A fast and provably secure higher-order masking of AES s-box. In: Preneel, Takagi (eds.) [38], pp. 95\u2013107","DOI":"10.1007\/978-3-642-23951-9_7"},{"key":"19_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/3-540-60590-8_16","volume-title":"Fast Software Encryption","author":"L.R. Knudsen","year":"1995","unstructured":"Knudsen, L.R.: Truncated and Higher Order Differentials. In: Preneel, B. (ed.) FSE 1994. LNCS, vol.\u00a01008, pp. 196\u2013211. Springer, Heidelberg (1995)"},{"key":"19_CR27","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener (ed.) [49], pp. 388\u2013397","DOI":"10.1007\/3-540-48405-1_25"},{"key":"19_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/11593447_23","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"S. Kunz-Jacques","year":"2005","unstructured":"Kunz-Jacques, S., Muller, F.: New Improvements of Davies-Murphy Cryptanalysis. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol.\u00a03788, pp. 425\u2013442. Springer, Heidelberg (2005)"},{"key":"19_CR29","doi-asserted-by":"crossref","unstructured":"Lai, X., Massey, J.L., Murphy, S.: Markov ciphers and differential cryptanalysis. In: Feigenbaum (ed.) [18], pp. 17\u201338","DOI":"10.1007\/3-540-46416-6_2"},{"key":"19_CR30","doi-asserted-by":"crossref","first-page":"257","DOI":"10.4064\/aa-22-3-257-265","volume":"22","author":"R. Lidl","year":"1973","unstructured":"Lidl, R., Niederreiter, H.: On orthogonal systems and permutation polynomials in several variables. Acta Arith.\u00a022, 257\u2013265 (1973)","journal-title":"Acta Arith."},{"key":"19_CR31","series-title":"Lecture Notes in Computer Science","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","year":"2010","unstructured":"Mangard, S., Standaert, F.-X. (eds.): CHES 2010. LNCS, vol.\u00a06225. Springer, Heidelberg (2010)"},{"key":"19_CR32","doi-asserted-by":"crossref","unstructured":"Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth (ed.) [22], pp. 386\u2013397","DOI":"10.1007\/3-540-48285-7_33"},{"key":"19_CR33","doi-asserted-by":"crossref","unstructured":"Matsui, M.: On correlation between the order of S-boxes and the strength of DES. In: Santis (ed.) [44], pp. 366\u2013375","DOI":"10.1007\/BFb0053451"},{"issue":"2","key":"19_CR34","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/s00145-010-9085-7","volume":"24","author":"S. Nikova","year":"2011","unstructured":"Nikova, S., Rijmen, V., Schl\u00e4ffer, M.: Secure hardware implementation of nonlinear functions in the presence of glitches. J. Cryptology\u00a024(2), 292\u2013321 (2011)","journal-title":"J. Cryptology"},{"key":"19_CR35","doi-asserted-by":"crossref","unstructured":"Nyberg, K.: Perfect nonlinear S-boxes. In: Feigenbaum (ed.) [18], pp. 378\u2013386","DOI":"10.1007\/3-540-46416-6_32"},{"key":"19_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/3-540-48285-7_6","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"K. Nyberg","year":"1994","unstructured":"Nyberg, K.: Differentially Uniform Mappings for Cryptography. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 55\u201364. Springer, Heidelberg (1994)"},{"key":"19_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/11502760_28","volume-title":"Fast Software Encryption","author":"E. Oswald","year":"2005","unstructured":"Oswald, E., Mangard, S., Pramstaller, N., Rijmen, V.: A Side-Channel Analysis Resistant Description of the AES S-Box. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol.\u00a03557, pp. 413\u2013423. Springer, Heidelberg (2005)"},{"key":"19_CR38","series-title":"Lecture Notes in Computer Science","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","year":"2011","unstructured":"Preneel, B., Takagi, T. (eds.): CHES 2011. LNCS, vol.\u00a06917. Springer, Heidelberg (2011)"},{"key":"19_CR39","doi-asserted-by":"crossref","unstructured":"Prouff, E., Roche, T.: Higher-order glitches free implementation of the AES using secure multi-party computation protocols. In: Preneel, Takagi (eds.) [38], pp. 63\u201378","DOI":"10.1007\/978-3-642-23951-9_5"},{"key":"19_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/3-540-60590-8_27","volume-title":"Fast Software Encryption","author":"V. Rijmen","year":"1995","unstructured":"Rijmen, V., Preneel, B.: Cryptanalysis of McGuffin. In: Preneel, B. (ed.) FSE 1994. LNCS, vol.\u00a01008, pp. 353\u2013358. Springer, Heidelberg (1995)"},{"issue":"3","key":"19_CR41","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1023\/A:1008224928678","volume":"12","author":"V. Rijmen","year":"1997","unstructured":"Rijmen, V., Preneel, B., Win, E.D.: On weaknesses of non-surjective round functions. Des. Codes Cryptography\u00a012(3), 253\u2013266 (1997)","journal-title":"Des. Codes Cryptography"},{"key":"19_CR42","unstructured":"Rivain, M., Dottax, E., Prouff, E.: Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis. Cryptology ePrint Archive, Report 2008\/021 (2008), \n                    \n                      http:\/\/eprint.iacr.org\/"},{"key":"19_CR43","doi-asserted-by":"crossref","unstructured":"Rivain, M., Prouff, E.: Provably secure higher-order masking of aes. In: Mangard, Standaert (eds.) [31], pp. 413\u2013427","DOI":"10.1007\/978-3-642-15031-9_28"},{"key":"19_CR44","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","year":"1995","unstructured":"De Santis, A. (ed.): EUROCRYPT 1994. LNCS, vol.\u00a0950. Springer, Heidelberg (1995)"},{"key":"19_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/11605805_14","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"K. Schramm","year":"2006","unstructured":"Schramm, K., Paar, C.: Higher Order Masking of the AES. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol.\u00a03860, pp. 208\u2013225. Springer, Heidelberg (2006)"},{"key":"19_CR46","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-30539-2_1","volume-title":"Advances in Cryptology - ASIACRYPT 2004","author":"T. Shirai","year":"2004","unstructured":"Shirai, T., Preneel, B.: On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol.\u00a03329, pp. 1\u201315. Springer, Heidelberg (2004)"},{"key":"19_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/978-3-540-25937-4_17","volume-title":"Fast Software Encryption","author":"T. Shirai","year":"2004","unstructured":"Shirai, T., Shibutani, K.: Improving Immunity of Feistel Ciphers against Differential Cryptanalysis by Using Multiple MDS Matrices. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol.\u00a03017, pp. 260\u2013278. Springer, Heidelberg (2004)"},{"key":"19_CR48","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/11799313_4","volume-title":"Fast Software Encryption","author":"T. Shirai","year":"2006","unstructured":"Shirai, T., Shibutani, K.: On Feistel Structures Using a Diffusion Switching Mechanism. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol.\u00a04047, pp. 41\u201356. Springer, Heidelberg (2006)"},{"key":"19_CR49","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology - CRYPTO \u201999","year":"1999","unstructured":"Wiener, M. (ed.): CRYPTO 1999. LNCS, vol.\u00a01666. Springer, Heidelberg (1999)"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31284-7_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T20:43:24Z","timestamp":1558298604000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31284-7_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642312830","9783642312847"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31284-7_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}