{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T14:44:44Z","timestamp":1725461084705},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642372872"},{"type":"electronic","value":"9783642372889"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37288-9_7","type":"book-chapter","created":{"date-parts":[[2013,3,5]],"date-time":"2013-03-05T08:37:43Z","timestamp":1362472663000},"page":"91-105","source":"Crossref","is-referenced-by-count":1,"title":["Secure Multiple SBoxes Implementation with Arithmetically Masked Input"],"prefix":"10.1007","author":[{"given":"Luk","family":"Bettale","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/978-3-540-25937-4_21","volume-title":"Fast Software Encryption","author":"M.-L. Akkar","year":"2004","unstructured":"Akkar, M.-L., B\u00e9van, R., Goubin, L.: Two Power Analysis Attacks against One-Mask Methods. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol.\u00a03017, pp. 332\u2013347. Springer, Heidelberg (2004)"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Akkar, M.L., Giraud, C.: An Implementation of DES and AES, Secure against Some Attacks. In: Ko\u00e7, et al. (eds.) [14], pp. 309\u2013318","DOI":"10.1007\/3-540-44709-1_26"},{"key":"7_CR3","unstructured":"Biham, E., Shamir, A.: Power Analysis of the Key Scheduling of the AES Candidates. In: Second AES Candidate Conference \u2013 AES 2 (March 1999), \n                    \n                      http:\/\/csrc.nist.gov\/encryption\/aes\/round1\/conf2\/aes2conf.htm"},{"key":"7_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-540-30564-4_5","volume-title":"Selected Areas in Cryptography","author":"J. Bl\u00f6mer","year":"2004","unstructured":"Bl\u00f6mer, J., Guajardo, J., Krummel, V.: Provably Secure Masking of AES. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol.\u00a03357, pp. 69\u201383. Springer, Heidelberg (2004)"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, Quisquater (eds.) [12], pp. 16\u201329","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Chari, S., Jutla, C., Rao, J., Rohatgi, P.: Towards Sound Approaches to Counteract Power-Analysis Attacks. In: Wiener (ed.) [27], pp. 398\u2013412","DOI":"10.1007\/3-540-48405-1_26"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/978-3-540-45238-6_8","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"J.-S. Coron","year":"2003","unstructured":"Coron, J.-S., Tchulkine, A.: A New Algorithm for Switching from Arithmetic to Boolean Masking. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 89\u201397. Springer, Heidelberg (2003)"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-642-33027-8_7","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2012","author":"B. Debraize","year":"2012","unstructured":"Debraize, B.: Efficient and provably secure methods for switching from arithmetic to boolean masking. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol.\u00a07428, pp. 107\u2013121. Springer, Heidelberg (2012)"},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-642-13708-2_13","volume-title":"Applied Cryptography and Network Security","author":"L. Genelle","year":"2010","unstructured":"Genelle, L., Prouff, E., Quisquater, M.: Secure multiplicative masking of power functions. In: Zhou, J., Yung, M. (eds.) ACNS 2010. LNCS, vol.\u00a06123, pp. 200\u2013217. Springer, Heidelberg (2010)"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Goubin, L.: A Sound Method for Switching between Boolean and Arithmetic Masking. In: Ko\u00e7, et al. (eds.) [14], pp. 3\u201315","DOI":"10.1007\/3-540-44709-1_2"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/3-540-48059-5_15","volume-title":"Cryptographic Hardware and Embedded Systems","author":"L. Goubin","year":"1999","unstructured":"Goubin, L., Patarin, J.: DES and Differential Power Analysis \u2013 The \u201cDuplication\u201d Method. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol.\u00a01717, pp. 158\u2013172. Springer, Heidelberg (1999)"},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","year":"2004","unstructured":"Joye, M., Quisquater, J.-J. (eds.): CHES 2004. LNCS, vol.\u00a03156. Springer, Heidelberg (2004)"},{"issue":"2","key":"7_CR13","doi-asserted-by":"publisher","first-page":"267","DOI":"10.4218\/etrij.11.1510.0112","volume":"33","author":"H. Kim","year":"2011","unstructured":"Kim, H., Cho, Y.I., Choi, D., Han, D.G., Hong, S.: Efficient masked implementation for SEED based on combined masking. ETRI Journal\u00a033(2), 267\u2013274 (2011)","journal-title":"ETRI Journal"},{"key":"7_CR14","series-title":"Lecture Notes in Computer Science","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2001","year":"2001","unstructured":"Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.): CHES 2001. LNCS, vol.\u00a02162. Springer, Heidelberg (2001)"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener (ed.) [27], pp. 388\u2013397","DOI":"10.1007\/3-540-48405-1_25"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/3-540-46877-3_35","volume-title":"Advances in Cryptology - EUROCRYPT \u201990","author":"X. Lai","year":"1991","unstructured":"Lai, X., Massey, J.L.: A proposal for a new block encryption standard. In: Damg\u00e5rd, I.B. (ed.) EUROCRYPT 1990. LNCS, vol.\u00a0473, pp. 389\u2013404. Springer, Heidelberg (1991)"},{"key":"7_CR17","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks \u2013 Revealing the Secrets of Smartcards. Springer (2007)"},{"key":"7_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/3-540-44706-7_11","volume-title":"Fast Software Encryption","author":"T.S. Messerges","year":"2001","unstructured":"Messerges, T.S.: Securing the AES Finalists Against Power Analysis Attacks. In: Schneier, B. (ed.) FSE 2000. LNCS, vol.\u00a01978, pp. 150\u2013164. Springer, Heidelberg (2001)"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Nei\u00dfe, O., Pulkus, J.: Switching Blindings with a View Towards IDEA. In: Joye, Quisquater (eds.) [12], pp. 230\u2013239","DOI":"10.1007\/978-3-540-28632-5_17"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Oswald, E., Mangard, S., Herbst, C., Tillich, S.: Practical Second-order DPA Attacks for Masked Smart Card Implementations of Block Ciphers. In: Pointcheval (ed.) [21], pp. 192\u2013207","DOI":"10.1007\/11605805_13"},{"key":"7_CR21","series-title":"Lecture Notes in Computer Science","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","year":"2006","unstructured":"Pointcheval, D. (ed.): CT-RSA 2006. LNCS, vol.\u00a03860. Springer, Heidelberg (2006)"},{"key":"7_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-3-540-77535-5_17","volume-title":"Information Security Applications","author":"E. Prouff","year":"2008","unstructured":"Prouff, E., Rivain, M.: A Generic Method for Secure SBox Implementation. In: Kim, S., Yung, M., Lee, H.-W. (eds.) WISA 2007. LNCS, vol.\u00a04867, pp. 227\u2013244. Springer, Heidelberg (2008)"},{"key":"7_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/978-3-642-15031-9_28","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"M. Rivain","year":"2010","unstructured":"Rivain, M., Prouff, E.: Provably Secure Higher-Order Masking of AES. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol.\u00a06225, pp. 413\u2013427. Springer, Heidelberg (2010)"},{"key":"7_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-3-540-71039-4_8","volume-title":"Fast Software Encryption","author":"M. Rivain","year":"2008","unstructured":"Rivain, M., Dottax, E., Prouff, E.: Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol.\u00a05086, pp. 127\u2013143. Springer, Heidelberg (2008)"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Schramm, K., Paar, C.: Higher Order Masking of the AES. In: Pointcheval (ed.) [21], pp. 208\u2013225","DOI":"10.1007\/11605805_14"},{"key":"7_CR26","unstructured":"Telecommunications Technology Association: 128-bit symmetric block cipher (SEED), Seoul, Korea (1998)"},{"key":"7_CR27","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology - CRYPTO \u201999","year":"1999","unstructured":"Wiener, M. (ed.): CRYPTO 1999. LNCS, vol.\u00a01666. Springer, Heidelberg (1999)"},{"key":"7_CR28","unstructured":"Zabotin, I.A., Glazkov, G.P., Isaeva, V.B.: Cryptographic protection for information processing systems, government standard of the USSR, GOST 28147-89. Government Committee of the USSR for Standards (1989)"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37288-9_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T10:41:00Z","timestamp":1557571260000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37288-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642372872","9783642372889"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37288-9_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}