{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T23:09:42Z","timestamp":1774566582812,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662438251","type":"print"},{"value":"9783662438268","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43826-8_4","type":"book-chapter","created":{"date-parts":[[2014,6,25]],"date-time":"2014-06-25T03:50:01Z","timestamp":1403668201000},"page":"40-56","source":"Crossref","is-referenced-by-count":74,"title":["Orthogonal Direct Sum Masking"],"prefix":"10.1007","author":[{"given":"Julien","family":"Bringer","sequence":"first","affiliation":[]},{"given":"Claude","family":"Carlet","sequence":"additional","affiliation":[]},{"given":"Herv\u00e9","family":"Chabanne","sequence":"additional","affiliation":[]},{"given":"Sylvain","family":"Guilley","sequence":"additional","affiliation":[]},{"given":"Houssem","family":"Maghrebi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Agoyan, M., Dutertre, J.-M., Naccache, D., Robisson, B., Tria, A.: When Clocks Fail: On Critical Paths and Clock Faults. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol.\u00a06035, pp. 182\u2013193. Springer, Heidelberg (2010)","DOI":"10.1007\/978-3-642-12510-2_13"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Bhasin, S., Danger, J.-L., Flament, F., Graba, T., Guilley, S., Mathieu, Y., Nassar, M., Sauvage, L., Selmane, N.: Combined SCA and DFA Countermeasures Integrable in a FPGA Design Flow. In: ReConFig, Canc\u00fan, Quintana Roo, M\u00e9xico, December 9-11, pp. 213\u2013218. IEEE Computer Society (2009), http:\/\/hal.archives-ouvertes.fr\/hal-00411843\/en\/ , doi:10.1109\/ReConFig.2009.50","DOI":"10.1109\/ReConFig.2009.50"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Bhasin, S., Danger, J.-L., Guilley, S., Najm, Z.: A Low-Entropy First-Degree Secure Provable Masking Scheme for Resource-Constrained Devices. In: Proceedings of the Workshop on Embedded Systems Security, WESS 2013, Montreal, Quebec, Canada, pp. 7:1\u20137:10, September 29. ACM, New York (2013), doi:10.1145\/2527317.2527324","DOI":"10.1145\/2527317.2527324"},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/BFb0052352","volume-title":"Fast Software Encryption","author":"E. Biham","year":"1997","unstructured":"Biham, E.: A Fast New DES Implementation in Software. In: Biham, E. (ed.) FSE 1997. LNCS, vol.\u00a01267, pp. 260\u2013272. Springer, Heidelberg (1997)"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-540-30564-4_5","volume-title":"Selected Areas in Cryptography","author":"J. Bl\u00f6mer","year":"2005","unstructured":"Bl\u00f6mer, J., Guajardo, J., Krummel, V.: Provably Secure Masking of AES. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol.\u00a03357, pp. 69\u201383. Springer, Heidelberg (2005)"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Boscher, A., Handschuh, H.: Masking Does Not Protect Against Differential Fault Attacks. In: FDTC, 5th Workshop on Fault Detection and Tolerance in Cryptography, pp. 35\u201340. IEEE-CS, Washington, DC (2008), doi:10.1109\/FDTC.2008.12","DOI":"10.1109\/FDTC.2008.12"},{"issue":"2","key":"4_CR7","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/s13389-012-0034-2","volume":"2","author":"J. Bringer","year":"2012","unstructured":"Bringer, J., Chabanne, H., Le, T.-H.: Protecting AES against side-channel analysis using wire-tap codes. J. Cryptographic Engineering\u00a02(2), 129\u2013141 (2012)","journal-title":"J. Cryptographic Engineering"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Carlet, C.: Boolean Functions for Cryptography and Error Correcting Codes: Chapter of the monography. In: Crama, Y., Hammer, P. (eds.) Boolean Models and Methods in Mathematics, Computer Science, and Engineering, pp. 257\u2013397. Cambridge University Press (2010), Preliminary version available at http:\/\/www.math.univ-paris13.fr\/carlet\/chap-fcts-Bool-corr.pdf","DOI":"10.1017\/CBO9780511780448.011"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Carlet, C., Danger, J.-L., Guilley, S., Maghrebi, H., Prouff, E.: Achieving side-channel high-order correlation immunity with Leakage Squeezing. Journal of Cryptographic Engineering, 1\u201315 (2014), doi:10.1007\/s13389-013-0067-1","DOI":"10.1007\/s13389-013-0067-1"},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1007\/3-540-46796-3_10","volume-title":"Applied Algebra, Algebraic Algorithms and Error-Correcting Codes","author":"C. Carlet","year":"1999","unstructured":"Carlet, C., Guillot, P.: A New Representation of Boolean Functions. In: Fossorier, M., Imai, H., Lin, S., Poli, A. (eds.) AAECC 1999. LNCS, vol.\u00a01719, pp. 94\u2013103. Springer, Heidelberg (1999)"},{"key":"4_CR11","unstructured":"Coron, J.-S.: Higher Order Masking of Look-up Tables. Cryptology ePrint Archive, Report 2013\/700 (2013), http:\/\/eprint.iacr.org\/"},{"key":"4_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/3-540-44499-8_18","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2000","author":"J.-S. Coron","year":"2000","unstructured":"Coron, J.-S., Goubin, L.: On Boolean and Arithmetic Masking against Differential Power Analysis. In: Paar, C., Ko\u00e7, \u00c7.K. (eds.) CHES 2000. LNCS, vol.\u00a01965, pp. 231\u2013237. Springer, Heidelberg (2000)"},{"key":"4_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-642-33027-8_7","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2012","author":"B. Debraize","year":"2012","unstructured":"Debraize, B.: Efficient and provable Secure Methods for Switching from Arithmetic to Boolean Masking. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol.\u00a07428, pp. 107\u2013121. Springer, Heidelberg (2012)"},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/3-540-48059-5_15","volume-title":"Cryptographic Hardware and Embedded Systems","author":"L. Goubin","year":"1999","unstructured":"Goubin, L., Patarin, J.: DES and Differential Power Analysis. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol.\u00a01717, pp. 158\u2013172. Springer, Heidelberg (1999)"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"M. Joye, M. Tunstall.: Fault Analysis in Cryptography. Springer (March 2011), http:\/\/joye.site88.net\/FAbook.html , doi: 10.1007\/978-3-642-29656-7, ISBN 978-3-642-29655-0","DOI":"10.1007\/978-3-642-29656-7"},{"key":"4_CR16","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer (December 2006), http:\/\/www.springer.com\/ , ISBN 0-387-30857-1"},{"key":"4_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/3-540-44706-7_11","volume-title":"Fast Software Encryption","author":"T.S. Messerges","year":"2001","unstructured":"Messerges, T.S.: Securing the AES Finalists Against Power Analysis Attacks. In: Goos, G., Hartmanis, J., van Leeuwen, J., Schneier, B. (eds.) FSE 2000. LNCS, vol.\u00a01978, pp. 150\u2013164. Springer, Heidelberg (2001)"},{"key":"4_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1007\/978-3-642-29011-4_26","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2012","author":"A. Moradi","year":"2012","unstructured":"Moradi, A.: Statistical tools flavor side-channel collision attacks. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol.\u00a07237, pp. 428\u2013445. Springer, Heidelberg (2012)"},{"key":"4_CR19","unstructured":"NIST\/ITL\/CSD. Advanced Encryption Standard (AES). FIPS PUB 197 (November 2001), http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf"},{"key":"4_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-3-540-77535-5_17","volume-title":"Information Security Applications","author":"E. Prouff","year":"2007","unstructured":"Prouff, E., Rivain, M.: A Generic Method for Secure SBox Implementation. In: Kim, S., Yung, M., Lee, H.-W. (eds.) WISA 2007. LNCS, vol.\u00a04867, pp. 227\u2013244. Springer, Heidelberg (2007)"},{"key":"4_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-3-540-71039-4_8","volume-title":"Fast Software Encryption","author":"M. Rivain","year":"2008","unstructured":"Rivain, M., Dottax, E., Prouff, E.: Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol.\u00a05086, pp. 127\u2013143. Springer, Heidelberg (2008)"},{"key":"4_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/978-3-642-15031-9_28","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"M. Rivain","year":"2010","unstructured":"Rivain, M., Prouff, E.: Provably Secure Higher-Order Masking of AES. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol.\u00a06225, pp. 413\u2013427. Springer, Heidelberg (2010)"},{"key":"4_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-642-21040-2_15","volume-title":"Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication","author":"M. Tunstall","year":"2011","unstructured":"Tunstall, M., Mukhopadhyay, D., Ali, S.: Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault. In: Ardagna, C.A., Zhou, J. (eds.) WISTP 2011. LNCS, vol.\u00a06633, pp. 224\u2013233. Springer, Heidelberg (2011)"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Tunstall, M., Whitnall, C., Oswald, E.: Masking Tables - An Underestimated Security Risk. IACR Cryptology ePrint Archive, 2013:735 (2013)","DOI":"10.1007\/978-3-662-43933-3_22"},{"key":"4_CR25","unstructured":"University of Sydney. Magma Computational Algebra System, http:\/\/magma.maths.usyd.edu.au\/magma\/"},{"key":"4_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-3-642-41224-0_8","volume-title":"Security, Privacy, and Applied Cryptography Engineering","author":"P.K. Vadnala","year":"2013","unstructured":"Vadnala, P.K., Gro\u00dfsch\u00e4dl, J.: Algorithms for Switching between Boolean and Arithmetic Masking of Second Order. In: Gierlichs, B., Guilley, S., Mukhopadhyay, D. (eds.) SPACE 2013. LNCS, vol.\u00a08204, pp. 95\u2013110. Springer, Heidelberg (2013)"},{"key":"4_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1007\/978-3-642-34961-4_44","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2012","author":"N. Veyrat-Charvillon","year":"2012","unstructured":"Veyrat-Charvillon, N., Medwed, M., Kerckhof, S., Standaert, F.-X.: Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol.\u00a07658, pp. 740\u2013757. Springer, Heidelberg (2012)"},{"key":"4_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-28632-5_1","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"J. Waddle","year":"2004","unstructured":"Waddle, J., Wagner, D.: Towards Efficient Second-Order Power Analysis. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 1\u201315. Springer, Heidelberg (2004)"},{"key":"4_CR29","doi-asserted-by":"crossref","unstructured":"Ye, X., Eisenbarth, T.: On the Vulnerability of Low Entropy Masking Schemes. In: CARDIS. LNCS. Springer, Berlin (November 2013)","DOI":"10.1007\/978-3-319-08302-5_4"}],"container-title":["Lecture Notes in Computer Science","Information Security Theory and Practice. Securing the Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43826-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,9]],"date-time":"2022-04-09T06:29:27Z","timestamp":1649485767000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-43826-8_4"}},"subtitle":["A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks"],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662438251","9783662438268"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43826-8_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}