{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:40:25Z","timestamp":1767339625276,"version":"3.46.0"},"publisher-location":"Singapore","reference-count":49,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819550951","type":"print"},{"value":"9789819550968","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-5096-8_13","type":"book-chapter","created":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T11:24:28Z","timestamp":1765106668000},"page":"407-440","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["StaMAC: Fault Protection via\u00a0Stable-MAC Tags"],"prefix":"10.1007","author":[{"given":"Siemen","family":"Dhooghe","sequence":"first","affiliation":[]},{"given":"Artemii","family":"Ovchinnikov","sequence":"additional","affiliation":[]},{"given":"Dilara","family":"Toprakhisar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,8]]},"reference":[{"issue":"3","key":"13_CR1","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1109\/TC.2019.2948617","volume":"69","author":"A Aghaie","year":"2020","unstructured":"Aghaie, A., Moradi, A., Rasoolzadeh, S., Shahmirzadi, A.R., Schellenberg, F., Schneider, T.: Impeccable circuits. IEEE Trans. Comput. 69(3), 361\u2013376 (2020)","journal-title":"IEEE Trans. Comput."},{"key":"13_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/BFb0028165","volume-title":"Security Protocols","author":"R Anderson","year":"1998","unstructured":"Anderson, R., Kuhn, M.: Low cost attacks on tamper resistant devices. In: Christianson, B., Crispo, B., Lomas, M., Roe, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 125\u2013136. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/BFb0028165"},{"key":"13_CR3","doi-asserted-by":"publisher","unstructured":"Barthe, G., Bela\u00efd, S., Dupressoir, F., Fouque, P., Gr\u00e9goire, B., Strub, P., Zucchini, R.: Strong non-interference and type-directed higher-order masking. In: Weippl, E.R., Katzenbeisser, S., Kruegel, C., Myers, A.C., Halevi, S. (eds.) Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24\u201328 October 2016, pp. 116\u2013129. ACM (2016). https:\/\/doi.org\/10.1145\/2976749.2978427","DOI":"10.1145\/2976749.2978427"},{"key":"13_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/978-3-642-38348-9_19","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2013","author":"G Bertoni","year":"2013","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Keccak. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 313\u2013314. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38348-9_19"},{"key":"13_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/978-3-319-08302-5_13","volume-title":"Smart Card Research and Advanced Applications","author":"B Bilgin","year":"2014","unstructured":"Bilgin, B., Daemen, J., Nikov, V., Nikova, S., Rijmen, V., Van Assche, G.: Efficient and first-order DPA resistant implementations of Keccak. In: Francillon, A., Rohatgi, P. (eds.) CARDIS 2013. LNCS, vol. 8419, pp. 187\u2013199. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-08302-5_13"},{"key":"13_CR6","doi-asserted-by":"publisher","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37\u201351. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/3-540-69053-0_4","DOI":"10.1007\/3-540-69053-0_4"},{"key":"13_CR7","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/978-3-642-30436-1_24","volume-title":"Information Security and Privacy Research","author":"J Boyar","year":"2012","unstructured":"Boyar, J., Peralta, R.: A small depth-16 circuit for the AES s-box. In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds.) SEC 2012. IAICT, vol. 376, pp. 287\u2013298. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-30436-1_24"},{"key":"13_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/11545262_32","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"D Canright","year":"2005","unstructured":"Canright, D.: A very compact s-box for AES. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 441\u2013455. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11545262_32"},{"issue":"10","key":"13_CR9","doi-asserted-by":"publisher","first-page":"1677","DOI":"10.1109\/TC.2020.3022979","volume":"70","author":"G Cassiers","year":"2021","unstructured":"Cassiers, G., Gr\u00e9goire, B., Levi, I., Standaert, F.: Hardware private circuits: from trivial composition to full verification. IEEE Trans. Comput. 70(10), 1677\u20131690 (2021)","journal-title":"IEEE Trans. Comput."},{"key":"13_CR10","doi-asserted-by":"publisher","first-page":"2542","DOI":"10.1109\/TIFS.2020.2971153","volume":"15","author":"G Cassiers","year":"2020","unstructured":"Cassiers, G., Standaert, F.: Trivially and efficiently composing masked gadgets with probe isolating non-interference. IEEE Trans. Inf. Forensics Secur. 15, 2542\u20132555 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"13_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1007\/3-540-48405-1_26","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"S Chari","year":"1999","unstructured":"Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards sound approaches to counteract power-analysis attacks. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 398\u2013412. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_26"},{"key":"13_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/978-3-662-53140-2_10","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2016","author":"T De Cnudde","year":"2016","unstructured":"De Cnudde, T., Reparaz, O., Bilgin, B., Nikova, S., Nikov, V., Rijmen, V.: Masking AES with $$d+1$$ shares in hardware. In: Gierlichs, B., Poschmann, A.Y. (eds.) CHES 2016. LNCS, vol. 9813, pp. 194\u2013212. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53140-2_10"},{"key":"13_CR13","unstructured":"Cooper, J., DeMulder, E., Goodwill, G., Jaffe, J., Kenworthy, G., Rohatgi, P., et\u00a0al.: Test vector leakage assessment (TVLA) methodology in practice. In: International Cryptographic Module Conference, vol.\u00a020 (2013)"},{"key":"13_CR14","doi-asserted-by":"publisher","unstructured":"Daemen, J., Dobraunig, C., Eichlseder, M., Gro\u00df, H., Mendel, F., Primas, R.: Protecting against statistical ineffective fault attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3), 508\u2013543 (2020). https:\/\/doi.org\/10.13154\/TCHES.V2020.I3.508-543","DOI":"10.13154\/TCHES.V2020.I3.508-543"},{"key":"13_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1007\/978-3-642-32009-5_38","volume-title":"Advances in Cryptology \u2013 CRYPTO 2012","author":"I Damg\u00e5rd","year":"2012","unstructured":"Damg\u00e5rd, I., Pastro, V., Smart, N., Zakarias, S.: Multiparty Computation from Somewhat Homomorphic Encryption. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 643\u2013662. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32009-5_38"},{"key":"13_CR16","doi-asserted-by":"publisher","unstructured":"Dehbaoui, A., Dutertre, J., Robisson, B., Tria, A.: Electromagnetic transient faults injection on a hardware and a software implementations of AES. In: Bertoni, G., Gierlichs, B. (eds.) 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven, Belgium, September 9, 2012. pp. 7\u201315. IEEE Computer Society (2012). https:\/\/doi.org\/10.1109\/FDTC.2012.15,","DOI":"10.1109\/FDTC.2012.15"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Dhooghe, S., Nikova, S.: The random fault model. In: SAC. Lecture Notes in Computer Science, vol. 14201, pp. 191\u2013212. Springer (2023)","DOI":"10.1007\/978-3-031-53368-6_10"},{"key":"13_CR18","doi-asserted-by":"publisher","unstructured":"Dhooghe, S., Ovchinnikov, A., Toprakhisar, D.: Stati: protecting against fault attacks using stable threshold implementations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(1), 229\u2013263 (2024). https:\/\/doi.org\/10.46586\/TCHES.V2024.I1.229-263","DOI":"10.46586\/TCHES.V2024.I1.229-263"},{"key":"13_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/978-3-030-03329-3_11","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2018","author":"C Dobraunig","year":"2018","unstructured":"Dobraunig, C., Eichlseder, M., Gross, H., Mangard, S., Mendel, F., Primas, R.: Statistical ineffective fault attacks on\u00a0masked AES with fault countermeasures. In: Peyrin, T., Galbraith, S. (eds.) ASIACRYPT 2018, Part II. LNCS, vol. 11273, pp. 315\u2013342. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03329-3_11"},{"key":"13_CR20","doi-asserted-by":"publisher","unstructured":"Dobraunig, C., Eichlseder, M., Korak, T., Mangard, S., Mendel, F., Primas, R.: SIFA: exploiting ineffective fault inductions on symmetric cryptography. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3), 547\u2013572 (2018). https:\/\/doi.org\/10.13154\/tches.v2018.i3.547-572","DOI":"10.13154\/tches.v2018.i3.547-572"},{"key":"13_CR21","doi-asserted-by":"publisher","unstructured":"Faust, S., Grosso, V., Pozo, S.M.D., Paglialonga, C., Standaert, F.: Composable masking schemes in the presence of physical defaults & the robust probing model. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3), 89\u2013120 (2018). https:\/\/doi.org\/10.13154\/TCHES.V2018.I3.89-120","DOI":"10.13154\/TCHES.V2018.I3.89-120"},{"key":"13_CR22","doi-asserted-by":"publisher","unstructured":"Feldtkeller, J., Richter-Brockmann, J., Sasdrich, P., G\u00fcneysu, T.: Combined threshold implementation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(4), 307\u2013334 (2024). https:\/\/doi.org\/10.46586\/TCHES.V2024.I4.307-334","DOI":"10.46586\/TCHES.V2024.I4.307-334"},{"key":"13_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-44709-1_21","volume-title":"Cryptographic Hardware and Embedded Systems \u2014 CHES 2001","author":"K Gandolfi","year":"2001","unstructured":"Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: concrete results. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 251\u2013261. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44709-1_21"},{"key":"13_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1007\/978-3-319-71667-1_20","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2017","author":"A Ghoshal","year":"2017","unstructured":"Ghoshal, A., De Cnudde, T.: Several masked implementations of the boyar-peralta AES s-box. In: Patra, A., Smart, N.P. (eds.) INDOCRYPT 2017. LNCS, vol. 10698, pp. 384\u2013402. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-71667-1_20"},{"key":"13_CR25","doi-asserted-by":"publisher","unstructured":"Gro\u00df, H., Mangard, S., Korak, T.: Domain-oriented masking: compact masked hardware implementations with arbitrary protection order. In: Bilgin, B., Nikova, S., Rijmen, V. (eds.) Proceedings of the ACM Workshop on Theory of Implementation Security, TIS@CCS 2016 Vienna, Austria, October, 2016. p.\u00a03. ACM (2016). https:\/\/doi.org\/10.1145\/2996366.2996426","DOI":"10.1145\/2996366.2996426"},{"key":"13_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-3-319-52153-4_6","volume-title":"Topics in Cryptology \u2013 CT-RSA 2017","author":"H Gross","year":"2017","unstructured":"Gross, H., Mangard, S., Korak, T.: An efficient side-channel protected AES implementation with arbitrary protection order. In: Handschuh, H. (ed.) CT-RSA 2017. LNCS, vol. 10159, pp. 95\u2013112. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-52153-4_6"},{"key":"13_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-319-06734-6_16","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2014","author":"V Grosso","year":"2014","unstructured":"Grosso, V., Prouff, E., Standaert, F.-X.: Efficient masked s-boxes processing \u2013 a step forward. In: Pointcheval, D., Vergnaud, D. (eds.) AFRICACRYPT 2014. LNCS, vol. 8469, pp. 251\u2013266. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-06734-6_16"},{"key":"13_CR28","doi-asserted-by":"publisher","first-page":"4321","DOI":"10.1109\/TIFS.2021.3089875","volume":"16","author":"M Gruber","year":"2021","unstructured":"Gruber, M., et al.: Domrep-an orthogonal countermeasure for arbitrary order side-channel and fault attack protection. IEEE Trans. Inf. Forensics Secur. 16, 4321\u20134335 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"13_CR29","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/TNS.1965.4323904","volume":"12","author":"DH Habing","year":"1965","unstructured":"Habing, D.H.: The use of lasers to simulate radiation-induced transients in semiconductor devices and circuits. IEEE Trans. Nucl. Sci. 12(5), 91\u2013100 (1965)","journal-title":"IEEE Trans. Nucl. Sci."},{"issue":"1","key":"13_CR30","doi-asserted-by":"publisher","first-page":"133","DOI":"10.46586\/tches.v2024.i1.133-156","volume":"2024","author":"H Hirata","year":"2024","unstructured":"Hirata, H., et al.: All you need is fault: zero-value attacks on AES and a new $$\\lambda $$-detection m &m. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(1), 133\u2013156 (2024)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"13_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1007\/11761679_19","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"Y Ishai","year":"2006","unstructured":"Ishai, Y., Prabhakaran, M., Sahai, A., Wagner, D.: Private circuits ii: keeping secrets in tamperable circuits. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 308\u2013327. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11761679_19"},{"key":"13_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1007\/978-3-540-45146-4_27","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"Y Ishai","year":"2003","unstructured":"Ishai, Y., Sahai, A., Wagner, D.: Private circuits: securing hardware against probing attacks. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 463\u2013481. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45146-4_27"},{"key":"13_CR33","doi-asserted-by":"crossref","unstructured":"Knichel, D., Moradi, A.: Low-latency hardware private circuits. In: CCS, pp. 1799\u20131812. ACM (2022)","DOI":"10.1145\/3548606.3559362"},{"key":"13_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201996","author":"PC Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104\u2013113. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-68697-5_9"},{"key":"13_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_25"},{"key":"13_CR36","doi-asserted-by":"publisher","unstructured":"Meyer, L.D., Arribas, V., Nikova, S., Nikov, V., Rijmen, V.: M &m: masks and macs against physical attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(1), 25\u201350 (2019). https:\/\/doi.org\/10.13154\/tches.v2019.i1.25-50","DOI":"10.13154\/tches.v2019.i1.25-50"},{"key":"13_CR37","doi-asserted-by":"publisher","unstructured":"M\u00fcller, N., Moradi, A.: PROLEAD a probing-based hardware leakage detection tool. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4), 311\u2013348 (2022) https:\/\/doi.org\/10.46586\/TCHES.V2022.I4.311-348","DOI":"10.46586\/TCHES.V2022.I4.311-348"},{"key":"13_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1007\/11935308_38","volume-title":"Information and Communications Security","author":"S Nikova","year":"2006","unstructured":"Nikova, S., Rechberger, C., Rijmen, V.: Threshold implementations against side-channel attacks and glitches. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 529\u2013545. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11935308_38"},{"key":"13_CR39","doi-asserted-by":"publisher","unstructured":"Probst, M., Brosch, M., Gruber, M., Sigl, G.: DOMREP II. In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2024, Tysons Corner, VA, USA, 6\u20139 May 2024, pp. 112\u2013121. IEEE (2024). https:\/\/doi.org\/10.1109\/HOST55342.2024.10545417,","DOI":"10.1109\/HOST55342.2024.10545417"},{"key":"13_CR40","doi-asserted-by":"publisher","unstructured":"Rasoolzadeh, S., Shahmirzadi, A.R., Moradi, A.: Impeccable circuits III. In: IEEE International Test Conference, ITC 2021, Anaheim, CA, USA, 10\u201315 October 2021, pp. 163\u2013169. IEEE (2021). https:\/\/doi.org\/10.1109\/ITC50571.2021.00024","DOI":"10.1109\/ITC50571.2021.00024"},{"key":"13_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"764","DOI":"10.1007\/978-3-662-47989-6_37","volume-title":"Advances in Cryptology \u2013 CRYPTO 2015","author":"O Reparaz","year":"2015","unstructured":"Reparaz, O., Bilgin, B., Nikova, S., Gierlichs, B., Verbauwhede, I.: Consolidating masking schemes. In: Gennaro, R., Robshaw, M. (eds.) CRYPTO 2015. LNCS, vol. 9215, pp. 764\u2013783. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-47989-6_37"},{"key":"13_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-319-96884-1_5","volume-title":"Advances in Cryptology \u2013 CRYPTO 2018","author":"O Reparaz","year":"2018","unstructured":"Reparaz, O., et al.: CAPA: the spirit of beaver against physical attacks. In: Shacham, H., Boldyreva, A. (eds.) CRYPTO 2018. LNCS, vol. 10991, pp. 121\u2013151. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96884-1_5"},{"key":"13_CR43","unstructured":"Saha, S., Jap, D., Roy, D.B., Chakraborti, A., Bhasin, S., Mukhopadhyay, D.: Transform-and-encode: a countermeasure framework for statistical ineffective fault attacks on block ciphers. IACR Cryptol. ePrint Arch, p.\u00a0545 (2019). https:\/\/eprint.iacr.org\/2019\/545"},{"key":"13_CR44","unstructured":"SAKURA: side-channel attack user reference architecture. http:\/\/satoh.cs.uec.ac.jp\/SAKURA\/index.html"},{"key":"13_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/978-3-662-53008-5_11","volume-title":"Advances in Cryptology \u2013 CRYPTO 2016","author":"T Schneider","year":"2016","unstructured":"Schneider, T., Moradi, A., G\u00fcneysu, T.: ParTI \u2013 towards combined hardware countermeasures against side-channel and fault-injection attacks. In: Robshaw, M., Katz, J. (eds.) CRYPTO 2016, Part II. LNCS, vol. 9815, pp. 302\u2013332. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53008-5_11"},{"key":"13_CR46","doi-asserted-by":"publisher","unstructured":"Shahmirzadi, A.R., Moradi, A.: Second-order SCA security with almost no fresh randomness. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3), 708\u2013755 (2021). https:\/\/doi.org\/10.46586\/TCHES.V2021.I3.708-755,","DOI":"10.46586\/TCHES.V2021.I3.708-755"},{"key":"13_CR47","doi-asserted-by":"publisher","unstructured":"Shahmirzadi, A.R., Rasoolzadeh, S., Moradi, A.: Impeccable circuits II. In: 57th ACM\/IEEE Design Automation Conference, DAC 2020, San Francisco, CA, USA, 20\u201324 July 2020, pp.\u00a01\u20136. IEEE (2020). https:\/\/doi.org\/10.1109\/DAC18072.2020.9218615","DOI":"10.1109\/DAC18072.2020.9218615"},{"key":"13_CR48","doi-asserted-by":"publisher","unstructured":"Toprakhisar, D., Nikova, S., Nikov, V.: CAPABARA: a combined attack on CAPA. In: Wacquez, R., Homma, N. (eds.) Constructive Side-Channel Analysis and Secure Design - 15th International Workshop, COSADE 2024, Gardanne, France, 9\u201310 April 2024, Proceedings, LNCS, vol. 14595, pp. 76\u201389. Springer (2024). https:\/\/doi.org\/10.1007\/978-3-031-57543-3_5","DOI":"10.1007\/978-3-031-57543-3_5"},{"key":"13_CR49","doi-asserted-by":"publisher","unstructured":"Toprakhisar, D., Nikova, S., Nikov, V.: Sok: parameterization of fault adversary models connecting theory and practice. In: Oswald, E. (ed.) Topics in Cryptology - CT-RSA 2024 - Cryptographers\u2019 Track at the RSA Conference 2024, San Francisco, CA, USA, 6\u20139 May 2024, Proceedings, LNCS, vol. 14643, pp. 433\u2013459. Springer (2024). https:\/\/doi.org\/10.1007\/978-3-031-58868-6_17","DOI":"10.1007\/978-3-031-58868-6_17"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-5096-8_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T11:24:30Z","timestamp":1765106670000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-5096-8_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"ISBN":["9789819550951","9789819550968"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-5096-8_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,8]]},"assertion":[{"value":"8 December 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASIACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Application of Cryptology and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, VIC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asiacrypt2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asiacrypt.iacr.org\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}