{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T11:26:17Z","timestamp":1765106777829,"version":"3.46.0"},"publisher-location":"Singapore","reference-count":81,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819550951","type":"print"},{"value":"9789819550968","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-5096-8_17","type":"book-chapter","created":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T11:24:28Z","timestamp":1765106668000},"page":"544-575","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["IP Masking with\u00a0Generic Security Guarantees Under Minimum Assumptions, and\u00a0Applications"],"prefix":"10.1007","author":[{"given":"Sebastian","family":"Faust","sequence":"first","affiliation":[]},{"given":"Lo\u00efc","family":"Masure","sequence":"additional","affiliation":[]},{"given":"Elena","family":"Michel","sequence":"additional","affiliation":[]},{"given":"Hai Hoang","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Maximilian","family":"Orlt","sequence":"additional","affiliation":[]},{"given":"Fran\u00e7ois-Xavier","family":"Standaert","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,8]]},"reference":[{"key":"17_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-3-030-44223-1_11","volume-title":"Post-Quantum Cryptography","author":"D Amiet","year":"2020","unstructured":"Amiet, D., Curiger, A., Leuenberger, L., Zbinden, P.: Defeating NewHope with a single trace. In: Ding, J., Tillich, J.-P. (eds.) PQCrypto 2020. LNCS, vol. 12100, pp. 189\u2013205. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-44223-1_11"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Assael, G., Elbaz-Vincent, P., Reymond, G.: Improving single-trace attacks on the number-theoretic transform for cortex-M4. In: HOST, pp. 111\u2013121. IEEE (2023)","DOI":"10.1109\/HOST55118.2023.10133270"},{"issue":"4","key":"17_CR3","doi-asserted-by":"publisher","first-page":"58","DOI":"10.46586\/tches.v2023.i4.58-79","volume":"2023","author":"M Azouaoui","year":"2023","unstructured":"Azouaoui, M., et al.: Protecting dilithium against leakage revisited sensitivity analysis and improved implementations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(4), 58\u201379 (2023)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"17_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1007\/978-3-662-46800-5_19","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2015","author":"J Balasch","year":"2015","unstructured":"Balasch, J., Faust, S., Gierlichs, B.: Inner product masking revisited. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9056, pp. 486\u2013510. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46800-5_19"},{"key":"17_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"724","DOI":"10.1007\/978-3-319-70694-8_25","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2017","author":"J Balasch","year":"2017","unstructured":"Balasch, J., Faust, S., Gierlichs, B., Paglialonga, C., Standaert, F.-X.: Consolidating inner product masking. In: Takagi, T., Peyrin, T. (eds.) ASIACRYPT 2017. LNCS, vol. 10624, pp. 724\u2013754. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70694-8_25"},{"key":"17_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"758","DOI":"10.1007\/978-3-642-34961-4_45","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2012","author":"J Balasch","year":"2012","unstructured":"Balasch, J., Faust, S., Gierlichs, B., Verbauwhede, I.: Theory and practice of a leakage resilient masking scheme. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 758\u2013775. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34961-4_45"},{"key":"17_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/978-3-319-16763-3_5","volume-title":"Smart Card Research and Advanced Applications","author":"J Balasch","year":"2015","unstructured":"Balasch, J., Gierlichs, B., Grosso, V., Reparaz, O., Standaert, F.-X.: On the cost of lazy engineering for masked software implementations. In: Joye, M., Moradi, A. (eds.) CARDIS 2014. LNCS, vol. 8968, pp. 64\u201381. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-16763-3_5"},{"key":"17_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/978-3-662-53140-2_2","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2016","author":"A Battistello","year":"2016","unstructured":"Battistello, A., Coron, J.-S., Prouff, E., Zeitoun, R.: Horizontal side-channel attacks and countermeasures on the ISW masking scheme. In: Gierlichs, B., Poschmann, A.Y. (eds.) CHES 2016. LNCS, vol. 9813, pp. 23\u201339. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53140-2_2"},{"key":"17_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/978-3-662-48324-4_20","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2015","author":"S Bela\u00efd","year":"2015","unstructured":"Bela\u00efd, S., Coron, J.-S., Fouque, P.-A., G\u00e9rard, B., Kammerer, J.-G., Prouff, E.: Improved side-channel analysis of finite-field multiplication. In: G\u00fcneysu, T., Handschuh, H. (eds.) CHES 2015. LNCS, vol. 9293, pp. 395\u2013415. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48324-4_20"},{"key":"17_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/978-3-662-45608-8_17","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2014","author":"S Bela\u00efd","year":"2014","unstructured":"Bela\u00efd, S., Fouque, P.-A., G\u00e9rard, B.: Side-channel analysis of multiplications in GF(2128). In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014. LNCS, vol. 8874, pp. 306\u2013325. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45608-8_17"},{"key":"17_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/978-3-030-56784-2_13","volume-title":"Advances in Cryptology \u2013 CRYPTO 2020","author":"D Bellizia","year":"2020","unstructured":"Bellizia, D., et al.: Mode-level vs. implementation-level physical security in symmetric cryptography. In: Micciancio, D., Ristenpart, T. (eds.) CRYPTO 2020. LNCS, vol. 12170, pp. 369\u2013400. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-56784-2_13"},{"key":"17_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/978-3-319-96884-1_18","volume-title":"Advances in Cryptology \u2013 CRYPTO 2018","author":"F Benhamouda","year":"2018","unstructured":"Benhamouda, F., Degwekar, A., Ishai, Y., Rabin, T.: On the local leakage resilience of linear secret sharing schemes. In: Shacham, H., Boldyreva, A. (eds.) CRYPTO 2018. LNCS, vol. 10991, pp. 531\u2013561. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96884-1_18"},{"issue":"2","key":"17_CR13","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/s00145-021-09375-2","volume":"34","author":"F Benhamouda","year":"2021","unstructured":"Benhamouda, F., Degwekar, A., Ishai, Y., Rabin, T.: On the local leakage resilience of linear secret sharing schemes. J. Cryptol. 34(2), 10 (2021)","journal-title":"J. Cryptol."},{"issue":"4","key":"17_CR14","doi-asserted-by":"publisher","first-page":"173","DOI":"10.46586\/tches.v2021.i4.173-214","volume":"2021","author":"JW Bos","year":"2021","unstructured":"Bos, J.W., Gourjon, M., Renes, J., Schneider, T., van Vredendaal, C.: Masking kyber: first- and higher-order implementations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4), 173\u2013214 (2021)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"17_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1007\/978-3-030-77886-6_14","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2021","author":"G Brian","year":"2021","unstructured":"Brian, G., Faonio, A., Obremski, M., Ribeiro, J., Simkin, M., Sk\u00f3rski, M., Venturi, D.: The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free. In: Canteaut, A., Standaert, F.-X. (eds.) EUROCRYPT 2021. LNCS, vol. 12697, pp. 408\u2013437. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-77886-6_14"},{"issue":"4","key":"17_CR16","doi-asserted-by":"publisher","first-page":"553","DOI":"10.46586\/tches.v2022.i4.553-588","volume":"2022","author":"O Bronchain","year":"2022","unstructured":"Bronchain, O., Cassiers, G.: Bitslicing arithmeticspsboolean masking conversions for fun and profit with application to lattice-based KEMS. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4), 553\u2013588 (2022)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"issue":"3","key":"17_CR17","doi-asserted-by":"publisher","first-page":"202","DOI":"10.46586\/tches.v2021.i3.202-234","volume":"2021","author":"O Bronchain","year":"2021","unstructured":"Bronchain, O., Standaert, F.-X.: Breaking masked implementations with many shares on 32-bit software platforms or when the security order does not matter. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3), 202\u2013234 (2021)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"issue":"10","key":"17_CR18","doi-asserted-by":"publisher","first-page":"1677","DOI":"10.1109\/TC.2020.3022979","volume":"70","author":"G Cassiers","year":"2021","unstructured":"Cassiers, G., Gr\u00e9goire, B., Levi, I., Standaert, F.-X.: Hardware private circuits: from trivial composition to full verification. IEEE Trans. Comput. 70(10), 1677\u20131690 (2021)","journal-title":"IEEE Trans. Comput."},{"issue":"2","key":"17_CR19","doi-asserted-by":"publisher","first-page":"136","DOI":"10.46586\/tches.v2021.i2.136-158","volume":"2021","author":"G Cassiers","year":"2021","unstructured":"Cassiers, G., Standaert, F.-X.: Provably secure hardware masking in the transition- and glitch-robust probing model: better safe than sorry. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(2), 136\u2013158 (2021)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"17_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-36400-5_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S Chari","year":"2003","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski, B.S., Ko\u00e7, K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13\u201328. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36400-5_3"},{"key":"17_CR21","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1109\/TIFS.2020.3009609","volume":"16","author":"W Cheng","year":"2021","unstructured":"Cheng, W., Guilley, S., Carlet, C., Mesnager, S., Danger, J.-L.: Optimizing inner product masking scheme by a coding theory approach. IEEE Trans. Inf. Forensics Secur. 16, 220\u2013235 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"17_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/978-3-662-53140-2_10","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2016","author":"T De Cnudde","year":"2016","unstructured":"De Cnudde, T., Reparaz, O., Bilgin, B., Nikova, S., Nikov, V., Rijmen, V.: Masking AES with $$d+1$$ shares in hardware. In: Gierlichs, B., Poschmann, A.Y. (eds.) CHES 2016. LNCS, vol. 9813, pp. 194\u2013212. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53140-2_10"},{"key":"17_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-642-29912-4_6","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"J-S Coron","year":"2012","unstructured":"Coron, J.-S., Giraud, C., Prouff, E., Renner, S., Rivain, M., Vadnala, P.K.: Conversion of security proofs from one leakage model to another: a new issue. In: Schindler, W., Huss, S.A. (eds.) COSADE 2012. LNCS, vol. 7275, pp. 69\u201381. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-29912-4_6"},{"key":"17_CR24","series-title":"Information Security and Cryptography","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-60769-5","volume-title":"The Design of Rijndael - The Advanced Encryption Standard (AES)","author":"J Daemen","year":"2020","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael - The Advanced Encryption Standard (AES). Information Security and Cryptography, 2nd edn. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-662-60769-5","edition":"2"},{"key":"17_CR25","doi-asserted-by":"crossref","unstructured":"Dobraunig, C., et al.: Isap v2.0. IACR Trans. Symmetric Cryptol. 2020(S1), 390\u2013416 (2020)","DOI":"10.46586\/tosc.v2020.iS1.390-416"},{"issue":"3","key":"17_CR26","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s00145-021-09398-9","volume":"34","author":"C Dobraunig","year":"2021","unstructured":"Dobraunig, C., Eichlseder, M., Mendel, F., Schl\u00e4ffer, M.: Ascon v1.2: lightweight authenticated encryption and hashing. J. Cryptol. 34(3), 33 (2021)","journal-title":"J. Cryptol."},{"key":"17_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-3-319-31271-2_14","volume-title":"Smart Card Research and Advanced Applications","author":"C Dobraunig","year":"2016","unstructured":"Dobraunig, C., Koeune, F., Mangard, S., Mendel, F., Standaert, F.-X.: Towards fresh and hybrid re-keying schemes with beyond birthday security. In: Homma, N., Medwed, M. (eds.) CARDIS 2015. LNCS, vol. 9514, pp. 225\u2013241. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-31271-2_14"},{"issue":"1","key":"17_CR28","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1137\/060651380","volume":"38","author":"Y Dodis","year":"2008","unstructured":"Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97\u2013139 (2008)","journal-title":"SIAM J. Comput."},{"key":"17_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/978-3-642-55220-5_24","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2014","author":"A Duc","year":"2014","unstructured":"Duc, A., Dziembowski, S., Faust, S.: Unifying leakage models: from probing attacks to noisy leakage. In: Nguyen, P.Q., Oswald, E. (eds.) EUROCRYPT 2014. LNCS, vol. 8441, pp. 423\u2013440. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-55220-5_24"},{"issue":"1","key":"17_CR30","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s00145-018-9284-1","volume":"32","author":"A Duc","year":"2019","unstructured":"Duc, A., Dziembowski, S., Faust, S.: Unifying leakage models: from probing attacks to noisy leakage. J. Cryptol. 32(1), 151\u2013177 (2019)","journal-title":"J. Cryptol."},{"key":"17_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/978-3-662-46800-5_16","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2015","author":"A Duc","year":"2015","unstructured":"Duc, A., Faust, S., Standaert, F.-X.: Making masking security proofs concrete. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9056, pp. 401\u2013429. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46800-5_16"},{"issue":"1","key":"17_CR32","first-page":"373","volume":"2021","author":"S Duval","year":"2021","unstructured":"Duval, S., M\u00e9aux, P., Momin, C., Standaert, F.-X.: Exploring crypto-physical dark matter and learning with physical rounding towards secure and efficient fresh re-keying. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(1), 373\u2013401 (2021)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"17_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"702","DOI":"10.1007\/978-3-642-25385-0_38","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2011","author":"S Dziembowski","year":"2011","unstructured":"Dziembowski, S., Faust, S.: Leakage-resilient cryptography from the inner-product extractor. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 702\u2013721. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-25385-0_38"},{"key":"17_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/978-3-662-53008-5_10","volume-title":"Advances in Cryptology \u2013 CRYPTO 2016","author":"S Dziembowski","year":"2016","unstructured":"Dziembowski, S., Faust, S., Herold, G., Journault, A., Masny, D., Standaert, F.-X.: Towards sound fresh re-keying with hard (physical) learning problems. In: Robshaw, M., Katz, J. (eds.) CRYPTO 2016. LNCS, vol. 9815, pp. 272\u2013301. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53008-5_10"},{"issue":"3","key":"17_CR35","doi-asserted-by":"publisher","first-page":"89","DOI":"10.46586\/tches.v2018.i3.89-120","volume":"2018","author":"S Faust","year":"2018","unstructured":"Faust, S., Grosso, V., Pozo, S.M.D., Paglialonga, C., Standaert, F.-X.: Composable masking schemes in the presence of physical defaults & the robust probing model. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3), 89\u2013120 (2018)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"17_CR36","unstructured":"Faust, S., Masure, L., Micheli, E., Nguyen, H.H., Orlt, M., Standaert, F.-X.: Efficient IP masking with generic security guarantees under minimum assumptions. IACR Cryptol. ePrint Arch. p. 337 (2025)"},{"key":"17_CR37","doi-asserted-by":"publisher","unstructured":"Faust, S., Masure, L., Micheli, E., Orlt, M., Standaert, F.-X.: Connecting leakage-resilient secret sharing to practice: scaling trends and physical dependencies of prime field masking. In: Joye, M., Leander, G. (eds.) EUROCRYPT 2024. LNCS, vol. 14654, pp. 316\u2013344. Springer (2024). https:\/\/doi.org\/10.1007\/978-3-031-58737-5_12","DOI":"10.1007\/978-3-031-58737-5_12"},{"key":"17_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1007\/978-3-642-19574-7_18","volume-title":"Selected Areas in Cryptography","author":"G Fumaroli","year":"2011","unstructured":"Fumaroli, G., Martinelli, A., Prouff, E., Rivain, M.: Affine masking against higher-order side channel analysis. In: Biryukov, A., Gong, G., Stinson, D.R. (eds.) SAC 2010. LNCS, vol. 6544, pp. 262\u2013280. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19574-7_18"},{"key":"17_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1007\/3-540-36400-5_16","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"JD Goli\u0107","year":"2003","unstructured":"Goli\u0107, J.D., Tymen, C.: Multiplicative masking and power analysis of AES. In: Kaliski, B.S., Ko\u00e7, K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 198\u2013212. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36400-5_16"},{"key":"17_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/3-540-48059-5_15","volume-title":"Cryptographic Hardware and Embedded Systems","author":"L Goubin","year":"1999","unstructured":"Goubin, L., Patarin, J.: DES and differential power analysis the \u201cduplication\u2019\u2019 method. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 158\u2013172. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48059-5_15"},{"key":"17_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1007\/978-3-319-56620-7_20","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2017","author":"D Goudarzi","year":"2017","unstructured":"Goudarzi, D., Rivain, M.: How fast can higher-order masking be in software? In: Coron, J.-S., Nielsen, J.B. (eds.) EUROCRYPT 2017. LNCS, vol. 10210, pp. 567\u2013597. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-56620-7_20"},{"key":"17_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-319-66787-4_6","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2017","author":"H Gross","year":"2017","unstructured":"Gross, H., Mangard, S.: Reconciling $$d+1$$ masking in hardware and software. In: Fischer, W., Homma, N. (eds.) CHES 2017. LNCS, vol. 10529, pp. 115\u2013136. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66787-4_6"},{"issue":"2","key":"17_CR43","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/s13389-018-0184-y","volume":"8","author":"H Gross","year":"2018","unstructured":"Gross, H., Mangard, S.: A unified masking approach. J. Cryptogr. Eng. 8(2), 109\u2013124 (2018). https:\/\/doi.org\/10.1007\/s13389-018-0184-y","journal-title":"J. Cryptogr. Eng."},{"key":"17_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-3-319-52153-4_6","volume-title":"Topics in Cryptology \u2013 CT-RSA 2017","author":"H Gross","year":"2017","unstructured":"Gross, H., Mangard, S., Korak, T.: An efficient side-channel protected AES implementation with arbitrary protection order. In: Handschuh, H. (ed.) CT-RSA 2017. LNCS, vol. 10159, pp. 95\u2013112. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-52153-4_6"},{"issue":"4","key":"17_CR45","doi-asserted-by":"publisher","first-page":"209","DOI":"10.46586\/tches.v2020.i4.209-238","volume":"2020","author":"Q Guo","year":"2020","unstructured":"Guo, Q., Grosso, V., Standaert, F.-X., Bronchain, O.: Modeling soft analytical side-channel attacks from a coding theory viewpoint. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(4), 209\u2013238 (2020)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"issue":"4","key":"17_CR46","doi-asserted-by":"publisher","first-page":"88","DOI":"10.46586\/tches.v2021.i4.88-113","volume":"2021","author":"M Hamburg","year":"2021","unstructured":"Hamburg, M., et al.: Chosen ciphertext k-trace attacks on masked CCA2 secure kyber. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4), 88\u2013113 (2021)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"17_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/11767480_16","volume-title":"Applied Cryptography and Network Security","author":"C Herbst","year":"2006","unstructured":"Herbst, C., Oswald, E., Mangard, S.: An AES smart card implementation resistant to power analysis attacks. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 239\u2013252. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11767480_16"},{"issue":"1","key":"17_CR48","first-page":"60","volume":"2023","author":"J Hermelink","year":"2023","unstructured":"Hermelink, J., Streit, S., Strieder, E., Thieme, K.: Adapting belief propagation to counter shuffling of NTTs. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(1), 60\u201388 (2023)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"17_CR49","doi-asserted-by":"publisher","unstructured":"Hoffmann, C., Libert, B., Momin, C., Peters, T., Standaert, F.-X.: POLKA: towards leakage-resistant post-quantum CCA-secure public key encryption. In: Boldyreva, A., Kolesnikov, V. (eds.) PKC 2023. LNCS, vol. 13940, pp. 114\u2013144. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-31368-4_5","DOI":"10.1007\/978-3-031-31368-4_5"},{"key":"17_CR50","doi-asserted-by":"crossref","unstructured":"Impagliazzo, R., Levin, L.A., Luby, M.: Pseudo-random generation from one-way functions (extended abstracts). In: STOC, pp. 12\u201324. ACM (1989)","DOI":"10.1145\/73007.73009"},{"key":"17_CR51","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1007\/978-3-540-45146-4_27","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"Y Ishai","year":"2003","unstructured":"Ishai, Y., Sahai, A., Wagner, D.: Private circuits: securing hardware against probing attacks. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 463\u2013481. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45146-4_27"},{"key":"17_CR52","doi-asserted-by":"publisher","unstructured":"Klein, O., Komargodski, I.: New bounds on the local leakage resilience of Shamir\u2019s secret sharing scheme. In: Boldyreva, A., Kolesnikov, V. (eds.) CRYPTO 2023. LNCS, vol. 14081, pp. 139\u2013170. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-38557-5_5","DOI":"10.1007\/978-3-031-38557-5_5"},{"issue":"1","key":"17_CR53","first-page":"589","volume":"2022","author":"D Knichel","year":"2022","unstructured":"Knichel, D., Moradi, A., M\u00fcller, N., Sasdrich, P.: Automated generation of masked hardware. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(1), 589\u2013629 (2022)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"17_CR54","unstructured":"Lyubashevsky, V., et al.: CRYSTALS-Dilithium Algorithm Specifications and Supporting Documentation. NIST Post-Quantum Cryptography Standard (2022)"},{"key":"17_CR55","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/978-3-030-77886-6_12","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2021","author":"HK Maji","year":"2021","unstructured":"Maji, H.K., Nguyen, H.H., Paskin-Cherniavsky, A., Suad, T., Wang, M.: Leakage-resilience of the Shamir secret-sharing scheme against physical-bit leakages. In: Canteaut, A., Standaert, F.-X. (eds.) EUROCRYPT 2021. LNCS, vol. 12697, pp. 344\u2013374. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-77886-6_12"},{"key":"17_CR56","doi-asserted-by":"publisher","unstructured":"Maji, H.K., et al.: Leakage-resilient linear secret-sharing against arbitrary bounded-size leakage family. In: Kiltz, E., Vaikuntanathan, V. (eds.) TCC 2022. LNCS, vol. 13747, pp. 355\u2013383. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-22318-1_13","DOI":"10.1007\/978-3-031-22318-1_13"},{"key":"17_CR57","unstructured":"Maji, H.K., et al.: Tight estimate of the local leakage resilience of the additive secret-sharing scheme & its consequences. In: ITC 2022. LNCS, vol. 230, pp. 16:1\u201316:19. Schloss Dagstuhl - Leibniz-Zentrum f\u00fcr Informatik (2022)"},{"key":"17_CR58","doi-asserted-by":"crossref","unstructured":"Maji, H.K., Nguyen, H.H., Paskin-Cherniavsky, A., Wang, M.: Improved bound on the local leakage-resilience of Shamir\u2019s secret sharing. In: ISIT, pp. 2678\u20132683. IEEE (2022)","DOI":"10.1109\/ISIT50566.2022.9834695"},{"key":"17_CR59","doi-asserted-by":"publisher","unstructured":"Maji, H.K., Nguyen, H.H., Paskin-Cherniavsky, A., Ye, X.: Constructing leakage-resilient Shamir\u2019s secret sharing: over composite order fields. In: Joye, M., Leander, G. (eds.) EUROCRYPT 2024. LNCS, vol. 14654, pp. 286\u2013315. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-58737-5_11","DOI":"10.1007\/978-3-031-58737-5_11"},{"key":"17_CR60","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1007\/978-3-030-84252-9_26","volume-title":"Advances in Cryptology \u2013 CRYPTO 2021","author":"HK Maji","year":"2021","unstructured":"Maji, H.K., Paskin-Cherniavsky, A., Suad, T., Wang, M.: Constructing locally leakage-resilient linear secret-sharing schemes. In: Malkin, T., Peikert, C. (eds.) CRYPTO 2021. LNCS, vol. 12827, pp. 779\u2013808. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-84252-9_26"},{"key":"17_CR61","doi-asserted-by":"publisher","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks - Revealing the Secrets of Smart Cards. Springer, Cham (2007). https:\/\/doi.org\/10.1007\/978-0-387-38162-6","DOI":"10.1007\/978-0-387-38162-6"},{"key":"17_CR62","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/978-3-540-30574-3_24","volume-title":"Topics in Cryptology \u2013 CT-RSA 2005","author":"S Mangard","year":"2005","unstructured":"Mangard, S., Popp, T., Gammel, B.M.: Side-channel leakage of masked CMOS gates. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 351\u2013365. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/978-3-540-30574-3_24"},{"key":"17_CR63","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/11545262_12","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"S Mangard","year":"2005","unstructured":"Mangard, S., Pramstaller, N., Oswald, E.: Successfully attacking masked AES hardware implementations. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 157\u2013171. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11545262_12"},{"key":"17_CR64","doi-asserted-by":"publisher","unstructured":"Masure, L., M\u00e9aux, P., Moos, T., Standaert, F.-X.: Effective and efficient masking with low noise using small-mersenne-prime ciphers. In: Hazay, C., Stam, M. (eds.) EUROCRYPT 2023. LNCS, vol. 14007, pp. 596\u2013627. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30634-1_20","DOI":"10.1007\/978-3-031-30634-1_20"},{"key":"17_CR65","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-642-27257-8_8","volume-title":"Smart Card Research and Advanced Applications","author":"M Medwed","year":"2011","unstructured":"Medwed, M., Petit, C., Regazzoni, F., Renauld, M., Standaert, F.-X.: Fresh re-keying II: securing multiple parties against side-channel and fault attacks. In: Prouff, E. (ed.) CARDIS 2011. LNCS, vol. 7079, pp. 115\u2013132. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-27257-8_8"},{"key":"17_CR66","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/978-3-642-12678-9_17","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2010","author":"M Medwed","year":"2010","unstructured":"Medwed, M., Standaert, F.-X., Gro\u00dfsch\u00e4dl, J., Regazzoni, F.: Fresh re-keying: security against side-channel and fault attacks for low-cost devices. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol. 6055, pp. 279\u2013296. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-12678-9_17"},{"key":"17_CR67","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"630","DOI":"10.1007\/978-3-030-64837-4_21","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2020","author":"B Mennink","year":"2020","unstructured":"Mennink, B.: Beyond birthday bound secure fresh rekeying: application to authenticated encryption. In: Moriai, S., Wang, H. (eds.) ASIACRYPT 2020. LNCS, vol. 12491, pp. 630\u2013661. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-64837-4_21"},{"key":"17_CR68","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/978-3-030-21568-2_17","volume-title":"Applied Cryptography and Network Security","author":"V Migliore","year":"2019","unstructured":"Migliore, V., G\u00e9rard, B., Tibouchi, M., Fouque, P.-A.: Masking Dilithium. In: Deng, R.H., Gauthier-Uma\u00f1a, V., Ochoa, M., Yung, M. (eds.) ACNS 2019. LNCS, vol. 11464, pp. 344\u2013362. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-21568-2_17"},{"issue":"2","key":"17_CR69","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/s00145-010-9085-7","volume":"24","author":"S Nikova","year":"2011","unstructured":"Nikova, S., Rijmen, V., Schl\u00e4ffer, M.: Secure hardware implementation of nonlinear functions in the presence of glitches. J. Cryptol. 24(2), 292\u2013321 (2011)","journal-title":"J. Cryptol."},{"key":"17_CR70","doi-asserted-by":"publisher","unstructured":"Obremski, M., Ribeiro, J., Roy, L., Standaert, F.-X., Venturi, D.: Improved reductions from noisy to bounded and probing leakages via hockey-stick divergences. In: Reyzin, L., Stebila, D. (eds.) CRYPTO 2024. LNCS, vol. 14925, pp. 461\u2013491. Springer (2024). https:\/\/doi.org\/10.1007\/978-3-031-68391-6_14","DOI":"10.1007\/978-3-031-68391-6_14"},{"key":"17_CR71","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/978-3-030-30530-7_7","volume-title":"Progress in Cryptology \u2013 LATINCRYPT 2019","author":"P Pessl","year":"2019","unstructured":"Pessl, P., Primas, R.: More practical single-trace attacks on the number theoretic transform. In: Schwabe, P., Th\u00e9riault, N. (eds.) LATINCRYPT 2019. LNCS, vol. 11774, pp. 130\u2013149. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30530-7_7"},{"key":"17_CR72","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-319-75208-2_8","volume-title":"Smart Card Research and Advanced Applications","author":"R Poussier","year":"2018","unstructured":"Poussier, R., Guo, Q., Standaert, F.-X., Carlet, C., Guilley, S.: Connecting and improving direct sum masking and inner product masking. In: Eisenbarth, T., Teglia, Y. (eds.) CARDIS 2017. LNCS, vol. 10728, pp. 123\u2013141. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-75208-2_8"},{"key":"17_CR73","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/978-3-319-66787-4_25","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2017","author":"R Primas","year":"2017","unstructured":"Primas, R., Pessl, P., Mangard, S.: Single-trace side-channel attacks on masked lattice-based encryption. In: Fischer, W., Homma, N. (eds.) CHES 2017. LNCS, vol. 10529, pp. 513\u2013533. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66787-4_25"},{"key":"17_CR74","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1007\/978-3-642-38348-9_9","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2013","author":"E Prouff","year":"2013","unstructured":"Prouff, E., Rivain, M.: Masking against side-channel attacks: a formal security proof. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 142\u2013159. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38348-9_9"},{"issue":"2","key":"17_CR75","doi-asserted-by":"publisher","first-page":"35:1","DOI":"10.1145\/3603170","volume":"23","author":"P Ravi","year":"2024","unstructured":"Ravi, P., Chattopadhyay, A., D\u2019Anvers, J.-P., Baksi, A.: Side-channel and fault-injection attacks over lattice-based post-quantum schemes (kyber, dilithium): survey and new results. ACM Trans. Embed. Comput. Syst. 23(2), 35:1-35:54 (2024)","journal-title":"ACM Trans. Embed. Comput. Syst."},{"key":"17_CR76","unstructured":"Rivain, M.: On the provable security of cryptographic implementations: habilitation thesis. Personal website (2022). https:\/\/www.matthieurivain.com\/hdr.html"},{"key":"17_CR77","unstructured":"Schwabe, P., et al.: CRYSTALS-Kyber Algorithm Specifications and Supporting Documentation, NIST Post-Quantum Cryptography Standard (2022)"},{"key":"17_CR78","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/978-3-030-89915-8_8","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"B Udvarhelyi","year":"2021","unstructured":"Udvarhelyi, B., Bronchain, O., Standaert, F.-X.: Security analysis of deterministic re-keying with masking and shuffling: application to ISAP. In: Bhasin, S., De Santis, F. (eds.) COSADE 2021. LNCS, vol. 12910, pp. 168\u2013183. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-89915-8_8"},{"key":"17_CR79","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1007\/978-3-642-34961-4_44","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2012","author":"N Veyrat-Charvillon","year":"2012","unstructured":"Veyrat-Charvillon, N., Medwed, M., Kerckhof, S., Standaert, F.-X.: Shuffling against side-channel attacks: a comprehensive study with cautionary note. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 740\u2013757. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34961-4_44"},{"key":"17_CR80","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/978-3-319-54669-8_11","volume-title":"Smart Card Research and Advanced Applications","author":"W Wang","year":"2017","unstructured":"Wang, W., et al.: Inner product masking for Bitslice ciphers and security order amplification for linear leakages. In: Lemke-Rust, K., Tunstall, M. (eds.) CARDIS 2016. LNCS, vol. 10146, pp. 174\u2013191. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-54669-8_11"},{"key":"17_CR81","doi-asserted-by":"crossref","unstructured":"Yu, Y., Standaert, F.-X., Pereira, O., Yung, M.: Practical leakage-resilient pseudorandom generators. In: CCS, pp. 141\u2013151. ACM (2010)","DOI":"10.1145\/1866307.1866324"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-5096-8_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T11:24:30Z","timestamp":1765106670000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-5096-8_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"ISBN":["9789819550951","9789819550968"],"references-count":81,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-5096-8_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,8]]},"assertion":[{"value":"8 December 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASIACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Application of Cryptology and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, VIC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asiacrypt2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asiacrypt.iacr.org\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}