{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:39:37Z","timestamp":1740123577729,"version":"3.37.3"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62162016"],"award-info":[{"award-number":["62162016"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100017691","name":"Guangxi Key Research and Development Program","doi-asserted-by":"publisher","award":["Guike AB23026131"],"award-info":[{"award-number":["Guike AB23026131"]}],"id":[{"id":"10.13039\/501100017691","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Innovation Research Team Project of Guangxi Natural Science Foundation","award":["2019GXNSFGA245004"],"award-info":[{"award-number":["2019GXNSFGA245004"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62062026"],"award-info":[{"award-number":["62062026"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Electron Test"],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1007\/s10836-023-06076-5","type":"journal-article","created":{"date-parts":[[2023,8,4]],"date-time":"2023-08-04T08:02:01Z","timestamp":1691136121000},"page":"435-445","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["New Second-order Threshold Implementation of Sm4 Block Cipher"],"prefix":"10.1007","volume":"39","author":[{"given":"Tianyi","family":"Shao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4321-1196","authenticated-orcid":false,"given":"Bohua","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Ou","sequence":"additional","affiliation":[]},{"given":"Yongzhuang","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Xiaonian","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,4]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Akkar ML, Giraud C (2001) An implementation of DES and AES, secure against some attacks. In: Proc. International Workshop on Cryptographic Hardware and Embedded Systems, pp. 309\u2013318. Springer","key":"6076_CR1","DOI":"10.1007\/3-540-44709-1_26"},{"doi-asserted-by":"crossref","unstructured":"Bai XF, Guo L, Li T (2008) Differential power analysis attack on SMS4 block cipher. In: Proc. 2008 4th IEEE International Conference on Circuits and Systems for Communications, pp. 613\u2013617. IEEE","key":"6076_CR2","DOI":"10.1109\/ICCSC.2008.136"},{"doi-asserted-by":"crossref","unstructured":"Bilgin B, Gierlichs B, Nikova S, Nikov V, Rijmen V (2014) Higher-order threshold implementations. In: Proc. International Conference on the Theory and Application of Cryptology and Information Security, pp. 326\u2013343. Springer","key":"6076_CR3","DOI":"10.1007\/978-3-662-45608-8_18"},{"doi-asserted-by":"crossref","unstructured":"Brier E, Clavier C, Olivier F (2004) Correlation power analysis with a leakage model. In: Proc. International Workshop on Cryptographic Hardware and Embedded Systems, pp. 16\u201329. Springer","key":"6076_CR4","DOI":"10.1007\/978-3-540-28632-5_2"},{"doi-asserted-by":"crossref","unstructured":"Canright D (2005) A very compact S-box for AES. In: Proc. International Workshop on Cryptographic Hardware and Embedded Systems, pp. 441\u2013455. Springer","key":"6076_CR5","DOI":"10.1007\/11545262_32"},{"doi-asserted-by":"crossref","unstructured":"Daemen J (2017) Changing of the guards: a simple and efficient method for achieving uniformity in threshold sharing. In: Proc. International Conference on Cryptographic Hardware and Embedded Systems, pp. 137\u2013153. Springer","key":"6076_CR6","DOI":"10.1007\/978-3-319-66787-4_7"},{"unstructured":"Dhooghe S, Nikova S, Rijmen V (2021) First-order hardware sharings of the AES. IACR Cryptol ePrint Arch 734","key":"6076_CR7"},{"doi-asserted-by":"crossref","unstructured":"Geng H, Wu J, Liu JM, Choi M, Shi YY (2012) Utilizing random noise in cryptography: where is the tofu? In: Proc. 2012 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD), pp. 163\u2013167. IEEE","key":"6076_CR8","DOI":"10.1145\/2429384.2429415"},{"doi-asserted-by":"crossref","unstructured":"Gross H, Mangard S, Korak T (2016) Domain-oriented masking: Compact masked hardware implementations with arbitrary protection order. In: Proc. 2016 ACM Workshop on Theory of Implementation Security, p. 3. Association for Computing Machinery, New York, NY, USA","key":"6076_CR9","DOI":"10.1145\/2996366.2996426"},{"doi-asserted-by":"crossref","unstructured":"He W, Jap D (2015) Dual-rail active protection system against side-channel analysis in FPGAs. In: Proc. 2015 IEEE 26th International Conference on Application-specific Systems, Architectures and Processors (ASAP), pp. 64\u201365. IEEE","key":"6076_CR10","DOI":"10.1109\/ASAP.2015.7245707"},{"doi-asserted-by":"crossref","unstructured":"Ishai Y, Sahai A, Wagner D (2003) Private circuits: Securing hardware against probing attacks. In: Proc. Annual International Cryptology Conference, pp. 463\u2013481. Springer","key":"6076_CR11","DOI":"10.1007\/978-3-540-45146-4_27"},{"unstructured":"ISO\/IEC: 18033-3 (2021) Information technology-Security techniques-Encryption algorithms-Part 3: Block ciphers-Amendment 1: SM4. Available at https:\/\/www.iso.org\/standard\/81564.html","key":"6076_CR12"},{"doi-asserted-by":"crossref","unstructured":"Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Proc. Annual International Cryptology Conference, pp. 388\u2013397. Springer","key":"6076_CR13","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"5","key":"6076_CR14","first-page":"641","volume":"6","author":"XC Li","year":"2018","unstructured":"Li XC, Zhong WD, Zhang SW, Yang XY (2018) A threshold implementation scheme for the SM4 S-box. J Cryptologic Res 6(5):641\u2013650","journal-title":"J Cryptologic Res"},{"doi-asserted-by":"crossref","unstructured":"Liang H, Wu LJ, Zhang XM, Wang JB (2014) Design of a masked S-box for SM4 based on composite field. In: Proc. 2014 Tenth International Conference on Computational Intelligence and Security, pp. 387\u2013391. IEEE","key":"6076_CR15","DOI":"10.1109\/CIS.2014.59"},{"doi-asserted-by":"crossref","unstructured":"Liu F, Ji W, Hu L, Ding JT, Lv SW, Pyshkin A, Weinmann RP (2007) Analysis of the SMS4 block cipher. In: Proc. Australasian Conference on Information Security and Privacy, pp. 158\u2013170. Springer","key":"6076_CR16","DOI":"10.1007\/978-3-540-73458-1_13"},{"issue":"2","key":"6076_CR17","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/s00145-010-9085-7","volume":"24","author":"S Nikova","year":"2011","unstructured":"Nikova S, Rijmen V, Schl\u00e4ffer M (2011) Secure hardware implementation of nonlinear functions in the presence of glitches. J Cryptol 24(2):292\u2013321","journal-title":"J Cryptol"},{"doi-asserted-by":"crossref","unstructured":"Nikova S, Rechberger C, Rijmen V (2006) Threshold implementations against side-channel attacks and glitches. In: Proc. International Conference on Information and Communications Security, pp. 529\u2013545. Springer","key":"6076_CR18","DOI":"10.1007\/11935308_38"},{"issue":"1","key":"6076_CR19","first-page":"79","volume":"3","author":"C Pei","year":"2016","unstructured":"Pei C (2016) A method of masking SM4 and analysis against DPA attacks. J Cryptologic Res 3(1):79\u201390","journal-title":"J Cryptologic Res"},{"doi-asserted-by":"crossref","unstructured":"Reparaz O, Bilgin B, Nikova S, Gierlichs B, Verbauwhede I (2015) Consolidating masking schemes. In: Proc. Annual Cryptology Conference, pp. 764\u2013783. Springer","key":"6076_CR20","DOI":"10.1007\/978-3-662-47989-6_37"},{"doi-asserted-by":"crossref","unstructured":"Schneider T, Moradi A (2015) Leakage assessment methodology - a clear roadmap for side-channel evaluations. In: Proc. Cryptographic Hardware and Embedded Systems, pp. 495\u2013513. Springer, Berlin, Heidelberg","key":"6076_CR21","DOI":"10.1007\/978-3-662-48324-4_25"},{"doi-asserted-by":"publisher","unstructured":"Shahmirzadi, A.R., Bo\u017eilov, D., Moradi, A (2021) New first-order secure AES performance records. IACR Trans Cryptogr Hardw Embed Syst 2021(2), 304\u2013327. https:\/\/doi.org\/10.46586\/tches.v2021.i2.304-327","key":"6076_CR22","DOI":"10.46586\/tches.v2021.i2.304-327"},{"issue":"3","key":"6076_CR23","doi-asserted-by":"publisher","first-page":"708","DOI":"10.46586\/tches.v2021.i3.708-755","volume":"2021","author":"AR Shahmirzadi","year":"2021","unstructured":"Shahmirzadi AR, Moradi A (2021) Second-order SCA security with almost no fresh randomness. IACR Trans Cryptogr Hardw Embed Syst 2021(3):708\u2013755","journal-title":"IACR Trans Cryptogr Hardw Embed Syst"},{"issue":"1","key":"6076_CR24","first-page":"305","volume":"2021","author":"AR Shahmirzadi","year":"2021","unstructured":"Shahmirzadi AR, Moradi A (2021) Re-consolidating first-order masking schemes: Nullifying fresh randomness. IACR Trans Cryptogr Hardw Embed Syst 2021(1):305\u2013342","journal-title":"IACR Trans Cryptogr Hardw Embed Syst"},{"unstructured":"Trichina E (2003) Combinational logic design for AES subbyte transformation on masked data. IACR Cryptol ePrint Arch 236","key":"6076_CR25"},{"doi-asserted-by":"crossref","unstructured":"Waddle J, Wagner D (2004) Towards efficient second-order power analysis. In: Proc. International Workshop on Cryptographic Hardware and Embedded Systems, pp. 1\u201315. Springer","key":"6076_CR26","DOI":"10.1007\/978-3-540-28632-5_1"},{"issue":"2","key":"6076_CR27","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1049\/iet-ifs.2018.5244","volume":"13","author":"YZ Wei","year":"2019","unstructured":"Wei YZ, Yao F, Pasalic E, Wang A (2019) New second-order threshold implementation of AES. IET Inf Secur 13(2):117\u2013124","journal-title":"IET Inf Secur"},{"issue":"5","key":"6076_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-018-9794-6","volume":"64","author":"M Wei","year":"2021","unstructured":"Wei M, Sun SW, Wei ZH, Hu L (2021) Unbalanced sharing: a threshold implementation of SM4. Sci China Inf Sci 64(5):1\u20133","journal-title":"Sci China Inf Sci"}],"container-title":["Journal of Electronic Testing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-023-06076-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10836-023-06076-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-023-06076-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,30]],"date-time":"2023-09-30T07:12:21Z","timestamp":1696057941000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10836-023-06076-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8]]},"references-count":28,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["6076"],"URL":"https:\/\/doi.org\/10.1007\/s10836-023-06076-5","relation":{},"ISSN":["0923-8174","1573-0727"],"issn-type":[{"type":"print","value":"0923-8174"},{"type":"electronic","value":"1573-0727"}],"subject":[],"published":{"date-parts":[[2023,8]]},"assertion":[{"value":"22 December 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 July 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 August 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}