{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T13:06:12Z","timestamp":1765112772583},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,9,11]],"date-time":"2014-09-11T00:00:00Z","timestamp":1410393600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1007\/s12095-014-0104-7","type":"journal-article","created":{"date-parts":[[2014,9,10]],"date-time":"2014-09-10T02:53:03Z","timestamp":1410317583000},"page":"3-33","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":38,"title":["Threshold implementations of small S-boxes"],"prefix":"10.1007","volume":"7","author":[{"given":"Beg\u00fcl","family":"Bilgin","sequence":"first","affiliation":[]},{"given":"Svetla","family":"Nikova","sequence":"additional","affiliation":[]},{"given":"Ventzislav","family":"Nikov","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Rijmen","sequence":"additional","affiliation":[]},{"given":"Natalia","family":"Tokareva","sequence":"additional","affiliation":[]},{"given":"Valeriya","family":"Vitkup","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,9,11]]},"reference":[{"key":"104_CR1","first-page":"309","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2001, volume 2162 of Lecture Notes in Computer Science","author":"M-L Akkar","year":"2001","unstructured":"Akkar, M.-L., Giraud, C.: An implementation of DES and AES, secure against some attacks. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2001, volume 2162 of Lecture Notes in Computer Science, pp 309\u2013318. Springer, Heidelberg (2001)"},{"key":"104_CR2","unstructured":"Andreeva, E.: Atul Luykx Florian Mendel Bart Mennink Nicky Mouha Qingju Wang Beg\u00fcl Bilgin, Andrey Bogdanov, and Kan Yasuda. PRIMATEs. Available at http:\/\/competitions.cr.yp.to\/round1\/primatesv1.pdf"},{"issue":"2","key":"104_CR3","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1007\/s00145-010-9084-8","volume":"24","author":"L Batina","year":"2011","unstructured":"Batina, L., Gierlichs, B., Prouff, E., Rivain, M., Standaert, F.-X., Veyrat-Charvillon, N.: Mutual information analysis: a comprehensive study. J. Cryptol. 24(2), 269\u2013291 (2011)","journal-title":"J. Cryptol."},{"key":"104_CR4","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Building power analysis resistant implementations of Keccak, Second SHA-3 candidate conference (2010)"},{"key":"104_CR5","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: The Keccak reference (2011)"},{"key":"104_CR6","first-page":"142","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2013, volume 8086 of Lecture Notes in Computer Science","author":"B Bilgin","year":"2013","unstructured":"Bilgin, B., Bogdanov, A., Knezevic, M., Mendel, F., Wang, Q.: Fides: Lightweight authenticated cipher with side-channel resistance for constrained hardware. In: Bertoni, G., Coron, J.-S. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2013, volume 8086 of Lecture Notes in Computer Science, pp 142\u2013158. Springer, Heidelberg (2013)"},{"key":"104_CR7","doi-asserted-by":"crossref","unstructured":"Bilgin, B., Daemen, J., Nikov, V., Nikova, S., Rijmen, V., Van Assche, G.: Efficient and first-order DPA resistant implementations of Keccak. To appear in CARDIS (2013)","DOI":"10.1007\/978-3-319-08302-5_13"},{"key":"104_CR8","doi-asserted-by":"crossref","unstructured":"Bilgin, B., Gierlichs, B., Nikova, S., Nikov, V., Rijmen, V.: A more efficient AES threshold implementation. In: Pointcheval, D., Vergnaud, D. (eds.) Progress in Cryptology AFRICACRYPT 2014, volume 8469 of Lecture Notes in Computer Science, pp 267\u2013284. Springer International Publishing (2014)","DOI":"10.1007\/978-3-319-06734-6_17"},{"key":"104_CR9","unstructured":"Bilgin, B., Nikova, S., Nikov, V., Rijmen, V.: TI toolkit. http:\/\/homes.esat.kuleuven.be\/snikova\/ti_tools.html (2013)"},{"key":"104_CR10","unstructured":"Bilgin, B., Nikova, S., Nikov, V., Rijmen, V.: List of decompositions of 4-bit permutations. http:\/\/homes.esat.kuleuven.be\/bbilgin\/other.html (2014)"},{"key":"104_CR11","first-page":"76","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2012, volume 7428 of Lecture Notes in Computer Science","author":"B Bilgin","year":"2012","unstructured":"Bilgin, B., Nikova, S., Nikov, V., Rijmen, V., St\u00fctz, G.: Threshold implementations of all 3x3 and 4x4 s-boxes. In: Prouff, E., Schaumont, P. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2012, volume 7428 of Lecture Notes in Computer Science, pp 76\u201391. Springer, Heidelberg (2012)"},{"key":"104_CR12","doi-asserted-by":"crossref","unstructured":"Biryukov, A., De Canni\u00e8ere, C., Braeken, A., Preneel, B.: A toolbox for cryptanalysis: linear and affine equivalence algorithms. In: Proceedings of the 22Nd International Conference on Theory and Applications of Cryptographic Techniques, EUROCRYPT\u201903, pp. 33\u201350. Springer, Heidelberg (2003)","DOI":"10.1007\/3-540-39200-9_3"},{"key":"104_CR13","first-page":"69","volume-title":"Proceedings of the 11th International Conference on Selected Areas in Cryptography - SAC\u201904, Lecture Notes in Computer Science","author":"J Bl\u00f6mer","year":"2005","unstructured":"Bl\u00f6mer, J., Guajardo, J., Krummel, V.: Provably secure masking of AES. In: Handschuh, H., Hasan, M.A. (eds.) Proceedings of the 11th International Conference on Selected Areas in Cryptography - SAC\u201904, Lecture Notes in Computer Science, pp 69\u201383. Springer, Heidelberg (2005)"},{"key":"104_CR14","unstructured":"Boura, C., Canteaut, A.: On the influence of the algebraic degree of f \u22121 on the algebraic degree of g\u2218f. Cryptology ePrint Archive, Report 2011\/503. http:\/\/eprint.iacr.org\/ (2011)"},{"issue":"1\u20133","key":"104_CR15","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1007\/s10623-008-9194-6","volume":"49","author":"M Brinkmann","year":"2008","unstructured":"Brinkmann, M., Leander, G.: On the classification of APN functions up to dimension five. Des. Codes Crypt. 49(1\u20133), 273\u2013288 (2008)","journal-title":"Des. Codes Crypt."},{"key":"104_CR16","volume-title":"Boolean Models and Methods in Mathematics, Computer Science, and Engineering","author":"C Carlet","year":"2010","unstructured":"Carlet, C.: Vectorial boolean functions for cryptography. In: Crama, Y., Hammer, P.L. (eds.) Boolean Models and Methods in Mathematics, Computer Science, and Engineering. Cambridge University Press, New York (2010)"},{"issue":"2","key":"104_CR17","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1023\/A:1008344232130","volume":"15","author":"C Carlet","year":"1998","unstructured":"Carlet, C., Charpin, P., Zinoviev, V.: Codes, bent functions and permutations suitable for DES-like cryptosystems. Des. Codes Crypt. 15(2), 125\u2013156 (1998)","journal-title":"Des. Codes Crypt."},{"key":"104_CR18","first-page":"441","volume-title":"Advances in Cryptology - EUROCRYPT 2014, volume 8441 of Lecture Notes in Computer Science","author":"J-S Coron","year":"2014","unstructured":"Coron, J.-S.: Higher order masking of look-up tables. In: Nguyen, P.Q., Oswald, E. (eds.) Advances in Cryptology - EUROCRYPT 2014, volume 8441 of Lecture Notes in Computer Science, pp 441\u2013458. Springer, Heidelberg (2014)"},{"key":"104_CR19","first-page":"18","volume-title":"Fast Software Encryption, volume 809 of Lecture Notes in Computer Science","author":"J Daemen","year":"1994","unstructured":"Daemen, J., Govaerts, R., Vandewalle, J.: A new approach to block cipher design. In: Anderson, R. (ed.) Fast Software Encryption, volume 809 of Lecture Notes in Computer Science, pp 18\u201332. Springer, Heidelberg (1994)"},{"key":"104_CR20","first-page":"134","volume-title":"Fast Software Encryption, volume 1978 of Lecture Notes in Computer Science","author":"J Daemen","year":"2001","unstructured":"Daemen, J., Peeters, M., Assche, G.: Bitslice ciphers and power analysis attacks. In: Goos, G., Hartmanis, J., Leeuwen, J., Schneier, B. (eds.) Fast Software Encryption, volume 1978 of Lecture Notes in Computer Science, pp 134\u2013149. Springer, Heidelberg (2001)"},{"key":"104_CR21","unstructured":"De Canniere, C.: Analysis and Design of Symmetric Encryption Algorithms. PhD thesis (2007)"},{"key":"104_CR22","unstructured":"De Canniere, C., Nikov, V., Nikova, S., Rijmen, V.: S-box decompositions for SCA-resisting implementations. Poster presented at CHES 2011, Nara, Japan (2012)"},{"key":"104_CR23","unstructured":"DES: Data encryption standard. In: FIPS PUB 46, Federal Information Processing Standards Publication, pp. 46\u20132 (1977)"},{"key":"104_CR24","unstructured":"Dillon, J.F.: APN polynomials: an update (2009)"},{"key":"104_CR25","first-page":"423","volume-title":"Advances in Cryptology - EUROCRYPT 2014, volume 8441 of Lecture Notes in Computer Science","author":"A Duc","year":"2014","unstructured":"Duc, A., Dziembowski, S., Faust, S.: Unifying leakage models: from probing attacks to noisy leakage. In: Nguyen, P.Q., Oswald, E. (eds.) Advances in Cryptology - EUROCRYPT 2014, volume 8441 of Lecture Notes in Computer Science, pp 423\u2013440. Springer, Heidelberg (2014)"},{"key":"104_CR26","first-page":"198","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002, volume 2523 of Lecture Notes in Computer Science","author":"JD Golic","year":"2003","unstructured":"Golic, J.D., Tymen, C.: Multiplicative masking and power analysis of AES. In: Kaliski, B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2002, volume 2523 of Lecture Notes in Computer Science, pp 198\u2013212. Springer, Heidelberg (2003)"},{"key":"104_CR27","first-page":"463","volume-title":"Advances in Cryptology - CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science","author":"Y Ishai","year":"2003","unstructured":"Ishai, Y., Sahai, A., Wagner, D.: Private circuits: Securing hardware against probing attacks. In: Boneh, D. (ed.) Advances in Cryptology - CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science, pp 463\u2013481. Springer, Heidelberg (2003)"},{"key":"104_CR28","first-page":"16","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010, volume 6225 of Lecture Notes in Computer Science","author":"L Knudsen","year":"2010","unstructured":"Knudsen, L., Leander, G., Poschmann, A., Robshaw, M.J.B.: PRINTcipher: A block cipher for IC-printing. In: Mangard, S., Standaert, F.-X. (eds.) Cryptographic Hardware and Embedded Systems, CHES 2010, volume 6225 of Lecture Notes in Computer Science, pp 16\u201332. Springer, Heidelberg (2010)"},{"key":"104_CR29","unstructured":"Kutzner, S., Nguyen, P.H.: Axel Poschmann. Enabling 3-share threshold implementations for any 4-bit S-box. Cryptology ePrint Archive, Report 2012\/510. http:\/\/eprint.iacr.org\/ (2012)"},{"key":"104_CR30","first-page":"159","volume-title":"Arithmetic of Finite Fields, volume 4547 of Lecture Notes in Computer Science","author":"G Leander","year":"2007","unstructured":"Leander, G., Poschmann, A.: On the classification of 4 bit S-Boxes. In: Carlet, C., Sunar, B. (eds.) Arithmetic of Finite Fields, volume 4547 of Lecture Notes in Computer Science, pp 159\u2013176. Springer, Heidelberg (2007)"},{"key":"104_CR31","volume-title":"Finite fields, volume 20 of Encyclopedia of Mathematics and its Applications, 2nd edn.","author":"R Lidl","year":"1997","unstructured":"Lidl, R., Niederreiter, H.: Finite fields, volume 20 of Encyclopedia of Mathematics and its Applications, 2nd edn. Cambridge University Press, Cambridge (1997)"},{"key":"104_CR32","volume-title":"Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)","author":"S Mangard","year":"2007","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security). Springer-Verlag, New York (2007)"},{"key":"104_CR33","first-page":"157","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2005, volume 3659 of Lecture Notes in Computer Science","author":"S Mangard","year":"2005","unstructured":"Mangard, S., Pramstaller, N., Oswald, E.: Successfully attacking masked AES hardware implementations. In: Rao, J.R., Sunar, B. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2005, volume 3659 of Lecture Notes in Computer Science, pp 157\u2013171. Springer, Heidelberg (2005)"},{"key":"104_CR34","doi-asserted-by":"crossref","unstructured":"Moradi, A.: Statistical tools flavor side-channel collision attacks. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT, volume 7237 of Lecture Notes in Computer Science, pp 428\u2013445. Springer (2012)","DOI":"10.1007\/978-3-642-29011-4_26"},{"key":"104_CR35","doi-asserted-by":"crossref","unstructured":"Moradi, A., Mischke, O., Eisenbarth, T.: Correlation-enhanced power analysis collision attack . In: Mangard, S., Standaert, F.-X. (eds.) CHES, volume 6225 of Lecture Notes in Computer Science, pp 125\u2013139. Springer (2010)","DOI":"10.1007\/978-3-642-15031-9_9"},{"key":"104_CR36","first-page":"69","volume-title":"Advances in Cryptology - EUROCRYPT 2011, volume 6632 of Lecture Notes in Computer Science","author":"A Moradi","year":"2011","unstructured":"Moradi, A., Poschmann, A., Ling, S., Paar, C., Wang, H.: Pushing the limits: A very compact and a threshold implementation of AES. In: Paterson, K. (ed.) Advances in Cryptology - EUROCRYPT 2011, volume 6632 of Lecture Notes in Computer Science, pp 69\u201388. Springer, Heidelberg (2011)"},{"key":"104_CR37","unstructured":"NANGATE. The NanGate 45nm Open Cell Library. Available at, http:\/\/www.nangate.com"},{"key":"104_CR38","first-page":"529","volume-title":"Information and Communications Security, volume 4307 of Lecture Notes in Computer Science","author":"S Nikova","year":"2006","unstructured":"Nikova, S., Rechberger, C., Rijmen, V.: Threshold implementations against side-channel attacks and glitches. In: Ning, P., Qing, S., Li, N. (eds.) Information and Communications Security, volume 4307 of Lecture Notes in Computer Science, pp 529\u2013545. Springer, Heidelberg (2006)"},{"key":"104_CR39","first-page":"218","volume-title":"Information Security and Cryptology - ICISC 2008, volume 5461 of Lecture Notes in Computer Science","author":"S Nikova","year":"2009","unstructured":"Nikova, S., Rijmen, V., Schl\u00e4ffer, M.: Secure hardware implementation of non-linear functions in the presence of glitches. In: Lee, P.J., Cheon, J.H. (eds.) Information Security and Cryptology - ICISC 2008, volume 5461 of Lecture Notes in Computer Science, pp 218\u2013234. Springer, Heidelberg (2009)"},{"key":"104_CR40","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1007\/s00145-010-9085-7","volume":"24","author":"S Nikova","year":"2011","unstructured":"Nikova, S., Rijmen, V., Schl\u00e4ffer, M.: Secure hardware implementation of nonlinear functions in the presence of glitches. J. Cryptol. 24, 292\u2013321 (2011)","journal-title":"J. Cryptol."},{"key":"104_CR41","first-page":"413","volume-title":"Fast Software Encryption, volume 3557 of Lecture Notes in Computer Science","author":"E Oswald","year":"2005","unstructured":"Oswald, E., Mangard, S., Pramstaller, N., Rijmen, V.: A side-channel analysis resistant description of the AES s-box. In: Gilbert, H., Handschuh, H. (eds.) Fast Software Encryption, volume 3557 of Lecture Notes in Computer Science, pp 413\u2013423. Springer, Heidelberg (2005)"},{"key":"104_CR42","first-page":"172","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2005, volume 3659 of Lecture Notes in Computer Science","author":"T Popp","year":"2005","unstructured":"Popp, T., Mangard, S.: Masked dual-rail pre-charge logic: DPA-resistance without routing constraints. In: Rao, J.R., Sunar, B. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2005, volume 3659 of Lecture Notes in Computer Science, pp 172\u2013186. Springer, Heidelberg (2005)"},{"issue":"2","key":"104_CR43","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1007\/s00145-010-9086-6","volume":"24","author":"A Poschmann","year":"2011","unstructured":"Poschmann, A., Moradi, A., Khoo, K., Lim, C.-W., Wang, H., Ling, S.: Side-channel resistant crypto for less than 2,300 GE. J. Cryptol. 24(2), 322\u2013345 (2011)","journal-title":"J. Cryptol."},{"key":"104_CR44","first-page":"413","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2010, volume 6225 of Lecture Notes in Computer Science","author":"M Rivain","year":"2010","unstructured":"Rivain, M., Prouff, E.: Provably secure higher-order masking of AES. In: Mangard, S., Standaert, F.-X. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2010, volume 6225 of Lecture Notes in Computer Science, pp 413\u2013427. Springer, Heidelberg (2010)"},{"key":"104_CR45","volume-title":"An introduction to the theory of groups","author":"JJ Rotman","year":"1999","unstructured":"Rotman, J.J.: An introduction to the theory of groups. Springer-Verlag, Heidelberg (1999)"},{"key":"104_CR46","first-page":"118","volume-title":"Selected Areas in Cryptography, volume 7118 of Lecture Notes in Computer Science","author":"M-JO Saarinen","year":"2012","unstructured":"Saarinen, M.-J.O.: Cryptographic analysis of all 4 x 4-bit s-boxes. In: Miri, A., Vaudenay, S. (eds.) Selected Areas in Cryptography, volume 7118 of Lecture Notes in Computer Science, pp 118\u2013133. Springer, Heidelberg (2012)"},{"key":"104_CR47","doi-asserted-by":"crossref","unstructured":"Tiri, K., Verbauwhede, I.: A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation. In: Proceedings of the Conference on Design, Automation and Test in Europe - volume 1, DATE \u201904, pp. 10246\u2013. IEEE Computer Society, Washington (2004)","DOI":"10.1109\/DATE.2004.1268856"},{"key":"104_CR48","first-page":"113","volume-title":"Advanced Encryption Standard - AES, volume 3373 of Lecture Notes in Computer Science","author":"E Trichina","year":"2005","unstructured":"Trichina, E., Korkishko, T., Lee, K.: Small size, low power, side channel-immune AES coprocessor: design and synthesis results. In: Dobbertin, H., Rijmen, V., Sowa, A. (eds.) Advanced Encryption Standard - AES, volume 3373 of Lecture Notes in Computer Science, pp 113\u2013127. Springer, Heidelberg (2005)"},{"key":"104_CR49","first-page":"143","volume-title":"Fast Software Encryption, volume 2365 of Lecture Notes in Computer Science","author":"R Wernsdorf","year":"2002","unstructured":"Wernsdorf, R.: The round functions of rijndael generate the alternating group. In: Daemen, J., Rijmen, V. (eds.) Fast Software Encryption, volume 2365 of Lecture Notes in Computer Science, pp 143\u2013148. Springer, Heidelberg (2002)"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-014-0104-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-014-0104-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-014-0104-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T17:06:47Z","timestamp":1565802407000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-014-0104-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,11]]},"references-count":49,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,3]]}},"alternative-id":["104"],"URL":"https:\/\/doi.org\/10.1007\/s12095-014-0104-7","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,9,11]]}}}