{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:42:11Z","timestamp":1740148931924,"version":"3.37.3"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T00:00:00Z","timestamp":1619222400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T00:00:00Z","timestamp":1619222400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["779882"],"award-info":[{"award-number":["779882"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001942","name":"CHIST-ERA","doi-asserted-by":"publisher","award":["ANR-15-CHR2-0007"],"award-info":[{"award-number":["ANR-15-CHR2-0007"]}],"id":[{"id":"10.13039\/501100001942","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s12095-021-00483-1","type":"journal-article","created":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T06:16:22Z","timestamp":1619331382000},"page":"527-542","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Categorizing all linear codes of IPM over ${\\mathbb {F}}_{2^{8}}$"],"prefix":"10.1007","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9433-7576","authenticated-orcid":false,"given":"Wei","family":"Cheng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5044-3534","authenticated-orcid":false,"given":"Sylvain","family":"Guilley","sequence":"additional","affiliation":[]},{"given":"Jean-Luc","family":"Danger","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,24]]},"reference":[{"key":"483_CR1","doi-asserted-by":"crossref","unstructured":"Akkar, M.-L., Goubin, L.: A generic protection against high-order differential power analysis. In: LNCS, editor, Proceedings of FSE?03, volume 2887 of LNCS, pp. 192\u2013205. Springer, Berlin (2003)","DOI":"10.1007\/978-3-540-39887-5_15"},{"key":"483_CR2","doi-asserted-by":"crossref","unstructured":"Balasch, J., Faust, S., Gierlichs, B.: Inner product masking revisited. In: Oswald, E., Fischlin, M. (eds.) Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26\u201330, 2015, Proceedings, Part I, volume 9056 of Lecture Notes in Computer Science (2015)","DOI":"10.1007\/978-3-662-46800-5_19"},{"key":"483_CR3","doi-asserted-by":"crossref","unstructured":"Balasch, J., Faust, S., Gierlichs, B., Paglialonga, C., Standaert, F.-X.: Consolidating inner product masking. In: Takagi, T., Peyrin, T. (eds.) Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3\u20137, 2017, Proceedings, Part I, volume 10624 of Lecture Notes in Computer Science, pp. 724\u2013754. Springer (2017)","DOI":"10.1007\/978-3-319-70694-8_25"},{"key":"483_CR4","doi-asserted-by":"crossref","unstructured":"Barthe, G., Dupressoir, F., Faust, S., Gr\u00e9goire, B., Standaert, F.-X., Strub, P.-Y.: Parallel implementations of masking schemes and the bounded moment leakage model. In: Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part I, volume 10210 of Lecture Notes in Computer Science, pp. 535\u2013566 (2017)","DOI":"10.1007\/978-3-319-56620-7_19"},{"issue":"1","key":"483_CR5","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1023\/A:1011203416769","volume":"23","author":"K Betsumiya","year":"2001","unstructured":"Betsumiya, K., Harada, M.: Binary optimal odd formally self-dual codes. Des. Codes Cryptography 23(1), 11\u201322 (2001). http:\/\/www.math.nagoya-u.ac.jp\/koichi\/paper\/fsd-odd.pdf","journal-title":"Des. Codes Cryptography"},{"key":"483_CR6","doi-asserted-by":"crossref","unstructured":"Brier, \u00c9., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings, volume 3156 of Lecture Notes in Computer Science, pp. 16\u201329. Springer (2004)","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"483_CR7","doi-asserted-by":"crossref","unstructured":"Bringer, J., Carlet, C., Chabanne, H., Guilley, S., Maghrebi, H.: Orthogonal direct sum masking - a smartcard friendly computation paradigm in a code, with builtin protection against side-channel and fault attacks. In: Naccache, D., Sauveron, D. (eds.) Information Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014 Proceedings, volume 8501 of Lecture Notes in Computer Science, pp. 40\u201356. Springer (2014)","DOI":"10.1007\/978-3-662-43826-8_4"},{"issue":"2","key":"483_CR8","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/s13389-013-0067-1","volume":"4","author":"C Carlet","year":"2014","unstructured":"Carlet, C., Danger, J.-L., Guilley, S., Maghrebi, H., Prouff, E.: Achieving side-channel high-order correlation immunity with leakage squeezing. J. Cryptographic Engineering 4(2), 107\u2013121 (2014)","journal-title":"J. Cryptographic Engineering"},{"issue":"5","key":"483_CR9","doi-asserted-by":"publisher","first-page":"909","DOI":"10.1007\/s12095-017-0271-4","volume":"10","author":"C Carlet","year":"2018","unstructured":"Carlet, C., Guilley, S.: Statistical properties of side-channel and fault injection attacks using coding theory. Cryptogr. Commun. 10(5), 909\u2013933 (2018)","journal-title":"Cryptogr. Commun."},{"key":"483_CR10","unstructured":"Cheng, W., Carlet, C., Goli, K., Danger, J.-L., Guilley, S.: Detecting faults in inner product masking scheme \u2014 IPM-FD: IPM with fault detection, August 24 2019. 8th International workshop on security proofs for embedded systems (PROOFS). Atlanta, GA, USA"},{"key":"483_CR11","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1109\/TIFS.2020.3009609","volume":"16","author":"W Cheng","year":"2021","unstructured":"Cheng, W., Guilley, S., Carlet, C., Mesnager, S., Danger, J.-L.: Optimizing inner product masking scheme by a coding theory approach. IEEE Trans. Inf. Forensics Secur. 16, 220\u2013235 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"483_CR12","unstructured":"Cheng, W., Guilley, S., Danger, J.-L., Carlet, C., Mesnager, S.: Optimal linear codes for IPM. https:\/\/github.com\/Qomo-CHENG\/OC-IPM (2020)"},{"key":"483_CR13","doi-asserted-by":"crossref","unstructured":"Common criteria development board. Application of attack potential to smartcards, mandatory technical document, Version 2.9, Revision 2, CCDB-2013-05-002, May 2013. http:\/\/www.commoncriteriaportal.org\/files\/supdocs\/CCDB-2013-05-002.pdf","DOI":"10.1088\/1475-7516\/2013\/05\/002"},{"key":"483_CR14","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power analysis attacks: Revealing the secrets of smart cards. Springer. ISBN 0-387-30857-1, http:\/\/www.dpabook.org\/ (2006)"},{"key":"483_CR15","doi-asserted-by":"crossref","unstructured":"Moradi, A., Standaert, F.-X.: Moments-Correlating DPA. In: Bilgin, B., Nikova, S., Rijmen, V. (eds.) Proceedings of the ACM workshop on theory of implementation security, TIS@CCS 2016 Vienna, Austria, October, 2016, pp. 5\u201315. ACM (2016)","DOI":"10.1145\/2996366.2996369"},{"key":"483_CR16","unstructured":"Poussier, R., Guo, Q., Standaert, F.-X., Carlet, C., Guilley, S.: Connecting and improving direct sum masking and inner product masking. In: Eisenbarth, T., Teglia, Y. (eds.) Smart Card Research and Advanced Applications - 16th International Conference, CARDIS 2017, Lugano, Switzerland, November 13\u201315, 2017, Revised Selected Papers, volume 10728 of Lecture Notes in Computer Science (2017)"},{"key":"483_CR17","doi-asserted-by":"crossref","unstructured":"Standaert, F.-X., Malkin, T., Yung, M.: A unified framework for the analysis of side-channel key recovery attacks. In: EUROCRYPT volume 5479 of LNCS, Cologne, Germany, pp. 443\u2013461. Springer (2009)","DOI":"10.1007\/978-3-642-01001-9_26"},{"key":"483_CR18","unstructured":"University of Sydney (Australia). Magma computational algebra system. http:\/\/magma.maths.usyd.edu.au\/magma\/, Accessed on 2014-08-22"},{"issue":"2","key":"483_CR19","doi-asserted-by":"publisher","first-page":"128","DOI":"10.46586\/tches.v2020.i2.128-171","volume":"2020","author":"W Wang","year":"2020","unstructured":"Wang, W., M\u00e9aux, P., Standaert, F.-X.: Efficient and private computations with code-based masking. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(2), 128\u2013171 (2020)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"483_CR20","doi-asserted-by":"crossref","unstructured":"Wang, W., Standaert, F.-X., Yu, Y., Pu, S., Liu, J., Guo, Z., Gu, D.: Inner product masking for bitslice ciphers and security order amplification for linear leakages. In: Lemke-Rust, K., Tunstall, M. (eds.) Smart Card Research and Advanced Applications - 15th International Conference, CARDIS 2016, Cannes, France, November 7\u20139, 2016, Revised Selected Papers, volume 10146 of Lecture Notes in Computer Science, pp. 174\u2013191 (2016)","DOI":"10.1007\/978-3-319-54669-8_11"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-021-00483-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-021-00483-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-021-00483-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,10]],"date-time":"2021-08-10T11:58:58Z","timestamp":1628596738000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-021-00483-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,24]]},"references-count":20,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["483"],"URL":"https:\/\/doi.org\/10.1007\/s12095-021-00483-1","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"type":"print","value":"1936-2447"},{"type":"electronic","value":"1936-2455"}],"subject":[],"published":{"date-parts":[[2021,4,24]]},"assertion":[{"value":"15 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 March 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 April 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}