{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:42:12Z","timestamp":1740148932616,"version":"3.37.3"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s12095-021-00497-9","type":"journal-article","created":{"date-parts":[[2021,7,15]],"date-time":"2021-07-15T16:06:10Z","timestamp":1626365170000},"page":"543-572","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Monomial evaluation of polynomial functions protected by threshold implementations\u2014with an illustration on AES\u2014"],"prefix":"10.1007","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8964-9126","authenticated-orcid":false,"given":"Simon","family":"Landry","sequence":"first","affiliation":[]},{"given":"Yanis","family":"Linge","sequence":"additional","affiliation":[]},{"given":"Emmanuel","family":"Prouff","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,15]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Akkar, M.-L., Giraud, C.: An implementation of DES and aes, secure against some attacks. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems\u2014CHES 2001, Third International Workshop, Paris, France, May 14\u201316, 2001, Proceedings, volume 2162 of Lecture Notes in Computer Science, pp 309\u2013318. Springer (2001)","key":"497_CR1","DOI":"10.1007\/3-540-44709-1_26"},{"unstructured":"Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation (extended abstract). In: Simon, J. (ed.) Proceedings of the 20th Annual ACM Symposium on Theory of Computing, May 2\u20134, 1988, Chicago, Illinois, USA, pp 1\u201310. ACM (1988)","key":"497_CR2"},{"doi-asserted-by":"crossref","unstructured":"Bilgin, B., Gierlichs, B., Nikova, S., Nikov, V., Rijmen, V.: Higher-order threshold implementations. In: Sarkar, P., Iwata, T. (eds.) Advances in Cryptology\u2014ASIACRYPT 2014\u201420th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7\u201311, 2014, Proceedings, Part II, volume 8874 of Lecture Notes in Computer Science, pp 326\u2013343. Springer (2014)","key":"497_CR3","DOI":"10.1007\/978-3-662-45608-8_18"},{"issue":"7","key":"497_CR4","doi-asserted-by":"publisher","first-page":"1188","DOI":"10.1109\/TCAD.2015.2419623","volume":"34","author":"B Bilgin","year":"2015","unstructured":"Bilgin, B., Gierlichs, B., Nikova, S., Nikov, V., Rijmen, V.: Trade-offs for threshold implementations illustrated on AES. IEEE Trans. CAD Integr. Circ. Syst. 34(7), 1188\u20131200 (2015)","journal-title":"IEEE Trans. CAD Integr. Circ. Syst."},{"doi-asserted-by":"crossref","unstructured":"Bl\u00f6mer, J., Guajardo, J., Krummel, V.: Provably secure masking of AES. In: Handschuh, H., Hasan, M. A. (eds.) Selected Areas in Cryptography, 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers, volume 3357 of Lecture Notes in Computer Science, pp 69\u201383. Springer (2004)","key":"497_CR5","DOI":"10.1007\/978-3-540-30564-4_5"},{"doi-asserted-by":"crossref","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) Cryptographic Hardware and Embedded Systems\u2014CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11\u201313, 2004. Proceedings, volume 3156 of Lecture Notes in Computer Science, pp 16\u201329. Springer (2004)","key":"497_CR6","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"497_CR7","volume-title":"Boolean Functions for Cryptography and Coding Theory","author":"C Carlet","year":"2021","unstructured":"Carlet, C.: Boolean Functions for Cryptography and Coding Theory. Cambridge University Press, Cambridge (2021)"},{"doi-asserted-by":"crossref","unstructured":"Carlet, C., Prouff, E., Rivain, M., Roche, T.: Algebraic decomposition for probing security. IACR Cryptology ePrint Archive 2016:321 (2016)","key":"497_CR8","DOI":"10.1007\/978-3-662-47989-6_36"},{"doi-asserted-by":"crossref","unstructured":"Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards sound approaches to counteract power-analysis attacks. In: Wiener [37], pp 398\u2013412 (1999)","key":"497_CR9","DOI":"10.1007\/3-540-48405-1_26"},{"issue":"2","key":"497_CR10","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/s13389-015-0099-9","volume":"5","author":"J-S Coron","year":"2015","unstructured":"Coron, J.-S., Roy, A., Vivek, S.: Fast evaluation of polynomials over binary finite fields and application to side-channel countermeasures. J. Cryptogr. Eng. 5(2), 73\u201383 (2015)","journal-title":"J. Cryptogr. Eng."},{"doi-asserted-by":"crossref","unstructured":"Daemen, J.: Changing of the guards: a simple and efficient method for achieving uniformity in threshold sharing. In: Fischer, W., Homma, N. (eds.) Cryptographic Hardware and Embedded Systems\u2014CHES 2017\u201419th International Conference, Taipei, Taiwan, September 25\u201328, 2017, Proceedings, volume 10529 of Lecture Notes in Computer Science, pp 137\u2013153. Springer (2017)","key":"497_CR11","DOI":"10.1007\/978-3-319-66787-4_7"},{"key":"497_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael: AES\u2014The Advanced Encryption Standard","author":"J Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael: AES\u2014The Advanced Encryption Standard. Springer, Berlin (2002)"},{"doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd, I., Keller, M.: Secure multiparty AES. In: Sion, R. (ed.) Financial Cryptography and Data Security, 14th International Conference, FC 2010, Tenerife, Canary Islands, Spain, January 25\u201328, 2010, Revised Selected Papers, volume 6052 of Lecture Notes in Computer Science, pp 367\u2013374. Springer (2010)","key":"497_CR13","DOI":"10.1007\/978-3-642-14577-3_31"},{"doi-asserted-by":"crossref","unstructured":"De Cnudde, T., Reparaz, O., Bilgin, B., Nikova, S., Nikov, V., Rijmen, V.: Masking AES with d + 1 shares in hardware. In: Bilgin, B., Nikova, S., Rijmen, V. (eds.) Proceedings of the ACM Workshop on Theory of Implementation Security, TIS@CCS 2016 Vienna, Austria, October, 2016, p 43. ACM (2016)","key":"497_CR14","DOI":"10.1145\/2996366.2996428"},{"doi-asserted-by":"crossref","unstructured":"Fumaroli, G., Mayer, E., Dubois, R.: First-order differential power analysis on the duplication method. In: Srinathan, K., Pandu Rangan, C., Yung, M. (eds.) Progress in Cryptology\u2014INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9\u201313, 2007, Proceedings, volume 4859 of Lecture Notes in Computer Science, pp 210\u2013223. Springer (2007)","key":"497_CR15","DOI":"10.1007\/978-3-540-77026-8_16"},{"doi-asserted-by":"crossref","unstructured":"Fumaroli, G., Martinelli, A., Prouff, E., Rivain, M.: Affine masking against higher-order side channel analysis. In: Biryukov, A., Gong, G., Stinson, D.R. (eds.) Selected Areas in Cryptography\u201417th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12\u201313, 2010, Revised Selected Papers, volume 6544 of Lecture Notes in Computer Science, pp 262\u2013280. Springer (2010)","key":"497_CR16","DOI":"10.1007\/978-3-642-19574-7_18"},{"doi-asserted-by":"crossref","unstructured":"Genelle, L., Prouff, E., Quisquater, M.: Secure multiplicative masking of power functions. In: Nitaj and Pointcheval [30] (2009)","key":"497_CR17","DOI":"10.1007\/978-3-642-13708-2_13"},{"doi-asserted-by":"crossref","unstructured":"Genelle, L., Prouff, E., Quisquater, M.: Montgomery\u2019s trick and fast implementation of masked AES. In: Nitaj and Pointcheval [30], pp 153\u2013169 (2010)","key":"497_CR18","DOI":"10.1007\/978-3-642-21969-6_10"},{"doi-asserted-by":"crossref","unstructured":"Genelle, L., Prouff, E., Quisquater, M.: Thwarting higher-order side channel analysis with additive and multiplicative maskings. IACR Cryptology ePrint Archive 2011:425 (2011)","key":"497_CR19","DOI":"10.1007\/978-3-642-23951-9_16"},{"doi-asserted-by":"crossref","unstructured":"Golic, J.D.J., Tymen, C.: Multiplicative masking and power analysis of AES. In: Kaliski, B.S. Jr., Ko\u00e7, \u00c7.K., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems\u2014CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13\u201315, 2002, Revised Papers, volume 2523 of Lecture Notes in Computer Science, pp 198\u2013212. Springer (2002)","key":"497_CR20","DOI":"10.1007\/3-540-36400-5_16"},{"doi-asserted-by":"crossref","unstructured":"Goubin, L., Patarin, J.: DES and differential power analysis (the \u201cduplication\u201d method). In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems, First International Workshop, CHES\u201999, Worcester, MA, USA, August 12\u201313, 1999, Proceedings, volume 1717 of Lecture Notes in Computer Science, pp 158\u2013172. Springer (1999)","key":"497_CR21","DOI":"10.1007\/3-540-48059-5_15"},{"doi-asserted-by":"crossref","unstructured":"Gro\u00df, H., Mangard, S., Korak, T.: An efficient side-channel protected AES implementation with arbitrary protection order. In: Handschuh, H. (ed.) Topics in Cryptology\u2014CT-RSA 2017\u2014The Cryptographers\u2019 Track at the RSA Conference 2017, San Francisco, CA, USA, February 14\u201317, 2017, Proceedings, volume 10159 of Lecture Notes in Computer Science, pp 95\u2013112. Springer (2017)","key":"497_CR22","DOI":"10.1007\/978-3-319-52153-4_6"},{"doi-asserted-by":"crossref","unstructured":"Ishai, Y., Sahai, A., Wagner, D.A.: Private circuits: securing hardware against probing attacks. In: D. Boneh (ed.) Advances in Cryptology\u2014CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17\u201321, 2003, Proceedings, volume 2729 of Lecture Notes in Computer Science, pp 463\u2013481. Springer (2003)","key":"497_CR23","DOI":"10.1007\/978-3-540-45146-4_27"},{"doi-asserted-by":"crossref","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener [39], pp 388\u2013397 (1999)","key":"497_CR24","DOI":"10.1007\/3-540-48405-1_25"},{"doi-asserted-by":"crossref","unstructured":"Mangard, S., Popp, T., Gammel, B.M.: Side-channel leakage of masked CMOS gates. In: Menezes, A. (ed.) Topics in Cryptology\u2014CT-RSA 2005, The Cryptographers\u2019 Track at the RSA Conference 2005, San Francisco, CA, USA, February 14\u201318, 2005, Proceedings, volume 3376 of Lecture Notes in Computer Science, pp 351\u2013365. Springer (2005)","key":"497_CR25","DOI":"10.1007\/978-3-540-30574-3_24"},{"doi-asserted-by":"crossref","unstructured":"Mangard, S., Pramstaller, N., Oswald, E.: Successfully attacking masked AES hardware implementations. In: Rao and Sunar [31], pp 157\u2013171 (2005)","key":"497_CR26","DOI":"10.1007\/11545262_12"},{"doi-asserted-by":"crossref","unstructured":"Micali, S., Reyzin, L.: Physically observable cryptography (extended abstract). In: Naor, M. (ed.) Theory of Cryptography, First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19\u201321, 2004, Proceedings, volume 2951 of Lecture Notes in Computer Science, pp 278\u2013296. Springer (2004)","key":"497_CR27","DOI":"10.1007\/978-3-540-24638-1_16"},{"doi-asserted-by":"crossref","unstructured":"Moradi, A., Poschmann, A., Ling, S., Paar, C., Wang, H.: Pushing the limits: a very compact and a threshold implementation of AES. In: Paterson, K.G. (ed.) Advances in Cryptology\u2014EUROCRYPT 2011\u201430th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15\u201319, 2011. Proceedings, volume 6632 of Lecture Notes in Computer Science, pp 69\u201388. Springer (2011)","key":"497_CR28","DOI":"10.1007\/978-3-642-20465-4_6"},{"issue":"2","key":"497_CR29","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/s00145-010-9085-7","volume":"24","author":"S Nikova","year":"2011","unstructured":"Nikova, S., Rijmen, V., Schl\u00e4ffer, M.: Secure hardware implementation of nonlinear functions in the presence of glitches. J. Cryptol. 24(2), 292\u2013321 (2011)","journal-title":"J. Cryptol."},{"doi-asserted-by":"crossref","unstructured":"Rivain, M., Dottax, E., Prouff, E.: Block ciphers implementations provably secure against second order side channel analysis. In: Nyberg, K. (ed.) Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10\u201313, 2008, Revised Selected Papers, volume 5086 of Lecture Notes in Computer Science, pp 127\u2013143. Springer (2008)","key":"497_CR30","DOI":"10.1007\/978-3-540-71039-4_8"},{"doi-asserted-by":"crossref","unstructured":"Rivain, M., Prouff, E.: Provably secure higher-order masking of AES. In: Mangard, S., Standaert, F.-X. (eds.) Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17\u201320, 2010. Proceedings, volume 6225 of Lecture Notes in Computer Science, pp 413\u2013427. Springer (2010)","key":"497_CR31","DOI":"10.1007\/978-3-642-15031-9_28"},{"doi-asserted-by":"crossref","unstructured":"Rivest, R.L., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd, C. (ed.) Advances in Cryptology\u2014ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9\u201313, 2001, Proceedings, volume 2248 of Lecture Notes in Computer Science, pp 552\u2013565. Springer (2001)","key":"497_CR32","DOI":"10.1007\/3-540-45682-1_32"},{"issue":"2","key":"497_CR33","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s13389-012-0033-3","volume":"2","author":"T Roche","year":"2012","unstructured":"Roche, T., Prouff, E.: Higher-order glitch free implementation of the AES using secure multi-party computation protocols\u2014extended version. J. Cryptogr. Eng. 2(2), 111\u2013127 (2012)","journal-title":"J. Cryptogr. Eng."},{"issue":"1","key":"497_CR34","first-page":"123","volume":"2019","author":"T Sugawara","year":"2019","unstructured":"Sugawara, T.: 3-share threshold implementation of AES s-box without fresh randomness. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(1), 123\u2013145 (2019)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"doi-asserted-by":"crossref","unstructured":"Suzuki, D., Saeki, M., Ichikawa, T.: DPA leakage models for CMOS logic circuits. In: Rao and Sunar [31], pp 366\u2013382 (2005)","key":"497_CR35","DOI":"10.1007\/11545262_27"},{"doi-asserted-by":"crossref","unstructured":"Vadnala, P.K., Gro\u00dfsch\u00e4dl, J.: Algorithms for switching between boolean and arithmetic masking of second order. In: Gierlichs, B., Guilley, S., Mukhopadhyay, D. (eds.) Security, Privacy, and Applied Cryptography Engineering\u2014Third International Conference, SPACE 2013, Kharagpur, India, October 19\u201323, 2013. Proceedings, volume 8204 of Lecture Notes in Computer Science, pp 95\u2013110. Springer (2013)","key":"497_CR36","DOI":"10.1007\/978-3-642-41224-0_8"},{"doi-asserted-by":"crossref","unstructured":"Yao, A.C.-C.: How to generate and exchange secrets (extended abstract). In: 27th Annual Symposium on Foundations of Computer Science, Toronto, Canada, 27\u201329 October 1986, pp 162\u2013167. IEEE Computer Society (1986)","key":"497_CR37","DOI":"10.1109\/SFCS.1986.25"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-021-00497-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-021-00497-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-021-00497-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,4]],"date-time":"2023-01-04T12:55:57Z","timestamp":1672836957000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-021-00497-9"}},"subtitle":["- Extended version -"],"short-title":[],"issued":{"date-parts":[[2021,7]]},"references-count":37,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["497"],"URL":"https:\/\/doi.org\/10.1007\/s12095-021-00497-9","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"type":"print","value":"1936-2447"},{"type":"electronic","value":"1936-2455"}],"subject":[],"published":{"date-parts":[[2021,7]]},"assertion":[{"value":"15 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 May 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 July 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}