{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T13:38:09Z","timestamp":1758893889772,"version":"3.41.0"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,6,24]],"date-time":"2015-06-24T00:00:00Z","timestamp":1435104000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptogr Eng"],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1007\/s13389-015-0105-2","type":"journal-article","created":{"date-parts":[[2015,6,23]],"date-time":"2015-06-23T13:23:10Z","timestamp":1435065790000},"page":"201-216","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Formally proved security of assembly code against power analysis"],"prefix":"10.1007","volume":"6","author":[{"given":"Pablo","family":"Rauzy","sequence":"first","affiliation":[]},{"given":"Sylvain","family":"Guilley","sequence":"additional","affiliation":[]},{"given":"Zakaria","family":"Najm","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,24]]},"reference":[{"key":"105_CR1","doi-asserted-by":"crossref","unstructured":"Battistello, A., Giraud, C.: Fault analysis of infective AES computations. In: Fischer, W., Schmidt, J.-M., (Eds.), 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography. Los Alamitos, CA, USA, August 20, 2013, IEEE, pp. 101\u2013107, Santa Barbara, CA, USA (2013)","DOI":"10.1109\/FDTC.2013.12"},{"key":"105_CR2","unstructured":"Bhasin, S., Danger, J.-L., Guilley, S., Zakaria, N.: NICV: normalized inter-class variance for detection of side-channel leakage. In: International symposium on electromagnetic compatibility (EMC \u201914 \/ Tokyo). IEEE, (May 12\u201316 2014). Session OS09: EM Information Leakage. Hitotsubashi Hall (National Center of Sciences), Chiyoda, Tokyo, Japan (2014)"},{"key":"105_CR3","doi-asserted-by":"crossref","unstructured":"Bhasin, S., Danger, J.-L., Guilley, S., Zakaria, N.: Side-channel leakage and trace compression using normalized inter-class variance. In: Proceedings of the Third Workshop on Hardware and Architectural Support for Security and Privacy, HASP \u201914, pp. 7:1\u20137:9, ACM, New York, NY, USA (2014)","DOI":"10.1145\/2611765.2611772"},{"key":"105_CR4","doi-asserted-by":"crossref","unstructured":"Biham, E.: A fast new DES Implementation in software. In: Biham, E. (ed.), FSE, volume 1267 of Lecture Notes in Computer Science, pp. 260\u2013272, Springer, Berlin (1997)","DOI":"10.1007\/BFb0052352"},{"key":"105_CR5","doi-asserted-by":"crossref","unstructured":"Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J. B., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher. In: CHES, volume 4727 of LNCS, pp. 450\u2013466, Springer, Berlin (September 10\u201313 2007). Vienna, Austria (2007)","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"105_CR6","doi-asserted-by":"crossref","unstructured":"Brier, \u00c9., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: CHES, volume 3156 of LNCS, pp. 16\u201329, Springer, Berlin (August 11\u201313 2004). Cambridge, MA, USA (2004)","DOI":"10.1007\/978-3-540-28632-5_2"},{"issue":"1","key":"105_CR7","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/s13389-012-0028-0","volume":"2","author":"C Carlet","year":"2012","unstructured":"Carlet, C., Faug\u00e8re, J.-C., Goyet, C., Renault, G.: Analysis of the algebraic side channel attack. J. Cryptogr. Eng. 2(1), 45\u201362 (2012)","journal-title":"J. Cryptogr. Eng."},{"key":"105_CR8","doi-asserted-by":"crossref","unstructured":"Carlet, C., Goubin, L., Prouff, E., Quisquater, M., Rivain, M.: Higher-order masking schemes for S-boxes. In: Canteaut, A. (Ed.), Fast Software Encryption\u201419th International Workshop, FSE 2012, Washington, DC, USA, March 19\u201321, 2012. Revised Selected Papers, volume 7549 of Lecture Notes in Computer Science, pp. 366\u2013384, Springer, Berlin (2012)","DOI":"10.1007\/978-3-642-34047-5_21"},{"key":"105_CR9","doi-asserted-by":"crossref","unstructured":"Chen, C., Eisenbarth, T., Shahverdi, A., Ye, X.: Balanced encoding to mitigate power analysis: a case study. In: CARDIS, Lecture Notes in Computer Science. Springer, Berlin (November 2014). Paris, France (2014)","DOI":"10.1007\/978-3-319-16763-3_4"},{"key":"105_CR10","doi-asserted-by":"crossref","unstructured":"Chen, Z., Sinha, A., Schaumont, P.: Using virtual secure circuit to protect embedded software from side-channel attacks. IEEE Trans. Comput. 62(1), 124\u2013136 (2013)","DOI":"10.1109\/TC.2011.225"},{"key":"105_CR11","unstructured":"Common Criteria Consortium. Common Criteria (aka CC) for Information Technology Security Evaluation (ISO\/IEC 15408) (2013). http:\/\/www.commoncriteriaportal.org\/"},{"key":"105_CR12","doi-asserted-by":"crossref","unstructured":"Coron, J.-S., Prouff, E., Rivain, M.: Side channel cryptanalysis of a higher order masking scheme. In: Paillier, P., Verbauwhede, I. (Eds.), CHES, volume 4727 of LNCS, pp. 28\u201344, Springer, Berlin (2007)","DOI":"10.1007\/978-3-540-74735-2_3"},{"key":"105_CR13","unstructured":"Courtois, N., Hulme, D., Mourouzis, T.: Solving circuit optimisation problems in cryptography and cryptanalysis. IACR Cryptology ePrint Archive, 2011:475, 2011. (Also presented in SHARCS 2012, Washington DC, (17\u201318 March 2012), on page 179)"},{"key":"105_CR14","first-page":"253","volume":"2013","author":"G Doychev","year":"2013","unstructured":"Doychev, G., Feld, D., K\u00f6pf, B., Mauborgne, L., Reineke, J.: CacheAudit: a tool for the static analysis of cache side channels. IACR Cryptol. ePrint Arc. 2013, 253 (2013)","journal-title":"IACR Cryptol. ePrint Arc."},{"key":"105_CR15","doi-asserted-by":"crossref","unstructured":"Eisenbarth, T., Gong, Z., G\u00fcneysu, T., Heyse, S., Indesteege, S., Kerckhof, S., Koeune, F., Nad, T., Plos, T., Regazzoni, F., Standaert, F.-X., Oldenzeel, L.V.O.: Tot: compact implementation and performance evaluation of block ciphers in attiny devices. In: Mitrokotsa, A., Vaudenay, S. (Eds.), AFRICACRYPT, volume 7374 of Lecture Notes in Computer Science, pp. 172\u2013187, Springer, Berlin (2012)","DOI":"10.1007\/978-3-642-31410-0_11"},{"issue":"2","key":"105_CR16","doi-asserted-by":"crossref","first-page":"11:1","DOI":"10.1145\/2685616","volume":"24","author":"H Eldib","year":"2014","unstructured":"Eldib, H., Wang, C., Schaumont, P.: Formal verification of software countermeasures against side-channel attacks. ACM Trans. Softw. Eng. Methodol. 24(2), 11:1\u201311:24 (2014)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"issue":"11","key":"105_CR17","doi-asserted-by":"crossref","first-page":"1482","DOI":"10.1109\/TC.2008.109","volume":"57","author":"S Guilley","year":"2008","unstructured":"Guilley, S., Chaudhuri, S., Sauvage, L., Hoogvorst, P., Pacalet, R., Bertoni, G.M.: Security evaluation of WDDL and SecLib countermeasures against power attacks. IEEE Trans. Comput. 57(11), 1482\u20131497 (2008)","journal-title":"IEEE Trans. Comput."},{"key":"105_CR18","doi-asserted-by":"crossref","unstructured":"Guilley, S., Hoogvorst, P., Mathieu, Y., Pacalet, R.: The \u201cBackend Duplication\u201d method. In: CHES, volume 3659 of LNCS, pp. 383\u2013397. Springer, Berlin, August 29th September 1st, Edinburgh, Scotland, UK (2005)","DOI":"10.1007\/11545262_28"},{"key":"105_CR19","doi-asserted-by":"publisher","unstructured":"Guilley, S., Hoogvorst, P., Pacalet, R.: Differential power analysis model and some results. In: Kluwer (Ed.), Proceedings of WCC\/CARDIS, pp. 127\u2013142, (Aug 2004), Toulouse, France. (2004). doi: 10.1007\/1-4020-8147-2_9","DOI":"10.1007\/1-4020-8147-2_9"},{"key":"105_CR20","doi-asserted-by":"crossref","unstructured":"G\u00fcneysu, T., Moradi, A.: Generic side-channel countermeasures for reconfigurable devices. In:Preneel, B., Takagi, T. (Eds.), CHES, volume 6917 of LNCS, pp. 33\u201348, Springer, Berlin (2011)","DOI":"10.1007\/978-3-642-23951-9_3"},{"key":"105_CR21","doi-asserted-by":"crossref","unstructured":"Heuser, A., Rioul, O., Guilley, S.: A theoretical study of kolmogorov-smirnov distinguishers\u2014side-channel analysis vs. differential cryptanalysis. In: Emmanuel P., (Ed.) COSADE, volume 8622 of Lecture Notes in Computer Science, pp. 9\u201328, Springer, Berlin (2014)","DOI":"10.1007\/978-3-319-10175-0_2"},{"key":"105_CR22","unstructured":"Hoogvorst, P., Danger, J.-L., Duc, G.: Software implementation of dual-rail representation. In: COSADE, (February 24\u201325 2011). Darmstadt, Germany (2011)"},{"key":"105_CR23","doi-asserted-by":"crossref","unstructured":"Ishai, Y., Prabhakaran, M., Sahai, A., Wagner, D.: Private circuits II: keeping secrets in tamperable circuits. In: EUROCRYPT, volume 4004 of Lecture Notes in Computer Science, pp. 308\u2013327, Springer, Berlin (May 28\u2013June 1, 2006). St. Petersburg, Russia (2006)","DOI":"10.1007\/11761679_19"},{"key":"105_CR24","doi-asserted-by":"crossref","unstructured":"Ishai, Y., Sahai, A., Wagner, D.: Private circuits: securing hardware against probing attacks. In: CRYPTO, volume 2729 of Lecture Notes in Computer Science, pp. 463\u2013481, Springer, Berlin (August 17\u201321 2003). Santa Barbara, California, USA (2003)","DOI":"10.1007\/978-3-540-45146-4_27"},{"key":"105_CR25","doi-asserted-by":"crossref","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Proceedings of CRYPTO\u201996, volume 1109 of LNCS, pp. 104\u2013113, Springer, Berlin (1996)","DOI":"10.1007\/3-540-68697-5_9"},{"key":"105_CR26","doi-asserted-by":"crossref","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M.J. (Ed.), CRYPTO, volume 1666 of Lecture Notes in Computer Science, pp. 388\u2013397, Springer, Berlin (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"key":"105_CR27","doi-asserted-by":"crossref","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Proceedings of CRYPTO\u201999, volume 1666 of LNCS, pp. 388\u2013397, Springer, Berlin (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"key":"105_CR28","doi-asserted-by":"crossref","unstructured":"K\u00f6pf, B., Basin, D.A.: An information-theoretic model for adaptive side-channel attacks. In: Peng N., Sabrina De C. V., Syverson, P.F. (Eds.), ACM Conference on Computer and Communications Security, pp. 286\u2013296, ACM, New York (2007)","DOI":"10.1145\/1315245.1315282"},{"key":"105_CR29","doi-asserted-by":"crossref","unstructured":"K\u00f6pf, B., D\u00fcrmuth, M.: A provably secure and efficient countermeasure against timing attacks. In: CSF, pp. 324\u2013335, IEEE Computer Society (2009)","DOI":"10.1109\/CSF.2009.21"},{"key":"105_CR30","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power analysis attacks: revealing the secrets of smart cards. Springer, Berlin (2006). ISBN 0-387-30857-1. http:\/\/www.dpabook.org\/"},{"key":"105_CR31","doi-asserted-by":"publisher","unstructured":"Mangard, S., Oswald, E., Standaert, F.-X.: One for all\u2014all for one: unifying standard dpa attacks. Information Security, IET, 5(2):100\u2013111 (2011). ISSN: 1751\u20138709. Digital Object Identifier. doi: 10.1049\/iet-ifs.2010.0096","DOI":"10.1049\/iet-ifs.2010.0096"},{"key":"105_CR32","doi-asserted-by":"crossref","unstructured":"Mangard, S., Schramm, K.: Pinpointing the side-channel leakage of masked AES hardware implementations. In: CHES, volume 4249 of LNCS, pp. 76\u201390, Springer, Berlin (October 10\u201313 2006), Yokohama, Japan (2006)","DOI":"10.1007\/11894063_7"},{"issue":"3","key":"105_CR33","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/s13389-012-0036-0","volume":"2","author":"L Mather","year":"2012","unstructured":"Mather, L., Oswald, E.: Pinpointing side-channel information leaks in web applications. J. Cryptogr. Eng. 2(3), 161\u2013177 (2012)","journal-title":"J. Cryptogr. Eng."},{"key":"105_CR34","doi-asserted-by":"publisher","unstructured":"Medwed, M., Standaert, F.-X., Gro\u00dfsch\u00e4dl, J., Regazzoni, F.: Fresh re-keying: security against side-channel and fault attacks for low-cost devices. In: AFRICACRYPT, volume 6055 of LNCS, pp. 279\u2013296, Springer, (May 03\u201306 2010). Stellenbosch, South Africa. doi: 10.1007\/978-3-642-12678-9_17","DOI":"10.1007\/978-3-642-12678-9_17"},{"issue":"9","key":"105_CR35","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1016\/S0141-9331(03)00092-9","volume":"27","author":"S Moore","year":"2003","unstructured":"Moore, S., Anderson, R., Mullins, R., Taylor, G., Jacques, J.J.A.: Balanced self-checking asynchronous logic for smart card applications. J. Microprocess. Microsyst. 27(9), 421\u2013430 (2003)","journal-title":"J. Microprocess. Microsyst."},{"key":"105_CR36","doi-asserted-by":"crossref","unstructured":"Moss, A., Oswald, E., Page, D., Tunstall, M.: Compiler assisted masking. In: Emmanuel P., Patrick S., (Eds.), CHES, volume 7428 of LNCS, pp. 58\u201375, Springer, Berlin (2012)","DOI":"10.1007\/978-3-642-33027-8_4"},{"key":"105_CR37","doi-asserted-by":"crossref","unstructured":"Nassar, M., Bhasin, S., Danger, J.-L., Duc, G., Guilley, S.: BCDL: a high performance balanced DPL with global precharge and without early-evaluation. In: DATE\u201910, pp. 849\u2013854, IEEE Computer Society, (March 8\u201312 2010). Dresden, Germany","DOI":"10.1109\/DATE.2010.5456932"},{"key":"105_CR38","doi-asserted-by":"crossref","unstructured":"Popp, T., Mangard, S.: Masked dual-rail pre-charge logic: DPA-resistance without routing constraints. In: Rao, J.R., and Sunar, B. (Eds.), Cryptographic hardware and embedded systems- CHES 2005, volume 3659 of LNCS, pp. 172\u2013186, Springer, Berlin (2005)","DOI":"10.1007\/11545262_13"},{"key":"105_CR39","doi-asserted-by":"crossref","unstructured":"Renauld, M., Standaert, F.-X.: Algebraic side-channel attacks. In: Feng B., Moti Y., Dongdai L., Jiwu J., (Eds.), Inscrypt, volume 6151 of Lecture Notes in Computer Science, pp. 393\u2013410, Springer, Berlin (2009)","DOI":"10.1007\/978-3-642-16342-5_29"},{"key":"105_CR40","doi-asserted-by":"crossref","unstructured":"Renauld, M., Standaert, F.-X., Nicolas, V.-C.: Algebraic side-channel attacks on the AES: why time also matters in DPA. In: CHES, volume 5747 of Lecture Notes in Computer Science, pp. 97\u2013111. Springer, (September 6\u20139 2009). Lausanne, Switzerland (2009)","DOI":"10.1007\/978-3-642-04138-9_8"},{"key":"105_CR41","doi-asserted-by":"crossref","unstructured":"Rivain, M., Prouff, E.: Provably secure higher-order masking of AES. In: Stefan M.,. Standaert, F.-X. (Eds.), CHES, volume 6225 of LNCS, pp. 413\u2013427. Springer, Berlin (2010)","DOI":"10.1007\/978-3-642-15031-9_28"},{"key":"105_CR42","doi-asserted-by":"crossref","unstructured":"Schramm, K., Paar, C.: Higher order masking of the AES. In: David P., (Ed.), CT-RSA, volume 3860 of LNCS, pp. 208\u2013225, Springer, Berlin (2006)","DOI":"10.1007\/11605805_14"},{"key":"105_CR43","doi-asserted-by":"publisher","unstructured":"Selmane, N., Bhasin, S., Guilley, S., Graba, T., Danger, J.-L.: WDDL is protected against setup time violation attacks. In: FDTC, pp. 73\u201383. IEEE Computer Society, (September 6th 2009). In conjunction with CHES\u201909, Lausanne, Switzerland. doi: 10.1109\/FDTC.2009.40 ; Online version: http:\/\/hal.archives-ouvertes.fr\/hal-00410135\/en\/","DOI":"10.1109\/FDTC.2009.40"},{"key":"105_CR44","doi-asserted-by":"crossref","unstructured":"Servant, V., Debande, N., Maghrebi, H., Bringer, J.: Study of a Novel software constant weight implementation. In: CARDIS, Lecture Notes in Computer Science. Springer, (November 2014). Paris, France (2014)","DOI":"10.1007\/978-3-319-16763-3_3"},{"issue":"4","key":"105_CR45","doi-asserted-by":"crossref","first-page":"563","DOI":"10.1109\/92.736128","volume":"6","author":"M Shams","year":"1998","unstructured":"Shams, M., Ebergen, J.C., Elmasry, M.I.: Modeling and comparing CMOS implementations of the C-Element. IEEE Trans. VLSI Syst. 6(4), 563\u2013567 (1998)","journal-title":"IEEE Trans. VLSI Syst."},{"key":"105_CR46","doi-asserted-by":"crossref","unstructured":"Thillard, A., Prouff, E., Roche, T.: Success through confidence: evaluating the effectiveness of a side-channel attack. In: Guido Bertoni and Jean-S\u00e9bastien Coron, editors, CHES, volume 8086 of Lecture Notes in Computer Science, pp. 21\u201336, Springer, Berlin (2013)","DOI":"10.1007\/978-3-642-40349-1_2"},{"key":"105_CR47","doi-asserted-by":"publisher","unstructured":"Tiri, K., Verbauwhede, I.: A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation. In: DATE\u201904, pp. 246\u2013251, IEEE Computer Society, (February 2004). Paris, France. doi: 10.1109\/DATE.2004.1268856","DOI":"10.1109\/DATE.2004.1268856"},{"key":"105_CR48","doi-asserted-by":"crossref","unstructured":"Tiri, K., Verbauwhede, I.: Place and route for secure standard cell design. In: Kluwer, (Ed.), Proceedings of WCC \/ CARDIS, pp. 143\u2013158, (Aug 2004). Toulouse, France","DOI":"10.1007\/1-4020-8147-2_10"},{"issue":"7","key":"105_CR49","doi-asserted-by":"crossref","first-page":"1197","DOI":"10.1109\/TCAD.2005.855939","volume":"25","author":"K Tiri","year":"2006","unstructured":"Tiri, K., Verbauwhede, I.: A digital design flow for secure integrated circuits. IEEE Trans. CAD Integrat. Circuits Syst. 25(7), 1197\u20131208 (2006)","journal-title":"IEEE Trans. CAD Integrat. Circuits Syst."},{"key":"105_CR50","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Juels, A., Reiter, M.K., Ristenpart, T.: Cross-VM side channels and their use to extract private keys. In: Yu, T., Danezis, G., Gligor, V.D. (Eds.), ACM Conference on Computer and Communications Security, pp. 305\u2013316. ACM, New York (2012)","DOI":"10.1145\/2382196.2382230"}],"container-title":["Journal of Cryptographic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-015-0105-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13389-015-0105-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-015-0105-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T20:29:32Z","timestamp":1748464172000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13389-015-0105-2"}},"subtitle":["A case study on balanced logic"],"short-title":[],"issued":{"date-parts":[[2015,6,24]]},"references-count":50,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,9]]}},"alternative-id":["105"],"URL":"https:\/\/doi.org\/10.1007\/s13389-015-0105-2","relation":{},"ISSN":["2190-8508","2190-8516"],"issn-type":[{"type":"print","value":"2190-8508"},{"type":"electronic","value":"2190-8516"}],"subject":[],"published":{"date-parts":[[2015,6,24]]}}}