{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:43:46Z","timestamp":1761709426815,"version":"3.37.3"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T00:00:00Z","timestamp":1504224000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["644052"],"award-info":[{"award-number":["644052"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010665","name":"H2020 Marie Sk\u0142odowska-Curie Actions","doi-asserted-by":"publisher","award":["643161"],"award-info":[{"award-number":["643161"]}],"id":[{"id":"10.13039\/100010665","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Hardw Syst Secur"],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1007\/s41635-017-0015-0","type":"journal-article","created":{"date-parts":[[2017,11,30]],"date-time":"2017-11-30T12:43:47Z","timestamp":1512045827000},"page":"269-281","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Methodology for the Characterisation of Leakages in Combinatorial Logic"],"prefix":"10.1007","volume":"1","author":[{"given":"Guido","family":"Bertoni","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3398-9444","authenticated-orcid":false,"given":"Marco","family":"Martinoli","sequence":"additional","affiliation":[]},{"given":"Maria Chiara","family":"Molteni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,30]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Bertoni G, Daemen J, Debande N, Le T, Peeters M, Assche GV (2012) Power analysis of hardware implementations protected with secret sharing. In: IEEE\/ACM International symposium on microarchitecture, MICRO, pp 9\u201316","DOI":"10.1109\/MICROW.2012.12"},{"key":"15_CR2","unstructured":"Bertoni G, Daemen J, Peeters M, Assche GV (2010) Building power analysis resistant implementations of Keccak. In: Second SHA-3 candidate conference"},{"key":"15_CR3","doi-asserted-by":"publisher","unstructured":"Bertoni G, Daemen J, Peeters M, Assche GV (2013) Keccak. In: Johansson T, Nguyen PQ (eds) EUROCRYPT 2013, LNCS, vol 7881. Springer, Heidelberg, pp 313\u2013314, \n                        https:\/\/doi.org\/10.1007\/978-3-642-38348-9_19","DOI":"10.1007\/978-3-642-38348-9_19"},{"key":"15_CR4","doi-asserted-by":"publisher","unstructured":"Bertoni G, Martinoli M (2016) A methodology for the characterisation of leakages in combinatorial logic. In: Carlet C, Hasan MA, Saraswat V (eds) Proceedings of the 6th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2016, Hyderabad, India, December 14\u201318, 2016. Springer International Publishing, Cham, pp 363\u2013382. ISBN: 978-3-319-49445-6, \n                        https:\/\/doi.org\/10.1007\/978-3-319-49445-6_21","DOI":"10.1007\/978-3-319-49445-6_21"},{"key":"15_CR5","doi-asserted-by":"publisher","unstructured":"Bilgin B, Gierlichs B, Nikova S, Nikov V, Rijmen V (2014) Higher-order threshold implementations. In: Sarkar P, Iwata T (eds) ASIACRYPT 2014, Part II, LNCS, vol 8874. Springer, Heidelberg, pp 326\u2013343, \n                        https:\/\/doi.org\/10.1007\/978-3-662-45608-8_18","DOI":"10.1007\/978-3-662-45608-8_18"},{"key":"15_CR6","doi-asserted-by":"publisher","unstructured":"Bilgin B, Gierlichs B, Nikova S, Nikov V, Rijmen V (2014) A more efficient AES threshold implementation. In: Pointcheval D, Vergnaud D (eds) AFRICACRYPT 14, LNCS, vol 8469. Springer, Heidelberg, pp 267\u2013284, \n                        https:\/\/doi.org\/10.1007\/978-3-319-06734-6_17","DOI":"10.1007\/978-3-319-06734-6_17"},{"issue":"3","key":"15_CR7","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1023\/A:1026218512171","volume":"23","author":"J Brzozowski","year":"2003","unstructured":"Brzozowski J, \u00c9sik Z (2003) Hazard algebras. Formal Methods Syst Des 23(3):223\u2013256","journal-title":"Formal Methods Syst Des"},{"key":"15_CR8","doi-asserted-by":"publisher","unstructured":"Duc A, Dziembowski S, Faust S (2014) Unifying leakage models: from probing attacks to noisy leakage. In: Nguyen PQ, Oswald E (eds) EUROCRYPT 2014, LNCS, vol 8441. Springer, Heidelberg, pp 423\u2013440, \n                        https:\/\/doi.org\/10.1007\/978-3-642-55220-5_24","DOI":"10.1007\/978-3-642-55220-5_24"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Ishai Y, Sahai A, Wagner D (2003) Private circuits: securing hardware against probing attacks. In: Boneh D (ed) CRYPTO 2003, LNCS, vol 2729. Springer, Heidelberg, pp 463\u2013 481","DOI":"10.1007\/978-3-540-45146-4_27"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Kocher PC, Jaffe J, Jun B (1999) Differential power analysis. In: Wiener MJ (ed) CRYPTO\u201999, LNCS, vol 1666. Springer, Heidelberg, pp 388\u2013397","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"1","key":"15_CR11","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s13389-011-0006-y","volume":"1","author":"PC Kocher","year":"2011","unstructured":"Kocher PC, Jaffe J, Jun B, Rohatgi P (2011) Introduction to differential power analysis. J Cryptograph Eng 1(1):5\u201327","journal-title":"J Cryptograph Eng"},{"key":"15_CR12","doi-asserted-by":"publisher","unstructured":"Leiserson AJ, Marson ME, Wachs MA (2014) Gate-level masking under a path-based leakage metric. In: Batina L, Robshaw M (eds) CHES 2014, LNCS, vol 8731. Springer, Heidelberg, pp 580\u2013597, \n                        https:\/\/doi.org\/10.1007\/978-3-662-44709-3_32","DOI":"10.1007\/978-3-662-44709-3_32"},{"key":"15_CR13","unstructured":"Mangard S, Oswald E, Popp T (2008) Power analysis attacks: tevealing the secrets of smart cards, vol 31. Springer Science & Business Media"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Mangard S, Popp T, Gammel BM (2005) Side-channel leakage of masked CMOS gates. In: Menezes A (ed) CT-RSA 2005, LNCS, vol 3376. Springer, Heidelberg, pp 351\u2013 365","DOI":"10.1007\/978-3-540-30574-3_24"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Mangard S, Pramstaller N, Oswald E (2005) Successfully attacking masked AES hardware implementations. In: Rao JR, Sunar B (eds) CHES 2005, LNCS, vol 3659. Springer, Heidelberg, pp 157\u2013171","DOI":"10.1007\/11545262_12"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Mangard S, Schramm K (2006) Pinpointing the side-channel leakage of masked AES hardware implementations. In: Goubin L, Matsui M (eds) CHES 2006, LNCS, vol 4249. Springer, Heidelberg, pp 76\u201390","DOI":"10.1007\/11894063_7"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Moradi A, Poschmann A, Ling S, Paar C, Wang H (2011) Pushing the limits: a very compact and a threshold implementation of AES. In: Paterson KG (ed) EUROCRYPT 2011, LNCS, vol 6632. Springer, Heidelberg, pp 69\u201388","DOI":"10.1007\/978-3-642-20465-4_6"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Nikova S, Rechberger C, Rijmen V (2006) Threshold implementations against side-channel attacks and glitches. In: Ning P, Qing S, Li N (eds) ICICS 06, LNCS, vol 4307. Springer, Heidelberg, pp 529\u2013545","DOI":"10.1007\/11935308_38"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Nikova S, Rijmen V, Schl\u00e4ffer M (2009) Secure hardware implementation of non-linear functions in the presence of glitches. In: Lee PJ, Cheon JH (eds) ICISC 08, LNCS, vol 5461. Springer, Heidelberg, pp 218\u2013234","DOI":"10.1007\/978-3-642-00730-9_14"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Prouff E, Roche T (2011) Higher-order glitches free implementation of the AES using secure multi-party computation protocols. In: Preneel B, Takagi T (eds) CHES 2011, LNCS, vol 6917. Springer, Heidelberg, pp 63\u201378","DOI":"10.1007\/978-3-642-23951-9_5"},{"key":"15_CR21","volume-title":"Digital integrated circuits, vol 2","author":"JM Rabaey","year":"2002","unstructured":"Rabaey JM, Chandrakasan AP, Nikolic B (2002) Digital integrated circuits, vol 2. Prentice Hall, Englewood Cliffs"},{"key":"15_CR22","doi-asserted-by":"publisher","unstructured":"Reparaz O (2016) Detecting flawed masking schemes with leakage detection tests. In: Peyrin T (ed) FSE 2016, LNCS, vol 9783. Springer, Heidelberg, pp 204\u2013222, \n                        https:\/\/doi.org\/10.1007\/978-3-662-52993-5_11","DOI":"10.1007\/978-3-662-52993-5_11"},{"key":"15_CR23","doi-asserted-by":"publisher","unstructured":"Reparaz O, Bilgin B, Nikova S, Gierlichs B, Verbauwhede I (2015) Consolidating masking schemes. In: Gennaro R, Robshaw MJB (eds) CRYPTO 2015, Part I, LNCS, vol 9215. Springer, Heidelberg, pp 764\u2013783, \n                        https:\/\/doi.org\/10.1007\/978-3-662-47989-6_37","DOI":"10.1007\/978-3-662-47989-6_37"},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"Tiwari M, Wassel HM, Mazloom B, Mysore S, Chong FT, Sherwood T (2009) Complete information flow tracking from the gates up. In: Proceedings of the 14th international conference on architectural support for programming languages and operating systems, pp 109\u2013120","DOI":"10.1145\/1508244.1508258"}],"container-title":["Journal of Hardware and Systems Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s41635-017-0015-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-017-0015-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-017-0015-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,18]],"date-time":"2018-05-18T12:09:53Z","timestamp":1526645393000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s41635-017-0015-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":24,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,9]]}},"alternative-id":["15"],"URL":"https:\/\/doi.org\/10.1007\/s41635-017-0015-0","relation":{},"ISSN":["2509-3428","2509-3436"],"issn-type":[{"type":"print","value":"2509-3428"},{"type":"electronic","value":"2509-3436"}],"subject":[],"published":{"date-parts":[[2017,9]]}}}