{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T13:19:29Z","timestamp":1758892769848,"version":"3.28.0"},"reference-count":25,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET Inf. Secur."],"published-print":{"date-parts":[[2008,3,10]]},"DOI":"10.1049\/iet-ifs:20070066","type":"journal-article","created":{"date-parts":[[2008,3,17]],"date-time":"2008-03-17T22:46:00Z","timestamp":1205793960000},"page":"1-11","source":"Crossref","is-referenced-by-count":14,"title":["Security analysis of higher-order Boolean masking schemes for block ciphers (with conditions of perfect masking)"],"prefix":"10.1049","volume":"2","author":[{"given":"G.","family":"Piret","sequence":"first","affiliation":[{"name":"De\u0301partement d'Informatique, Ecole Normale Supe\u0301rieure, 45 Rue d'Ulm, Paris, 75230, France"}]},{"given":"F.-X.","family":"Standaert","sequence":"additional","affiliation":[{"name":"UCL Crypto Group, Universite\u0301 Catholique de Louvain, Place du Levant 3, Louvain-La-Neuve, B-1348, Belgium"}]}],"member":"265","reference":[{"key":"10.1049\/iet-ifs:20070066_r1","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","author":"Kocher","year":"1999","journal-title":"Annual Int. Cryptology Conf. Advances in Cryptology, CRYPTO'99"},{"key":"10.1049\/iet-ifs:20070066_r2","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1007\/3-540-48059-5_15","author":"Goubin","year":"1999","journal-title":"Int. Workshop on Cryptographic Hardware and Embedded Systems, CHES'99"},{"key":"10.1049\/iet-ifs:20070066_r3","first-page":"192","author":"Akkar","year":"2003","journal-title":"Int. Workshop on Fast Software Encryption, FSE 2003"},{"key":"10.1049\/iet-ifs:20070066_r4","first-page":"413","author":"Oswald","year":"2005","journal-title":"Int. Workshop on Fast Software Encryption, FSE 2005"},{"key":"10.1049\/iet-ifs:20070066_r5","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1007\/11545262_14","author":"Fischer","year":"2005","journal-title":"Int. Workshop on Cryptographic Hardware and Embedded Systems, CHES 2005"},{"key":"10.1049\/iet-ifs:20070066_r6","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1007\/11545262_13","author":"Popp","year":"2005","journal-title":"Int. Workshop on Cryptographic Hardware and Embedded Systems, CHES 2005"},{"key":"10.1049\/iet-ifs:20070066_r7","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1007\/3-540-44499-8_19","author":"Messerges","year":"2000","journal-title":"Int. Workshop on Cryptographic Hardware and Embedded Systems, CHES 2000"},{"key":"10.1049\/iet-ifs:20070066_r8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-540-28632-5_1","author":"Waddle","year":"2004","journal-title":"Int. Workshop on Cryptographic Hardware and Embedded Systems, CHES 2004"},{"key":"10.1049\/iet-ifs:20070066_r9","first-page":"562","volume":"1","author":"Standaert","year":"2005","journal-title":"Int. Symp. Information Technology: Coding and computing (ITCC)"},{"key":"10.1049\/iet-ifs:20070066_r10","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1007\/11545262_23","author":"Peeters","year":"2005","journal-title":"Int. Workshop on Cryptographic Hardware and Embedded Systems, CHES 2005"},{"key":"10.1049\/iet-ifs:20070066_r11","first-page":"192","author":"Oswald","year":"2006","journal-title":"The Cryptographers' Track at the RSA Conf. 2006, Topics in Cryptology, CT-RSA 2006"},{"key":"10.1049\/iet-ifs:20070066_r12","first-page":"424","author":"Prouff","year":"2005","journal-title":"Int. Workshop on Fast Software Encryption, FSE 2005"},{"journal-title":"Proc. CHES'07, Vienna, Austria, September 2007","first-page":"28","author":"Coron","key":"10.1049\/iet-ifs:20070066_r13"},{"key":"10.1049\/iet-ifs:20070066_r14","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1007\/11894063_3","author":"Standaert","year":"2006","journal-title":"Int. Workshop on Cryptographic Hardware and Embedded Systems, CHES 2006"},{"key":"10.1049\/iet-ifs:20070066_r15","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/11596219_5","author":"Carlet","year":"2005","journal-title":"Int. Conf. Progress in Cryptology in India, Indocrypt 2005"},{"journal-title":"Int. Conf. Smart Card Research and Advanced Applications (CARDIS) VI","first-page":"127","author":"Guilley","key":"10.1049\/iet-ifs:20070066_r16"},{"key":"10.1049\/iet-ifs:20070066_r17","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","author":"Brier","year":"2004","journal-title":"Int. Workshop on Cryptographic Hardware and Embedded Systems, CHES 2004"},{"key":"10.1049\/iet-ifs:20070066_r18","unstructured":"\u2018What do S-boxes say in differential side-channel attacks?\u2019, Cryptology ePrint Archive Report, 2005\/311, available at: http:\/\/www.eprint.iacr.org\/"},{"key":"10.1049\/iet-ifs:20070066_r19","unstructured":"\u2018A formal practice-oriented model for the analysis of side-channel attacks\u2019, Cryptology ePrint Archive, 2006\/139, 2006 available at: http:\/\/www.eprint.iacr.org\/"},{"key":"10.1049\/iet-ifs:20070066_r20","first-page":"13","author":"Chari","year":"2002","journal-title":"Int. Workshop on Cryptographic Hardware and Embedded Systems, CHES 2002"},{"key":"10.1049\/iet-ifs:20070066_r21","first-page":"157","author":"Coron","year":"2000","journal-title":"Int. Conf. Financial Cryptography FC 2000"},{"key":"10.1049\/iet-ifs:20070066_r22","first-page":"335","author":"Standaert","year":"2006","journal-title":"Reconfigurable Computing: Architectures and Applications, ARC 2006"},{"key":"10.1049\/iet-ifs:20070066_r23","first-page":"208","author":"Schramm","year":"2006","journal-title":"The Cryptographers' Track at the RSA Conf. 2006, Topics in Cryptology, CT-RSA 2006"},{"key":"10.1049\/iet-ifs:20070066_r24","first-page":"150","author":"Messerges","year":"2000","journal-title":"Int. Workshop on Fast Software Encryption, FSE2000"},{"key":"10.1049\/iet-ifs:20070066_r25","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1007\/978-3-540-28632-5_12","author":"Schramm","year":"2004","journal-title":"Int. Workshop on Cryptographic Hardware and Embedded Systems, CHES 2004"}],"container-title":["IET Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/digital-library.theiet.org\/content\/journals\/10.1049\/iet-ifs_20070066?crawler=true&mimetype=application\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T14:20:05Z","timestamp":1731421205000},"score":1,"resource":{"primary":{"URL":"http:\/\/digital-library.theiet.org\/doi\/10.1049\/iet-ifs%3A20070066"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3,10]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2008,3,10]]}},"alternative-id":["10.1049\/iet-ifs:20070066"],"URL":"https:\/\/doi.org\/10.1049\/iet-ifs:20070066","relation":{},"ISSN":["1751-8709","1751-8717"],"issn-type":[{"type":"print","value":"1751-8709"},{"type":"electronic","value":"1751-8717"}],"subject":[],"published":{"date-parts":[[2008,3,10]]}}}