{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T13:57:01Z","timestamp":1764251821722,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,1]]},"DOI":"10.1109\/host55118.2023.10133208","type":"proceedings-article","created":{"date-parts":[[2023,5,25]],"date-time":"2023-05-25T17:29:36Z","timestamp":1685035776000},"page":"57-67","source":"Crossref","is-referenced-by-count":2,"title":["Security Order of Gate-Level Masking Schemes"],"prefix":"10.1109","author":[{"given":"Sof\u0131ane","family":"Takarabt","sequence":"first","affiliation":[{"name":"Think Ahead Business Line,Secure-IC S.A.S.,Paris,France,75014"}]},{"given":"Javad","family":"Bahrami","sequence":"additional","affiliation":[{"name":"University of Maryland Baltimore County,Baltimore,US,21250"}]},{"given":"Mohammad","family":"Ebrahimabadi","sequence":"additional","affiliation":[{"name":"University of Maryland Baltimore County,Baltimore,US,21250"}]},{"given":"Sylvain","family":"Guilley","sequence":"additional","affiliation":[{"name":"Think Ahead Business Line,Secure-IC S.A.S.,Paris,France,75014"}]},{"given":"Naghmeh","family":"Karimi","sequence":"additional","affiliation":[{"name":"University of Maryland Baltimore County,Baltimore,US,21250"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2996366.2996426"},{"key":"ref12","first-page":"251","article-title":"Electromagnetic Analysis: Concrete Results","author":"gandolfi","year":"2001","journal-title":"CHES"},{"key":"ref15","first-page":"1040","article-title":"Threshold implementations of GIFT: A trade-off analysis","author":"gupta","year":"2017","journal-title":"IACR Cryptology"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/GCCE.2014.7031104"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-89641-0_13"},{"key":"ref11","article-title":"Threshold Implementations of the PRESENT Cipher","author":"farmani","year":"2017","journal-title":"Worcester Polytechnic Institute"},{"key":"ref10","first-page":"13","article-title":"Template attacks","author":"chari","year":"2002","journal-title":"CHES"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3411504.3421219"},{"journal-title":"Nangate 45nm open cell library","year":"0","key":"ref1"},{"key":"ref17","first-page":"724","article-title":"Consolidating Inner Product Masking","author":"josep balasch","year":"2017","journal-title":"ASIACRYPT"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_27"},{"key":"ref19","first-page":"388","article-title":"Differential Power Analysis","author":"paul","year":"1999","journal-title":"J Cryptologv"},{"key":"ref18","first-page":"104","article-title":"Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems","volume":"1109","author":"paul","year":"1996","journal-title":"CRYPTO'96"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2996366.2996369"},{"key":"ref23","first-page":"1","article-title":"On the Simplicity of Converting Leakages from Multivariate to Univariate -(Case Study of a GlitchResistant Masking Scheme)","author":"moradi","year":"2013","journal-title":"CHES"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00730-9_14"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/11935308_38"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_2"},{"key":"ref22","article-title":"Messerges and Ezzy A","author":"thomas","year":"1999","journal-title":"Dabbish Investigations of Power Analysis Attacks on Smartcards In Scott"},{"journal-title":"Power Analysis Attacks Revealing the Secrets of Smart Cards","year":"2006","author":"mangard","key":"ref21"},{"key":"ref28","first-page":"243","article-title":"Template Attacks on Masking ---Resistance Is Futile","author":"oswald","year":"2007","journal-title":"CT-RSA"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9085-7"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9086-6"},{"key":"ref8","first-page":"16","article-title":"Correlation power analysis with a leakage model","author":"brier","year":"2004","journal-title":"CHES"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30564-4_5"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-017-0170-9"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.5220\/0011307600003283"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.23919\/DATE54114.2022.9774763"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45608-8_18"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06734-6_17"}],"event":{"name":"2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","start":{"date-parts":[[2023,5,1]]},"location":"San Jose, CA, USA","end":{"date-parts":[[2023,5,4]]}},"container-title":["2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10132842\/10132914\/10133208.pdf?arnumber=10133208","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T17:56:10Z","timestamp":1686592570000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10133208\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,1]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/host55118.2023.10133208","relation":{},"subject":[],"published":{"date-parts":[[2023,5,1]]}}}