{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:07:57Z","timestamp":1730225277803,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1109\/hst.2011.5954993","type":"proceedings-article","created":{"date-parts":[[2011,7,20]],"date-time":"2011-07-20T20:53:14Z","timestamp":1311195194000},"page":"40-46","source":"Crossref","is-referenced-by-count":3,"title":["Formal security evaluation of hardware Boolean masking against second-order attacks"],"prefix":"10.1109","author":[{"given":"Houssem","family":"Maghrebi","sequence":"first","affiliation":[]},{"given":"Sylvain","family":"Guilley","sequence":"additional","affiliation":[]},{"given":"Jean-Luc","family":"Danger","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"One for All - All for One: Unifying Standard DPA Attacks","author":"mangard","year":"2009","journal-title":"Cryptology ePrint Archive Report"},{"key":"ref11","first-page":"150","article-title":"Securing the AES Finalists Against Power Analysis Attacks","author":"messerges","year":"2000","journal-title":"Fast Software Encrypt"},{"key":"ref12","first-page":"71","article-title":"Using second-Order Power Analysis to Attack DPA resistant Software","volume":"1965","author":"messerges","year":"2000","journal-title":"CHES"},{"key":"ref13","first-page":"238","article-title":"Using Second-Order Power Analysis to Attack DPA Resistant Software","volume":"1965","author":"messerges","year":"2000","journal-title":"CHES"},{"key":"ref14","first-page":"192","article-title":"Practical second-order dpa attacks for masked smart card implementations of block ciphers","author":"oswald","year":"0","journal-title":"Pointcheval [16]"},{"key":"ref15","first-page":"309","article-title":"Improved Higher-Order Side-Channel Attacks With FPGA Experiments","volume":"3659","author":"peeters","year":"2005","journal-title":"CHES"},{"key":"ref16","article-title":"Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006","volume":"3860","author":"pointcheval","year":"2006","journal-title":"Proceedings"},{"key":"ref17","first-page":"81","article-title":"First-Order Side-Channel Attacks on the Permutation Tables Countermeasure","volume":"5747","author":"prouff","year":"2009","journal-title":"CHES"},{"key":"ref18","article-title":"First-order side-channel attacks on the permutation tables countermeasure - extended version -. Cryptology ePrint Archive","author":"prouff","year":"2010","journal-title":"Report 2010\/385"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2009.15"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11925-5_16"},{"key":"ref3","first-page":"13","article-title":"Template Attacks","volume":"2523","author":"chari","year":"2002","journal-title":"CHES"},{"key":"ref6","first-page":"158","article-title":"DES and Differential Power Analysis","author":"goubin","year":"1999","journal-title":"CHES LNCS"},{"key":"ref5","first-page":"426","article-title":"Mutual information analysis","volume":"5154","author":"gierlichs","year":"2008","journal-title":"CHES 10th International Workshop"},{"key":"ref8","first-page":"222","article-title":"Hardware Countermeasures against DPA - A Statistical Analysis of Their Effectiveness","volume":"2964","author":"mangard","year":"2004","journal-title":"CT-RSA"},{"key":"ref7","first-page":"293","article-title":"On Second-Order Differential Power Analysis","volume":"3659","author":"joye","year":"2005","journal-title":"CHES"},{"key":"ref2","article-title":"Towards Sound Approaches to Counteract Power-Analysis Attacks","volume":"1666","author":"chari","year":"1999","journal-title":"Crypto"},{"journal-title":"Power Analysis Attacks Revealing the Secrets of Smart Cards","year":"2006","author":"mangard","key":"ref9"},{"key":"ref1","first-page":"309","article-title":"An Implementation of DES and AES Secure against Some Attacks","volume":"2162","author":"akkar","year":"2001","journal-title":"LNCS editor Proceedings of CHES'01"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ReConFig.2010.75"},{"key":"ref22","first-page":"443","article-title":"A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks","volume":"5479","author":"standaert","year":"2009","journal-title":"Eurocrypt"},{"key":"ref21","first-page":"208","article-title":"Higher Order Masking of the AES","author":"schramm","year":"0","journal-title":"Pointcheval [16]"},{"key":"ref24","first-page":"112","article-title":"The World is Not Enough: Another Look on Second-Order DPA","volume":"6477","author":"standaert","year":"2010","journal-title":"ASIACRYPT"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2006.311315"},{"key":"ref25","first-page":"1","article-title":"Towards Efficient Second-Order Power Analysis","volume":"3156","author":"waddle","year":"2004","journal-title":"CHES"}],"event":{"name":"2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","start":{"date-parts":[[2011,6,5]]},"location":"San Diego, CA, USA","end":{"date-parts":[[2011,6,6]]}},"container-title":["2011 IEEE International Symposium on Hardware-Oriented Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5946040\/5954984\/05954993.pdf?arnumber=5954993","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T01:27:10Z","timestamp":1490059630000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5954993\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/hst.2011.5954993","relation":{},"subject":[],"published":{"date-parts":[[2011,6]]}}}