{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:03:24Z","timestamp":1761581004302,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/hst.2012.6224316","type":"proceedings-article","created":{"date-parts":[[2012,7,9]],"date-time":"2012-07-09T15:35:17Z","timestamp":1341848117000},"page":"37-42","source":"Crossref","is-referenced-by-count":4,"title":["Register leakage masking using Gray code"],"prefix":"10.1109","author":[{"given":"Houssem","family":"Maghrebi","sequence":"first","affiliation":[]},{"given":"Sylvain","family":"Guilley","sequence":"additional","affiliation":[]},{"given":"Emmanuel","family":"Prouff","sequence":"additional","affiliation":[]},{"given":"Jean-Luc","family":"Danger","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2009.15"},{"key":"22","first-page":"429","article-title":"Mutual information analysis: How when and why?","author":"veyrat-charvillon","year":"2009","journal-title":"CHES Volume 5747 of LNCS"},{"key":"17","article-title":"First-order side-channel attacks on the permutation tables countermeasure-extended version","author":"prouff","year":"2010","journal-title":"Cryptology EPrint Archive Report 2010\/385"},{"key":"23","first-page":"1","article-title":"Towards efficient second-order power analysis","author":"waddle","year":"2004","journal-title":"CHES volume 3156 of LNCS"},{"key":"18","first-page":"227","article-title":"A generic method for secure SBox implementation","volume":"4867 lncs","author":"prouff","year":"2007","journal-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"15","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1007\/11545262_23","article-title":"Improved higher-order side-channel attacks with FPGA experiments","volume":"3659","author":"peeters","year":"2005","journal-title":"Lecture Notes in Computer Science"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2005.12.013"},{"key":"13","first-page":"192","article-title":"Practical second-order DPA attacks for masked smart card implementations of block ciphers","volume":"3960 lncs","author":"oswald","year":"2006","journal-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"14","first-page":"292","article-title":"An efficient masking scheme for AES software implementations","volume":"3786 lncs","author":"oswald","year":"2005","journal-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"11","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1007\/3-540-44499-8_19","article-title":"Using Second-Order Power Analysis to Attack DPA Resistant Software","author":"messerges","year":"2000","journal-title":"Lecture Notes in Computer Science"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00730-9_14"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2009.5090745"},{"key":"3","first-page":"3540","article-title":"Towards sound approaches to counteract power-analysis attacks","author":"chari","year":"1999","journal-title":"CRYPTO Volume 1666 of LNCS"},{"key":"20","first-page":"413","article-title":"Provably secure higher-order masking of AES","author":"rivain","year":"2010","journal-title":"CHES Volume 6225 of LNCS"},{"key":"2","first-page":"16","article-title":"Correlation power analysis with a leakage model","author":"brier","year":"2004","journal-title":"CHES volume 3156 of LNCS"},{"key":"1","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1007\/3-540-44709-1_26","article-title":"An Implementation of DES and AES, Secure against Some Attacks","author":"akkar","year":"2001","journal-title":"Lecture Notes in Computer Science"},{"journal-title":"Power Analysis Attacks Revealing the Secrets of Smart Cards","year":"2006","author":"mangard","key":"10"},{"key":"7","first-page":"388","article-title":"Differential power analysis","author":"kocher","year":"1999","journal-title":"CRYPTO Volume 1666 of LNCS"},{"key":"6","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","article-title":"Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems","author":"kocher","year":"1996","journal-title":"Lecture Notes in Computer Science"},{"journal-title":"SASEBO Side-channel Attack Standard Evaluation Board","year":"0","key":"5"},{"key":"4","first-page":"158","article-title":"DES and differential power analysis. The duplication","author":"goubin","year":"1999","journal-title":"Method in CHES LNCS"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27954-6_10"},{"key":"8","first-page":"1","article-title":"Evaluation of countermeasures implementation based on boolean masking to thwart first and second order side-channel attacks","author":"maghrebi","year":"2009","journal-title":"SCS IEEE"}],"event":{"name":"2012 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","start":{"date-parts":[[2012,6,3]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2012,6,4]]}},"container-title":["2012 IEEE International Symposium on Hardware-Oriented Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6218991\/6224308\/06224316.pdf?arnumber=6224316","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T17:07:25Z","timestamp":1497978445000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6224316\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/hst.2012.6224316","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}