{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:00:37Z","timestamp":1740132037998,"version":"3.37.3"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472292","61332019"],"award-info":[{"award-number":["61472292","61332019"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China (973 Program)","doi-asserted-by":"crossref","award":["2014CB340600"],"award-info":[{"award-number":["2014CB340600"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Key Technology Research of New-Generation High-Speed and High-Level Security Chip for Smart Grid","award":["526816160015"],"award-info":[{"award-number":["526816160015"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst."],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/tcad.2018.2789727","type":"journal-article","created":{"date-parts":[[2018,1,4]],"date-time":"2018-01-04T22:55:09Z","timestamp":1515106509000},"page":"3008-3019","source":"Crossref","is-referenced-by-count":2,"title":["Leak Point Locating in Hardware Implementations of Higher-Order Masking Schemes"],"prefix":"10.1109","volume":"37","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2218-0164","authenticated-orcid":false,"given":"Tang","family":"Ming","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7151-9270","authenticated-orcid":false,"given":"Li","family":"Yanbin","sequence":"additional","affiliation":[]},{"given":"Zhao","family":"Dongyan","sequence":"additional","affiliation":[]},{"given":"Li","family":"Yuguang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0492-3278","authenticated-orcid":false,"given":"Yan","family":"Fei","sequence":"additional","affiliation":[]},{"given":"Zhang","family":"Huanguo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89985-3_81"},{"key":"ref33","first-page":"388","article-title":"Differential power analysis","author":"kocher","year":"1999","journal-title":"Adv Cryptology"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-014-0073-y"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1023\/A:1026218512171"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1007\/978-3-319-49445-6_21","article-title":"A methodology for the characterisation of leakages in combinatorial logic","author":"bertoni","year":"2016","journal-title":"Proc Int Conf Security Privacy Appl Cryptograph Eng"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2009.2035564"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SOCC.2006.283851"},{"journal-title":"DOM protected hardware implementation of AES","year":"2016","author":"gross","key":"ref35"},{"key":"ref34","volume":"31","author":"mangard","year":"2008","journal-title":"Power Analysis Attacks Revealing the Secrets of Smart Cards"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2015.7357117"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/11545262_12"},{"journal-title":"PrimePower Manual","year":"2004","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2003.812295"},{"key":"ref14","first-page":"63","article-title":"Higher-order glitches free implementation of the AES using secure multi-party computation protocols","author":"prouff","year":"2011","journal-title":"Proc Workshop Cryptographic Hardware Embedded Syst"},{"key":"ref15","first-page":"1","article-title":"On the simplicity of converting leakages from multivariate to univariate","author":"moradi","year":"2013","journal-title":"Cryptographic Hardware and Embedded Systems - CHES 2013"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1007\/11935308_38","article-title":"Threshold implementations against side-channel attacks and glitches","author":"nikova","year":"2006","journal-title":"Information and Communications Security"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9085-7"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2012.6224326"},{"key":"ref19","first-page":"453","article-title":"Assessment of hiding the higher-order leakages in hardware","author":"moradi","year":"2015","journal-title":"Proc Workshop Cryptographic Hardware Embedded Syst"},{"key":"ref28","first-page":"158","article-title":"A testing methodology for side-channel resistance validation","author":"goodwill","year":"2011","journal-title":"NIST Non-invasive Attack Testing Workshop"},{"key":"ref4","first-page":"410","article-title":"Higher-order side channel security and mask refreshing","author":"coron","year":"2013","journal-title":"Fast Software Encryption"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1109\/HST.2009.5224961","article-title":"Early feedback on side-channel risks with accelerated toggle-counting","author":"chen","year":"2009","journal-title":"Proc IEEE Int Workshop Hardw -Oriented Security Trust (HOST)"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1007\/978-3-642-34047-5_21","article-title":"Higher-order masking schemes for S-boxes","author":"carlet","year":"2012","journal-title":"Fast Software Encryption"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1007\/978-3-642-55220-5_25","article-title":"Higher order masking of look-up tables","author":"coron","year":"2014","journal-title":"Advances in Cryptology&#x2014;Eurocrypt 2014"},{"key":"ref29","first-page":"13","article-title":"Test vector leakage assessment (TVLA) methodology in practice","volume":"1001","author":"becker","year":"2013","journal-title":"Proc Int Cryptographic Module Conf"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1007\/978-3-642-15031-9_28","article-title":"Provably secure higher-order masking of AES","author":"rivain","year":"2010","journal-title":"Cryptographic Hardware and Embedded Systems CHES 2010"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30574-3_24"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"463","DOI":"10.1007\/978-3-540-45146-4_27","article-title":"Private circuits: Securing hardware against probing attacks","author":"ishai","year":"2003","journal-title":"Advances in Cryptology&#x2014;CRYPTO 2003"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/978-3-642-23951-9_7","article-title":"A fast and provably secure higher-order masking of AES S-box","author":"kim","year":"2011","journal-title":"Cryptographic Hardware and Embedded Systems - CHES 2011"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77026-8_29"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71039-4_8"},{"key":"ref20","first-page":"259","article-title":"Higher-order threshold implementation of the AES S-box","author":"de cnudde","year":"2015","journal-title":"Proc Int Conf Smart Card Res Adv Appl"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2996366.2996426"},{"key":"ref21","first-page":"326","article-title":"Higher-order threshold implementations","author":"bilgin","year":"2014","journal-title":"Proc Int Conf Theory Appl Cryptol Inf Security"},{"key":"ref24","first-page":"95","article-title":"An efficient side-channel protected AES implementation with arbitrary protection order","author":"gross","year":"2017","journal-title":"Proc The Cryptographer s Track at RSA Conf"},{"key":"ref23","first-page":"764","article-title":"Consolidating masking schemes","author":"reparaz","year":"2015","journal-title":"Proc Annu Cryptol Conf"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1093\/ietfec\/e90-a.1.169"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/11545262_27"}],"container-title":["IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/43\/8540963\/08246545.pdf?arnumber=8246545","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,30]],"date-time":"2023-08-30T11:29:12Z","timestamp":1693394952000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8246545\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":38,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tcad.2018.2789727","relation":{},"ISSN":["0278-0070","1937-4151"],"issn-type":[{"type":"print","value":"0278-0070"},{"type":"electronic","value":"1937-4151"}],"subject":[],"published":{"date-parts":[[2018,12]]}}}