{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T14:45:44Z","timestamp":1776955544408,"version":"3.51.4"},"reference-count":27,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472292"],"award-info":[{"award-number":["61472292"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Technological Innovation of Hubei Province through Major Special Project","award":["2018AAA046"],"award-info":[{"award-number":["2018AAA046"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst."],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1109\/tcad.2018.2883900","type":"journal-article","created":{"date-parts":[[2018,11,29]],"date-time":"2018-11-29T19:57:56Z","timestamp":1543521476000},"page":"34-44","source":"Crossref","is-referenced-by-count":2,"title":["Table Recomputation-Based Higher-Order Masking Against Horizontal Attacks"],"prefix":"10.1109","volume":"39","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3408-7680","authenticated-orcid":false,"given":"Zhipeng","family":"Guo","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2218-0164","authenticated-orcid":false,"given":"Ming","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Emmanuel","family":"Prouff","sequence":"additional","affiliation":[]},{"given":"Maixing","family":"Luo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0492-3278","authenticated-orcid":false,"given":"Fei","family":"Yan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"63","article-title":"Higher-order glitches free implementation of the AES using secure multi-party computation protocols","author":"prouff","year":"2011","journal-title":"Proc Workshop Cryptographic Hardware Embedded Syst"},{"key":"ref11","first-page":"95","article-title":"A fast and provably secure higher-order masking of AES S-box","author":"kim","year":"2011","journal-title":"Proc Workshop Cryptographic Hardware Embedded Syst"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34047-5_21"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_24"},{"key":"ref14","first-page":"410","article-title":"Higher-order side channel security and mask refreshing","author":"coron","year":"2013","journal-title":"Proc Int Workshop Fast Softw Encrypt"},{"key":"ref15","first-page":"326","article-title":"Higher-order threshold implementations","author":"bilgin","year":"2014","journal-title":"Proc Int Conf Theory Appl Cryptol Inf Security"},{"key":"ref16","first-page":"441","article-title":"Higher order masking of look-up tables","author":"coron","year":"2014","journal-title":"Proc Annu Int Conf Theory Appl Cryptograph Techn"},{"key":"ref17","first-page":"251","article-title":"Efficient masked S-boxes processing&#x2014;A step forward","author":"grosso","year":"2014","journal-title":"Int Conf Cryptol Africa"},{"key":"ref18","first-page":"259","article-title":"Higher-order threshold implementation of the AES S-box","author":"de cnudde","year":"2015","journal-title":"Proc Int Conf Smart Card Res Adv Appl"},{"key":"ref19","first-page":"398","article-title":"Towards sound approaches to counteract power-analysis attacks","author":"chari","year":"1999","journal-title":"Proc Annu Int Cryptol Conf"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"ref27","author":"coron","year":"2013","journal-title":"Implementation of Higher-Order Countermeasures"},{"key":"ref3","first-page":"388","article-title":"Differential power analysis","author":"kocher","year":"1999","journal-title":"Proc Adv Cryptol (CRYPTO)"},{"key":"ref6","first-page":"13","article-title":"Template attacks","author":"chari","year":"2002","journal-title":"Proc Workshop Cryptographic Hardware Embedded Syst"},{"key":"ref5","first-page":"426","article-title":"Mutual information analysis","author":"gierlichs","year":"2008","journal-title":"Proc Workshop Cryptographic Hardware Embedded Syst"},{"key":"ref8","first-page":"463","article-title":"Private circuits: Securing hardware against probing attacks","author":"ishai","year":"2003","journal-title":"Proc Annu Int Cryptol Conf"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/11545262_3"},{"key":"ref2","first-page":"104","article-title":"Timing attacks on implementations of Diffie&#x2013;Hellman, RSA, DSS, and other systems","author":"kocher","year":"1996","journal-title":"Proc Adv Cryptol (CRYPTO)"},{"key":"ref9","first-page":"413","article-title":"Provably secure higher-order masking of AES","author":"rivain","year":"2010","journal-title":"Proc Workshop Cryptographic Hardware Embedded Syst"},{"key":"ref1","first-page":"513","article-title":"Differential fault analysis of secret key cryptosystems","author":"biham","year":"1997","journal-title":"Proc Adv Cryptol (CRYPTO)"},{"key":"ref20","first-page":"423","article-title":"Unifying leakage models: From probing attacks to noisy leakage","author":"duc","year":"2014","journal-title":"Proc Annu Int Conf Theory Appl Cryptograph Techn"},{"key":"ref22","first-page":"343","article-title":"Tight private circuits: Achieving probing security with the least refreshing","author":"bela\u00efd","year":"2018","journal-title":"Proc Int Conf Theory Appl Cryptol Inf Security"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978427"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"40","DOI":"10.46586\/tches.v2018.i1.40-72","article-title":"High order masking of look-up tables with common shares","volume":"2018","author":"coron","year":"2018","journal-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems"},{"key":"ref23","first-page":"23","article-title":"Horizontal side-channel attacks and countermeasures on the ISW masking scheme","author":"battistello","year":"2016","journal-title":"Proc Int Conf Cryptograph Hardw Embedded Syst"},{"key":"ref26","author":"guo","year":"2018","journal-title":"The C Implementation of TCM Scheme"},{"key":"ref25","first-page":"567","article-title":"How fast can higher-order masking be in software?","author":"goudarzi","year":"2017","journal-title":"Proc Annu Int Conf Theory Appl Cryptograph Techn"}],"container-title":["IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/43\/8939296\/08552367.pdf?arnumber=8552367","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T14:04:55Z","timestamp":1651068295000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8552367\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1]]},"references-count":27,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tcad.2018.2883900","relation":{},"ISSN":["0278-0070","1937-4151"],"issn-type":[{"value":"0278-0070","type":"print"},{"value":"1937-4151","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1]]}}}