{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T21:49:01Z","timestamp":1771710541606,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,6,14]],"date-time":"2015-06-14T00:00:00Z","timestamp":1434240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,6,14]]},"DOI":"10.1145\/2768566.2768573","type":"proceedings-article","created":{"date-parts":[[2015,6,2]],"date-time":"2015-06-02T05:35:02Z","timestamp":1433223302000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Exploiting small leakages in masks to turn a second-order attack into a first-order attack"],"prefix":"10.1145","author":[{"given":"Alexander","family":"DeTrano","sequence":"first","affiliation":[{"name":"New York University"}]},{"given":"Sylvain","family":"Guilley","sequence":"additional","affiliation":[{"name":"ENST &amp; Secure-IC S. A. S."}]},{"given":"Xiaofei","family":"Guo","sequence":"additional","affiliation":[{"name":"Intel Corporation"}]},{"given":"Naghmeh","family":"Karimi","sequence":"additional","affiliation":[{"name":"Rutgers University"}]},{"given":"Ramesh","family":"Karri","sequence":"additional","affiliation":[{"name":"New York University"}]}],"member":"320","published-online":{"date-parts":[[2015,6,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2611765.2611772"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85053-3_3"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1948352.1948359"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"J.-S.\n      Coron\n    .\n  Higher order masking of look-up tables\n  . In P. Nguyen and E. Oswald editors EUROCRYPT\n  2014 volume \n  8441\n   of \n  LNCS pages \n  441\n  --\n  458\n  .  J.-S. Coron. Higher order masking of look-up tables. In P. Nguyen and E. Oswald editors EUROCRYPT 2014 volume 8441 of LNCS pages 441--458.","DOI":"10.1007\/978-3-642-55220-5_25"},{"key":"e_1_3_2_1_6_1","volume-title":"http:\/\/www.dpacontest.org. {Online","author":"Contest DPA","year":"2014","unstructured":"DPA Contest . http:\/\/www.dpacontest.org. {Online ; accessed 30- May - 2014 }. DPA Contest. http:\/\/www.dpacontest.org. {Online; accessed 30-May-2014}."},{"key":"e_1_3_2_1_7_1","volume-title":"Revisited. In CARDIS 2013","author":"Grosso V.","year":"2013","unstructured":"V. Grosso , F.-X. Standaert , and E. Prouff . Low Entropy Masking Schemes , Revisited. In CARDIS 2013 , LNCS. Springer, nov 2013 . Berlin, Germany. V. Grosso, F.-X. Standaert, and E. Prouff. Low Entropy Masking Schemes, Revisited. In CARDIS 2013, LNCS. Springer, nov 2013. Berlin, Germany."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11767480_16"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-011-0006-y"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/646764.703989"},{"key":"e_1_3_2_1_11_1","volume-title":"Power Analysis Attacks: Revealing the Secrets of Smart Cards","author":"Mangard S.","year":"2008","unstructured":"S. Mangard , E. Oswald , and T. Popp . Power Analysis Attacks: Revealing the Secrets of Smart Cards . Springer , 2008 . ISBN 0-387-30857-1. S. Mangard, E. Oswald, and T. Popp. Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer, 2008. ISBN 0-387-30857-1."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/2492708.2492999"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_13"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10838-9_14"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_17"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1784964.1784987"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2009.15"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881511.1881549"},{"key":"e_1_3_2_1_19_1","first-page":"425","volume-title":"FSE 2013","author":"Tunstall M.","year":"2013","unstructured":"M. Tunstall , C. Whitnall , and E. Oswald . Masking tables - an underestimated security risk . In FSE 2013 , pages 425 -- 444 , 2013 . M. Tunstall, C. Whitnall, and E. Oswald. Masking tables - an underestimated security risk. In FSE 2013, pages 425--444, 2013."},{"key":"e_1_3_2_1_20_1","unstructured":"X.\n      Ye\n     and \n      T.\n      Eisenbarth\n  . \n  On the Vulnerability of Low Entropy Masking Schemes\n  . In A. Francillon and P. Rohatgi editors CARDIS \n  2013 Berlin Germany November 27--29 2013 volume \n  8419\n   of \n  LNCS pages \n  44\n  --\n  60\n  . \n  Springer 2013.  X. Ye and T. Eisenbarth. On the Vulnerability of Low Entropy Masking Schemes. In A. Francillon and P. Rohatgi editors CARDIS 2013 Berlin Germany November 27--29 2013 volume 8419 of LNCS pages 44--60. Springer 2013."}],"event":{"name":"ISCA '15: The 42nd Annual International Symposium on Computer Architecture","location":"Portland Oregon","acronym":"ISCA '15","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2768566.2768573","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2768566.2768573","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:28Z","timestamp":1750227148000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2768566.2768573"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,14]]},"references-count":20,"alternative-id":["10.1145\/2768566.2768573","10.1145\/2768566"],"URL":"https:\/\/doi.org\/10.1145\/2768566.2768573","relation":{},"subject":[],"published":{"date-parts":[[2015,6,14]]},"assertion":[{"value":"2015-06-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}