{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T14:17:09Z","timestamp":1772893029870,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,24]],"date-time":"2017-10-24T00:00:00Z","timestamp":1508803200000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N000141512750"],"award-info":[{"award-number":["N000141512750"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978427","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T08:46:35Z","timestamp":1477385195000},"page":"116-129","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":139,"title":["Strong Non-Interference and Type-Directed Higher-Order Masking"],"prefix":"10.1145","author":[{"given":"Gilles","family":"Barthe","sequence":"first","affiliation":[{"name":"IMDEA Software Institute, Madrid, Spain"}]},{"given":"Sonia","family":"Bela\u00efd","sequence":"additional","affiliation":[{"name":"Thales Communications &amp; Security, Gennevilliers, France"}]},{"given":"Fran\u00e7ois","family":"Dupressoir","sequence":"additional","affiliation":[{"name":"IMDEA Software Institute, Madrid, Spain"}]},{"given":"Pierre-Alain","family":"Fouque","sequence":"additional","affiliation":[{"name":"Universit\u00e9 de Rennes 1, Rennes, France"}]},{"given":"Benjamin","family":"Gr\u00e9goire","sequence":"additional","affiliation":[{"name":"Inria Sophia-Antipolis -- M\u00e9diterran\u00e9e, Sophia-Antipolis, France"}]},{"given":"Pierre-Yves","family":"Strub","sequence":"additional","affiliation":[{"name":"IMDEA Software Institute, Madrid, Spain"}]},{"given":"R\u00e9becca","family":"Zucchini","sequence":"additional","affiliation":[{"name":"Inria Sophia-Antipolis -- M\u00e9diterran\u00e9e and \u00c9cole Normale Sup\u00e9rieure de Cachan, Cachan, France"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_21"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1007\/978-3-319-16763-3_5","volume-title":"Proceedings of the Smart Card Research and Advanced Application Conference (CARDIS)","volume":"8968","author":"Balasch Josep","year":"2014","unstructured":"Josep Balasch, Benedikt Gierlichs, Vincent Grosso, Oscar Reparaz, and Fran\u00e7ois-Xavier Standaert. On the cost of lazy engineering for masked software implementations. In Proceedings of the Smart Card Research and Advanced Application Conference (CARDIS), volume 8968 of LNCS, pages 64--81. Springer, Heidelberg, November 2014."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40229-1_7"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Gilles Barthe Sonia Bela\u00efd Fran\u00e7ois Dupressoir Pierre-Alain Fouque Benjamin Gr\u00e9goire and Pierre-Yves Strub. Verified proofs of higher-order masking. In Elisabeth Oswald and Marc Fischlin editors EUROCRYPT 2015 Part I volume 9056 of LNCS pages 457--485. Springer Heidelberg April 2015.","DOI":"10.1007\/978-3-662-46800-5_18"},{"key":"e_1_3_2_1_5_1","unstructured":"Gilles Barthe Sonia Bela\u00efd Fran\u00e7ois Dupressoir Pierre-Alain Fouque Benjamin Gr\u00e9goire Pierre-Yves Strub and R\u00e9becca Zucchini. Strong non-interference and type-directed higher-order masking. Cryptology ePrint Archive Report 2015\/506 2015. http:\/\/eprint.iacr.org\/2015\/506."},{"key":"e_1_3_2_1_6_1","first-page":"146","volume-title":"Foundations of Security Analysis and Design VII - FOSAD 2012\/2013 Tutorial Lectures","author":"Barthe Gilles","year":"2013","unstructured":"Gilles Barthe, Fran\u00e7ois Dupressoir, Benjamin Gr\u00e9goire, C\u00e9sar Kunz, Benedikt Schmidt, and Pierre-Yves Strub. EasyCrypt: A tutorial. In Foundations of Security Analysis and Design VII - FOSAD 2012\/2013 Tutorial Lectures, pages 146--166, 2013."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53140-2_2"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","unstructured":"Ali Galip Bayrak Francesco Regazzoni David Novo and Paolo Ienne. Sleuth: Automated verification of software power analysis countermeasures. In Guido Bertoni and Jean-S\u00e9bastien Coron editors CHES 2013 volume 8086 of LNCS pages 293--310. Springer Heidelberg August 2013. 10.1007\/978-3-642-40349-1_17","DOI":"10.1007\/978-3-642-40349-1_17"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_22"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Beg\u00fcl Bilgin Benedikt Gierlichs Svetla Nikova Ventzislav Nikov and Vincent Rijmen. Higher-order threshold implementations. In Palash Sarkar and Tetsu Iwata editors ASIACRYPT 2014 Part II volume 8874 of LNCS pages 326--343. Springer Heidelberg December 2014.","DOI":"10.1007\/978-3-662-45608-8_18"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Claude Carlet Emmanuel Prouff Matthieu Rivain and Thomas Roche. Algebraic decomposition for probing security. In Rosario Gennaro and Matthew J. B. Robshaw editors CRYPTO 2015 Part I volume 9215 of LNCS pages 742--763. Springer Heidelberg August 2015.","DOI":"10.1007\/978-3-662-47989-6_36"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","unstructured":"Suresh Chari Charanjit S. Jutla Josyula R. Rao and Pankaj Rohatgi. Towards sound approaches to counteract power-analysis attacks. In Michael J. Wiener editor CRYPTO'99 volume 1666 of LNCS pages 398--412. Springer Heidelberg August 1999.","DOI":"10.5555\/646764.703964"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Jean-S\u00e9bastien Coron. Higher order masking of look-up tables. In Phong Q. Nguyen and Elisabeth Oswald editors EUROCRYPT 2014 volume 8441 of LNCS pages 441--458. Springer Heidelberg May 2014.","DOI":"10.1007\/978-3-642-55220-5_25"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Jean-S\u00e9bastien Coron Johann Gro\u00dfsch\u00e4dl Mehdi Tibouchi and Praveen Kumar Vadnala. Conversion from arithmetic to boolean masking with logarithmic complexity. In Gregor Leander editor FSE 2015 volume 9054 of LNCS pages 130--149. Springer Heidelberg March 2015.","DOI":"10.1007\/978-3-662-48116-5_7"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","unstructured":"Jean-S\u00e9bastien Coron Johann Gro\u00dfsch\u00e4dl and Praveen Kumar Vadnala. Secure conversion between boolean and arithmetic masking of any order. In Lejla Batina and Matthew Robshaw editors CHES 2014 volume 8731 of LNCS pages 188--205. Springer Heidelberg September 2014. 10.1007\/978-3-662-44709-3_11","DOI":"10.1007\/978-3-662-44709-3_11"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Jean-S\u00e9bastien Coron Emmanuel Prouff Matthieu Rivain and Thomas Roche. Higher-order side channel security and mask refreshing. In Shiho Moriai editor FSE 2013 volume 8424 of LNCS pages 410--424. Springer Heidelberg March 2014.","DOI":"10.1007\/978-3-662-43933-3_21"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53140-2_24"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Alexandre Duc Stefan Dziembowski and Sebastian Faust. Unifying leakage models: From probing attacks to noisy leakage. In Phong Q. Nguyen and Elisabeth Oswald editors EUROCRYPT 2014 volume 8441 of LNCS pages 423--440. Springer Heidelberg May 2014.","DOI":"10.1007\/978-3-642-55220-5_24"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Alexandre Duc Sebastian Faust and Fran\u00e7ois-Xavier Standaert. Making masking security proofs concrete - or how to evaluate the security of any leaking device. In Elisabeth Oswald and Marc Fischlin editors EUROCRYPT 2015 Part I volume 9056 of LNCS pages 401--429. Springer Heidelberg April 2015.","DOI":"10.1007\/978-3-662-46800-5_16"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08867-9_8"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54862-8_5"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","unstructured":"Sebastian Faust Tal Rabin Leonid Reyzin Eran Tromer and Vinod Vaikuntanathan. Protecting circuits from leakage: the computationally-bounded and noisy cases. In Henri Gilbert editor EUROCRYPT 2010 volume 6110 of LNCS pages 135--156. Springer Heidelberg May 2010. 10.1007\/978-3-642-13190-5_7","DOI":"10.1007\/978-3-642-13190-5_7"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","unstructured":"Louis Goubin and Jacques Patarin. DES and differential power analysis (the \"duplication\" method). In \u00c7etin Kaya Ko\u00e7 and Christof Paar editors CHES'99 volume 1717 of LNCS pages 158--172. Springer Heidelberg August 1999.","DOI":"10.5555\/648252.752372"},{"key":"e_1_3_2_1_24_1","unstructured":"Dahmun Goudarzi and Matthieu Rivain. How fast can higher-order masking be in software? Cryptology ePrint Archive Report 2016\/264 2016. http:\/\/eprint.iacr.org\/."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Yuval Ishai Amit Sahai and David Wagner. Private circuits: Securing hardware against probing attacks. In Dan Boneh editor CRYPTO 2003 volume 2729 of LNCS pages 463--481. Springer Heidelberg August 2003.","DOI":"10.1007\/978-3-540-45146-4_27"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","unstructured":"Paul C. Kocher Joshua Jaffe and Benjamin Jun. Differential power analysis. In Michael J. Wiener editor CRYPTO'99 volume 1666 of LNCS pages 388--397. Springer Heidelberg August 1999.","DOI":"10.5555\/646764.703989"},{"key":"e_1_3_2_1_27_1","volume-title":"Binary adders","author":"Lynch Thomas Walker","year":"1996","unstructured":"Thomas Walker Lynch. Binary adders, 1996."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","unstructured":"Andrew Moss Elisabeth Oswald Dan Page and Michael Tunstall. Compiler assisted masking. In Emmanuel Prouff and Patrick Schaumont editors CHES 2012 volume 7428 of LNCS pages 58--75. Springer Heidelberg September 2012. 10.1007\/978-3-642-33027-8_4","DOI":"10.1007\/978-3-642-33027-8_4"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9085-7"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2015.13"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Emmanuel Prouff and Matthieu Rivain. Masking against side-channel attacks: A formal security proof. In Thomas Johansson and Phong Q. Nguyen editors EUROCRYPT 2013 volume 7881 of LNCS pages 142--159. Springer Heidelberg May 2013.","DOI":"10.1007\/978-3-642-38348-9_9"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","unstructured":"Matthieu Rivain and Emmanuel Prouff. Provably secure higher-order masking of AES. In Stefan Mangard and Fran\u00e7ois-Xavier Standaert editors CHES 2010 volume 6225 of LNCS pages 413--427. Springer Heidelberg August 2010.","DOI":"10.5555\/1881511.1881549"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10817-005-3075-8"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502036"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978427","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978427","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978427","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:25:52Z","timestamp":1763457952000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978427"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":34,"alternative-id":["10.1145\/2976749.2978427","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978427","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}