{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:15:01Z","timestamp":1763507701507,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,24]],"date-time":"2017-10-24T00:00:00Z","timestamp":1508803200000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["644052 HECTOR"],"award-info":[{"award-number":["644052 HECTOR"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004497","name":"Onderzoeksraad, KU Leuven","doi-asserted-by":"publisher","award":["OT\/13\/071 and GOA\/11\/007"],"award-info":[{"award-number":["OT\/13\/071 and GOA\/11\/007"]}],"id":[{"id":"10.13039\/501100004497","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003132","name":"Agentschap voor Innovatie door Wetenschap en Technologie","doi-asserted-by":"publisher","award":["141606"],"award-info":[{"award-number":["141606"]}],"id":[{"id":"10.13039\/501100003132","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000161","name":"National Institute of Standards and Technology","doi-asserted-by":"publisher","award":["60NANB15D346"],"award-info":[{"award-number":["60NANB15D346"]}],"id":[{"id":"10.13039\/100000161","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2996366.2996428","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T08:46:35Z","timestamp":1477385195000},"page":"43-43","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["Masking AES With d+1 Shares in Hardware"],"prefix":"10.1145","author":[{"given":"Thomas","family":"De Cnudde","sequence":"first","affiliation":[{"name":"KU Leuven, ESAT-COSIC and iMinds, Belgium, Leuven, Belgium"}]},{"given":"Oscar","family":"Reparaz","sequence":"additional","affiliation":[{"name":"KU Leuven, ESAT-COSIC and iMinds, Belgium, Leuven, Belgium"}]},{"given":"Beg\u00fcl","family":"Bilgin","sequence":"additional","affiliation":[{"name":"KU Leuven, ESAT-COSIC and iMinds, Belgium, Leuven, Belgium"}]},{"given":"Svetla","family":"Nikova","sequence":"additional","affiliation":[{"name":"KU Leuven, ESAT-COSIC and iMinds, Belgium, Leuven, Belgium"}]},{"given":"Ventzislav","family":"Nikov","sequence":"additional","affiliation":[{"name":"NXP Semiconductors, Belgium, Leuven, Belgium"}]},{"given":"Vincent","family":"Rijmen","sequence":"additional","affiliation":[{"name":"KU Leuven, ESAT-COSIC and iMinds, Belgium, Leuven, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"NanGate Open Cell Library. http:\/\/www.nangate.com\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Research Center for Information Security National Institute of Advanced Industrial Science and Technology Side-channel Attack Standard Evaluation Board SASEBO-G Specification. http:\/\/satoh.cs.uec.ac.jp\/SASEBO\/en\/board\/sasebo-g.html."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/648255.752713"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978427"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_22"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08302-5_13"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06734-6_17"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45608-8_18"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2419623"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34961-4_14"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/11545262_32"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/646764.703964"},{"key":"e_1_3_2_1_13_1","volume-title":"Test Vector Leakage Assessment (TVLA) Methodology in Practice. International Cryptographic Module Conference, 2013","author":"Cooper J.","year":"2013","unstructured":"J. Cooper, E. DeMulder, G. Goodwill, J. Jaffe, G. Kenworthy, and P. Rohatgi. Test Vector Leakage Assessment (TVLA) Methodology in Practice. International Cryptographic Module Conference, 2013. http:\/\/icmc-2013.org\/wp\/wp-content\/uploads\/2013\/09\/goodwillkenworthtestvector.pdf."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/647504.728494"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015047.1015050"},{"key":"e_1_3_2_1_16_1","series-title":"Lecture Notes in Computer Science","first-page":"410","volume-title":"Fast Software Encryption - 20th International Workshop, FSE","author":"Coron J.","year":"2013","unstructured":"J. Coron, E. Prouff, M. Rivain, and T. Roche. Higher-order side channel security and mask refreshing. In S. Moriai, editor, Fast Software Encryption - 20th International Workshop, FSE 2013, Singapore, March 11--13, 2013. Revised Selected Papers, volume 8424 of Lecture Notes in Computer Science, pages 410--424. Springer, 2013."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-31271-2_16"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_24"},{"key":"e_1_3_2_1_19_1","volume-title":"A Testing Methodology for Side-Channel Resistance Validation. NIST non-invasive attack testing workshop","author":"Goodwill G.","year":"2011","unstructured":"G. Goodwill, B. Jun, J. Jaffe, and P. Rohatgi. A Testing Methodology for Side-Channel Resistance Validation. NIST non-invasive attack testing workshop, 2011. http:\/\/csrc.nist.gov\/news_events\/non-invasive-attack-testing-workshop\/papers\/08_Goodwill.pdf."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_27"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/646761.706156"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/646764.703989"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/11545262_12"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/2008684.2008693"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9085-7"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9086-6"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_9"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/2044928.2044935"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-52993-5_11"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47989-6_37"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_25"},{"issue":"1","key":"e_1_3_2_1_32_1","first-page":"59","article-title":"The Synthesis of Two-Terminal Switching Circuits. Bell System Technical Journal","volume":"28","author":"Shannon C.","year":"1949","unstructured":"C. Shannon. The Synthesis of Two-Terminal Switching Circuits. Bell System Technical Journal, The, 28(1):59--98, Jan 1949.","journal-title":"The"},{"key":"e_1_3_2_1_33_1","volume-title":"IACR Cryptology ePrint Archive","author":"Trichina E.","year":"2003","unstructured":"E. Trichina. Combinational logic design for AES subbyte transformation on masked data. IACR Cryptology ePrint Archive, 2003:236, 2003."}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Vienna Austria","acronym":"CCS'16"},"container-title":["Proceedings of the 2016 ACM Workshop on Theory of Implementation Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2996366.2996428","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2996366.2996428","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2996366.2996428","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:25:54Z","timestamp":1763457954000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2996366.2996428"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":33,"alternative-id":["10.1145\/2996366.2996428","10.1145\/2996366"],"URL":"https:\/\/doi.org\/10.1145\/2996366.2996428","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}