{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:53:45Z","timestamp":1750308825355,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T00:00:00Z","timestamp":1515974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000028","name":"Semiconductor Research Corporation","doi-asserted-by":"publisher","award":["2017-TS-2772"],"award-info":[{"award-number":["2017-TS-2772"]}],"id":[{"id":"10.13039\/100000028","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1314540"],"award-info":[{"award-number":["1314540"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,1,15]]},"DOI":"10.1145\/3266444.3266450","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T13:23:10Z","timestamp":1539696190000},"page":"75-80","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Fixing the CLOC with Fine-grain Leakage Analysis"],"prefix":"10.1145","author":[{"given":"William","family":"Diehl","sequence":"first","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]},{"given":"Farnoud","family":"Farahmand","sequence":"additional","affiliation":[{"name":"George Mason University, Farifax, VA, USA"}]},{"given":"Abubakr","family":"Abdulgadir","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"given":"Jens-Peter","family":"Kaps","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"given":"Kris","family":"Gaj","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,1,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Daniel J. Bernstein. 2016. Cryptographic Competitions . (Jul 2016). https:\/\/groups.google.com\/forum\/#!forum\/crypto  Daniel J. Bernstein. 2016. Cryptographic Competitions . (Jul 2016). https:\/\/groups.google.com\/forum\/#!forum\/crypto"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Beg\u00fcl Bilgin Benedikt Gierlichs Svetla Nikova Ventzislav Nikov and Vincent Rijmen. 2014. A More Efficient AES Threshold Implementation . Progress in Cryptology -- AFRICACRYPT 2014 . 267--284.  Beg\u00fcl Bilgin Benedikt Gierlichs Svetla Nikova Ventzislav Nikov and Vincent Rijmen. 2014. A More Efficient AES Threshold Implementation . Progress in Cryptology -- AFRICACRYPT 2014 . 267--284.","DOI":"10.1007\/978-3-319-06734-6_17"},{"key":"e_1_3_2_1_3_1","unstructured":"CAESAR. 2012. Competition for Authenticated Encryption: Security Applicability and Robustness . (2012). http:\/\/competitions.cr.yp.to\/caesar.html.  CAESAR. 2012. Competition for Authenticated Encryption: Security Applicability and Robustness . (2012). http:\/\/competitions.cr.yp.to\/caesar.html."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"David Canright and Lejla Batina. 2008. A Very Compact 'Perfectly Masked' S-Box for AES . ACNS .   David Canright and Lejla Batina. 2008. A Very Compact 'Perfectly Masked' S-Box for AES . ACNS .","DOI":"10.1007\/978-3-540-68914-0_27"},{"key":"e_1_3_2_1_5_1","volume-title":"Flexible Open-source workBench fOr Side-channel analysis (FOBOS) . (Oct","author":"CERG.","year":"2016","unstructured":"CERG. 2016. Flexible Open-source workBench fOr Side-channel analysis (FOBOS) . (Oct 2016 ). https:\/\/cryptography.gmu.edu\/fobos\/ CERG. 2016. Flexible Open-source workBench fOr Side-channel analysis (FOBOS) . (Oct 2016). https:\/\/cryptography.gmu.edu\/fobos\/"},{"key":"e_1_3_2_1_6_1","volume-title":"Development Package for Hardware Implementations Compliant with the CAESAR Hardware API, v2.0 . (Dec","author":"CERG.","year":"2017","unstructured":"CERG. 2017. Development Package for Hardware Implementations Compliant with the CAESAR Hardware API, v2.0 . (Dec 2017 ). https:\/\/cryptography.gmu.edu\/athena\/index.php?id=CAESAR. CERG. 2017. Development Package for Hardware Implementations Compliant with the CAESAR Hardware API, v2.0 . (Dec 2017). https:\/\/cryptography.gmu.edu\/athena\/index.php?id=CAESAR."},{"key":"e_1_3_2_1_7_1","volume-title":"Comparison of Cost of Protection Against Differential Power Analysis of Selected Authenticated Ciphers. In 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). 147--152","author":"Diehl William","year":"2018","unstructured":"William Diehl , Abubakr Abdulgadir , Farnoud Farahmand , Jens-Peter Kaps , and Kris Gaj . 2018 . Comparison of Cost of Protection Against Differential Power Analysis of Selected Authenticated Ciphers. In 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). 147--152 . William Diehl, Abubakr Abdulgadir, Farnoud Farahmand, Jens-Peter Kaps, and Kris Gaj. 2018. Comparison of Cost of Protection Against Differential Power Analysis of Selected Authenticated Ciphers. In 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). 147--152."},{"key":"e_1_3_2_1_8_1","volume-title":"CERG Source Code. (Oct","author":"George Mason University","year":"2016","unstructured":"George Mason University . 2016. CERG Source Code. (Oct 2016 ). https:\/\/cryptography.gmu.edu\/athena\/index.php?id=sourcecodes George Mason University. 2016. CERG Source Code. (Oct 2016). https:\/\/cryptography.gmu.edu\/athena\/index.php?id=sourcecodes"},{"key":"e_1_3_2_1_9_1","volume-title":"NIST Non-invasive Attack Testing Workshop.","author":"Goodwill Gilbert","year":"2011","unstructured":"Gilbert Goodwill , Benjamin Jun , Josh Jaffe , and Pankaj Rohatgi . 2011 . A Testing Methodology for Side Channel Resistance Validation . NIST Non-invasive Attack Testing Workshop. (2011). Gilbert Goodwill, Benjamin Jun, Josh Jaffe, and Pankaj Rohatgi. 2011. A Testing Methodology for Side Channel Resistance Validation . NIST Non-invasive Attack Testing Workshop. (2011)."},{"key":"e_1_3_2_1_10_1","unstructured":"Hannes Gro\u00df and Stefan Mangard. 2017. Reconciling $d  Hannes Gro\u00df and Stefan Mangard. 2017. Reconciling $d"},{"key":"e_1_3_2_1_11_1","volume-title":"IACR Cryptology ePrint Archive","author":"Hardware Masking","year":"2017","unstructured":"1$ Masking in Hardware and Software . IACR Cryptology ePrint Archive , Vol. 2017 ( 2017 ), 103. 1$ Masking in Hardware and Software . IACR Cryptology ePrint Archive , Vol. 2017 (2017), 103."},{"key":"e_1_3_2_1_13_1","volume-title":"Implementer's Guide to Hardware Implementations Compliant with the CAESAR Hardware API, v2.0 . (Dec","author":"Homsirikamol Ekawat","year":"2017","unstructured":"Ekawat Homsirikamol , Panasayya Yalla , Farnoud Farahmand , William Diehl , Ahmed Ferozpuri , Jens-Peter Kaps , and Kris Gaj . 2017. Implementer's Guide to Hardware Implementations Compliant with the CAESAR Hardware API, v2.0 . (Dec 2017 ). https:\/\/cryptography.gmu.edu\/athena\/CAESAR_HW_API\/CAESAR_HW_Implementers_Guide_v2.0.pdf Ekawat Homsirikamol, Panasayya Yalla, Farnoud Farahmand, William Diehl, Ahmed Ferozpuri, Jens-Peter Kaps, and Kris Gaj. 2017. Implementer's Guide to Hardware Implementations Compliant with the CAESAR Hardware API, v2.0 . (Dec 2017). https:\/\/cryptography.gmu.edu\/athena\/CAESAR_HW_API\/CAESAR_HW_Implementers_Guide_v2.0.pdf"},{"key":"e_1_3_2_1_14_1","unstructured":"Tetsu Iwata Kazuhiko Minematsu Jian Guo Sumio Morioka and Eita Kobayashi. 2016. CLOC and SILC . (Sep 2016). https:\/\/competitions.cr.yp.to\/round3\/clocsilcv3.pdf  Tetsu Iwata Kazuhiko Minematsu Jian Guo Sumio Morioka and Eita Kobayashi. 2016. CLOC and SILC . (Sep 2016). https:\/\/competitions.cr.yp.to\/round3\/clocsilcv3.pdf"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Paul Kocher Joshua Jaffe and Benjamin Jun. 1999. Differential Power Analysis. In Advances in Cryptology -- CRYPTO' 99 . 388--397.   Paul Kocher Joshua Jaffe and Benjamin Jun. 1999. Differential Power Analysis. In Advances in Cryptology -- CRYPTO' 99 . 388--397.","DOI":"10.1007\/3-540-48405-1_25"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-011-0006-y"},{"key":"e_1_3_2_1_17_1","volume-title":"Advances in Cryptology -- EUROCRYPT","author":"Moradi Amir","year":"2011","unstructured":"Amir Moradi , Axel Poschmann , San Ling , Christof Paar , and Huaxiong Wang . 2011. Pushing the Limits: A Very Compact and a Threshold Implementation of AES . In Advances in Cryptology -- EUROCRYPT 2011 . 69--88. Amir Moradi, Axel Poschmann, San Ling, Christof Paar, and Huaxiong Wang. 2011. Pushing the Limits: A Very Compact and a Threshold Implementation of AES. In Advances in Cryptology -- EUROCRYPT 2011. 69--88."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/11935308_38"},{"key":"e_1_3_2_1_19_1","volume-title":"Advanced Encryption Standard (AES) .","author":"NIST.","year":"2001","unstructured":"NIST. 2001. Federal Information Processing Standards Publication 197 , Advanced Encryption Standard (AES) . ( 2001 ). NIST. 2001. Federal Information Processing Standards Publication 197, Advanced Encryption Standard (AES) . (2001)."},{"key":"e_1_3_2_1_20_1","volume-title":"DRAFT Submission Requirements and Evaluation Criteria for the Lightweight Cryptography Standardization Process . (Apr","author":"NIST.","year":"2018","unstructured":"NIST. 2018. DRAFT Submission Requirements and Evaluation Criteria for the Lightweight Cryptography Standardization Process . (Apr 2018 ). NIST. 2018. DRAFT Submission Requirements and Evaluation Criteria for the Lightweight Cryptography Standardization Process . (Apr 2018)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3075564.3079067"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-016-0120-y"}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Toronto Canada","acronym":"CCS '18"},"container-title":["Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3266444.3266450","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3266444.3266450","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3266444.3266450","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:26:52Z","timestamp":1750278412000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3266444.3266450"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,15]]},"references-count":21,"alternative-id":["10.1145\/3266444.3266450","10.1145\/3266444"],"URL":"https:\/\/doi.org\/10.1145\/3266444.3266450","relation":{},"subject":[],"published":{"date-parts":[[2018,1,15]]},"assertion":[{"value":"2018-01-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}