{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:20:38Z","timestamp":1750220438905,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T00:00:00Z","timestamp":1608508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,21]]},"DOI":"10.1145\/3324884.3418920","type":"proceedings-article","created":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T23:39:02Z","timestamp":1611790742000},"page":"1385-1387","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Formal verification of masking countermeasures for arithmetic programs"],"prefix":"10.1145","author":[{"given":"Pengfei","family":"Gao","sequence":"first","affiliation":[{"name":"ShanghaiTech University"}]}],"member":"320","published-online":{"date-parts":[[2021,1,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_18"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978427"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29959-0_15"},{"key":"e_1_3_2_1_4_1","first-page":"404","article-title":"The SIMON and SPECK Families of Lightweight Block Ciphers","volume":"2013","author":"Beaulieu Ray","year":"2013","unstructured":"Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, and Louis Wingers. 2013. The SIMON and SPECK Families of Lightweight Block Ciphers. IACR Cryptology ePrint Archive 2013 (2013), 404.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i2.22-45"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2635650"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the International Conference on Security and Management (SAM). 260--266","author":"Choi Hee Bong","year":"2003","unstructured":"Hee Bong Choi, Hyoon Jae Lee, Choon Su Kim, Byung Hwa Chang, and Dongho Won. 2003. On Differential Power Analysis Attack on the Addition Modular 2N Operation of Smart Cards. In Proceedings of the International Conference on Security and Management (SAM). 260--266."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/648253.752543"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48519-8_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/648252.752381"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_5"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93387-0_4"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/648253.752404"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_11"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2685616"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54862-8_5"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2593193"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2424951"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3330392"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/648254.752571"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/648252.752372"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-018-0191-z"},{"volume-title":"Proceedings of the International Cryptology Conference on Advances in Cryptology (CRYPTO). 463--481","author":"Ishai Yuval","key":"e_1_3_2_1_23_1","unstructured":"Yuval Ishai, Amit Sahai, and David A. Wagner. 2003. Private Circuits: Securing Hardware against Probing Attacks. In Proceedings of the International Cryptology Conference on Advances in Cryptology (CRYPTO). 463--481."},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES), Revised Papers. 129--143","author":"Itoh Kouichi","year":"2002","unstructured":"Kouichi Itoh, Tetsuya Izu, and Masahiko Takenaka. 2002. Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA. In Proceedings of the4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES), Revised Papers. 129--143."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-89641-0_10"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_9"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46877-3_35"},{"volume-title":"Proceedings of the International Conference on Computer-Aided Design (ICCAD). 115","author":"Luo Chao","key":"e_1_3_2_1_29_1","unstructured":"Chao Luo, Yunsi Fei, and David R. Kaeli. 2018. Effective simple-power analysis attacks of elliptic curve cryptography on embedded systems. In Proceedings of the International Conference on Computer-Aided Design (ICCAD). 115."},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the International Workshop on Fast Software Encryption. 150--164","author":"Messerges Thomas S.","year":"2000","unstructured":"Thomas S. Messerges. 2000. Securing the AES Finalists Against Power Analysis Attacks. In Proceedings of the International Workshop on Fast Software Encryption. 150--164."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20465-4_6"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_4"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2012.6176671"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"G. Pengfei X. Hongyi P. Sun J. Zhang F. Song and T. Chen. 2020. Formal Verification of Masking Countermeasures for Arithmetic Programs. IEEE Transactions on Software Engineering (2020) 1--1.","DOI":"10.1109\/TSE.2020.3008852"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_9"},{"key":"e_1_3_2_1_36_1","volume-title":"Consolidating Masking Schemes. In Annual Cryptology Conference on Advances in Cryptology (CRYPTO). 764--783","author":"Reparaz Oscar","year":"2015","unstructured":"Oscar Reparaz, Beg\u00fcl Bilgin, Svetla Nikova, Benedikt Gierlichs, and Ingrid Verbauwhede. 2015. Consolidating Masking Schemes. In Annual Cryptology Conference on Advances in Cryptology (CRYPTO). 764--783."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15031-9_28"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_14"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338913"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54669-8_11"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2912549"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/3196160.3196244"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00205"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96142-2_12"}],"event":{"name":"ASE '20: 35th IEEE\/ACM International Conference on Automated Software Engineering","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Virtual Event Australia","acronym":"ASE '20"},"container-title":["Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3418920","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3418920","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:23Z","timestamp":1750193243000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3418920"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,21]]},"references-count":44,"alternative-id":["10.1145\/3324884.3418920","10.1145\/3324884"],"URL":"https:\/\/doi.org\/10.1145\/3324884.3418920","relation":{},"subject":[],"published":{"date-parts":[[2020,12,21]]},"assertion":[{"value":"2021-01-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}