{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T20:35:44Z","timestamp":1770842144341,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,11]],"date-time":"2019-11-11T00:00:00Z","timestamp":1573430400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NIST Research Grant","award":["60NANB15D346"],"award-info":[{"award-number":["60NANB15D346"]}]},{"name":"Bulgarian National Science Fund","award":["12\/8"],"award-info":[{"award-number":["12\/8"]}]},{"name":"EU H2020","award":["FENTEC"],"award-info":[{"award-number":["FENTEC"]}]},{"name":"Research Council KU Leuven","award":["C16\/18\/004"],"award-info":[{"award-number":["C16\/18\/004"]}]},{"name":"Ph.D. Fellowship from the Research Foundation - Flanders (FWO)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,11]]},"DOI":"10.1145\/3338467.3358949","type":"proceedings-article","created":{"date-parts":[[2019,11,8]],"date-time":"2019-11-08T13:40:33Z","timestamp":1573220433000},"page":"30-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Threshold Implementations in the Robust Probing Model"],"prefix":"10.1145","author":[{"given":"Siemen","family":"Dhooghe","sequence":"first","affiliation":[{"name":"KU Leuven\/ imec-COSIC, Leuven, Belgium"}]},{"given":"Svetla","family":"Nikova","sequence":"additional","affiliation":[{"name":"KU Leuven\/ imec-COSIC, Leuven, Belgium"}]},{"given":"Vincent","family":"Rijmen","sequence":"additional","affiliation":[{"name":"KU Leuven\/ imec-COSIC, Leuven, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2019,11,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978427"},{"key":"e_1_3_2_1_2_1","volume-title":"Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security","author":"Bilgin Beg\u00fc","year":"2014","unstructured":"Beg\u00fc l Bilgin , Benedikt Gierlichs , Svetla Nikova , Ventzislav Nikov , and Vincent Rijmen . 2014. Higher-Order Threshold Implementations . In Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security , Kaoshiung, Taiwan, R.O.C. , December 7-11, 2014 , Proceedings, Part II (Lecture Notes in Computer Science), Palash Sarkar and Tetsu Iwata (Eds.), Vol. 8874 . Springer , 326--343. https:\/\/doi.org\/10.1007\/978-3-662-45608-8_18 10.1007\/978-3-662-45608-8_18 Beg\u00fc l Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, and Vincent Rijmen. 2014. Higher-Order Threshold Implementations. In Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II (Lecture Notes in Computer Science), Palash Sarkar and Tetsu Iwata (Eds.), Vol. 8874. Springer, 326--343. https:\/\/doi.org\/10.1007\/978-3-662-45608-8_18"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2419623"},{"key":"e_1_3_2_1_4_1","volume-title":"Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference","author":"Chari Suresh","year":"1999","unstructured":"Suresh Chari , Charanjit S. Jutla , Josyula R. Rao , and Pankaj Rohatgi . 1999. Towards Sound Approaches to Counteract Power-Analysis Attacks . In Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference , Santa Barbara , California, USA, August 15--19, 1999 , Proceedings (Lecture Notes in Computer Science), , Michael J. Wiener (Ed.), Vol. 1666 . Springer , 398--412. https:\/\/doi.org\/10.1007\/3-540-48405-1_26 10.1007\/3-540-48405-1_26 Suresh Chari, Charanjit S. Jutla, Josyula R. Rao, and Pankaj Rohatgi. 1999. Towards Sound Approaches to Counteract Power-Analysis Attacks. In Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15--19, 1999, Proceedings (Lecture Notes in Computer Science), , Michael J. Wiener (Ed.), Vol. 1666. Springer, 398--412. https:\/\/doi.org\/10.1007\/3-540-48405-1_26"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings (Lecture Notes in Computer Science), Benedikt Gierlichs and Axel Y. Poschmann (Eds.)","volume":"9813","author":"Cnudde Thomas De","year":"2016","unstructured":"Thomas De Cnudde , Oscar Reparaz , Beg\u00fc Bilgin , Svetla Nikova , Ventzislav Nikov , and Vincent Rijmen . 2016 . Masking AES with d+1 Shares in Hardware. In Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17--19, 2016 , Proceedings (Lecture Notes in Computer Science), Benedikt Gierlichs and Axel Y. Poschmann (Eds.) , Vol. 9813 . Springer, 194--212. https:\/\/doi.org\/10.1007\/978-3-662-53140-2_10 10.1007\/978-3-662-53140-2_10 Thomas De Cnudde, Oscar Reparaz, Beg\u00fc Bilgin, Svetla Nikova, Ventzislav Nikov, and Vincent Rijmen. 2016. Masking AES with d+1 Shares in Hardware. In Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17--19, 2016, Proceedings (Lecture Notes in Computer Science), Benedikt Gierlichs and Axel Y. Poschmann (Eds.), Vol. 9813. Springer, 194--212. https:\/\/doi.org\/10.1007\/978-3-662-53140-2_10"},{"key":"e_1_3_2_1_6_1","volume-title":"USA","volume":"9813","author":"Coron Jean-S\u00e9","year":"2016","unstructured":"Jean-S\u00e9 bastien Coron , Aur\u00e9 lien Greuet , Emmanuel Prouff , and Rina Zeitoun . 2016 . Faster Evaluation of SBoxes via Common Shares. In Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA , USA , August 17-19, 2016, Proceedings (Lecture Notes in Computer Science), Benedikt Gierlichs and Axel Y. Poschmann (Eds.) , Vol. 9813 . Springer, 498--514. https:\/\/doi.org\/10.1007\/978-3-662-53140-2_24 10.1007\/978-3-662-53140-2_24 Jean-S\u00e9 bastien Coron, Aur\u00e9 lien Greuet, Emmanuel Prouff, and Rina Zeitoun. 2016. Faster Evaluation of SBoxes via Common Shares. In Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings (Lecture Notes in Computer Science), Benedikt Gierlichs and Axel Y. Poschmann (Eds.), Vol. 9813. Springer, 498--514. https:\/\/doi.org\/10.1007\/978-3-662-53140-2_24"},{"key":"e_1_3_2_1_7_1","volume-title":"Taipei","author":"Daemen Joan","year":"2017","unstructured":"Joan Daemen . 2017 . Changing of the Guards: A Simple and Efficient Method for Achieving Uniformity in Threshold Sharing. In Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference , Taipei , Taiwan, September 25-28, 2017, Proceedings. 137--153. https:\/\/doi.org\/10.1007\/978-3-319-66787-4_7 10.1007\/978-3-319-66787-4_7 Joan Daemen. 2017. Changing of the Guards: A Simple and Efficient Method for Achieving Uniformity in Threshold Sharing. In Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings. 137--153. https:\/\/doi.org\/10.1007\/978-3-319-66787-4_7"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i3.119-147"},{"key":"e_1_3_2_1_9_1","volume-title":"Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"Duc Alexandre","year":"2014","unstructured":"Alexandre Duc , Stefan Dziembowski , and Sebastian Faust . 2014. Unifying Leakage Models: From Probing Attacks to Noisy Leakage . In Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques , Copenhagen, Denmark, May 11-15, 2014 . Proceedings . 423--440. https:\/\/doi.org\/10.1007\/978-3-642-55220-5_24 10.1007\/978-3-642-55220-5_24 Alexandre Duc, Stefan Dziembowski, and Sebastian Faust. 2014. Unifying Leakage Models: From Probing Attacks to Noisy Leakage. In Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings. 423--440. https:\/\/doi.org\/10.1007\/978-3-642-55220-5_24"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i3.89-120"},{"key":"e_1_3_2_1_11_1","volume-title":"Cryptographic Hardware and Embedded Systems, First International Workshop, CHES'99","author":"Goubin Louis","year":"1999","unstructured":"Louis Goubin and Jacques Patarin . 1999. DES and Differential Power Analysis (The \"Duplication\" Method) . In Cryptographic Hardware and Embedded Systems, First International Workshop, CHES'99 , Worcester, MA, USA , August 12--13, 1999 , Proceedings (Lecture Notes in Computer Science), cC etin Kaya Kocc and Christof Paar (Eds.), Vol. 1717 . Springer , 158--172. https:\/\/doi.org\/10.1007\/3-540-48059-5_15 10.1007\/3-540-48059-5_15 Louis Goubin and Jacques Patarin. 1999. DES and Differential Power Analysis (The \"Duplication\" Method). In Cryptographic Hardware and Embedded Systems, First International Workshop, CHES'99, Worcester, MA, USA, August 12--13, 1999, Proceedings (Lecture Notes in Computer Science), cC etin Kaya Kocc and Christof Paar (Eds.), Vol. 1717. Springer, 158--172. https:\/\/doi.org\/10.1007\/3-540-48059-5_15"},{"key":"e_1_3_2_1_12_1","volume-title":"Higher-Order Side-Channel Protected Implementations of KECCAK. In Euromicro Conference on Digital System Design, DSD 2017","author":"Gro\u00df Hannes","year":"2017","unstructured":"Hannes Gro\u00df , David Schaffenrath , and Stefan Mangard . 2017 . Higher-Order Side-Channel Protected Implementations of KECCAK. In Euromicro Conference on Digital System Design, DSD 2017 , Vienna, Austria, August 30 - Sept. 1, 2017. 205--212. https:\/\/doi.org\/10.1109\/DSD.2017.21 10.1109\/DSD.2017.21 Hannes Gro\u00df, David Schaffenrath, and Stefan Mangard. 2017. Higher-Order Side-Channel Protected Implementations of KECCAK. In Euromicro Conference on Digital System Design, DSD 2017, Vienna, Austria, August 30 - Sept. 1, 2017. 205--212. https:\/\/doi.org\/10.1109\/DSD.2017.21"},{"key":"e_1_3_2_1_13_1","first-page":"302","article-title":"A Survey of Leakage-Resilient Cryptography","volume":"2019","author":"Kalai Yael Tauman","year":"2019","unstructured":"Yael Tauman Kalai and Leonid Reyzin . 2019 . A Survey of Leakage-Resilient Cryptography . IACR Cryptology ePrint Archive , Vol. 2019 (2019), 302 . https:\/\/eprint.iacr.org\/2019\/302 Yael Tauman Kalai and Leonid Reyzin. 2019. A Survey of Leakage-Resilient Cryptography. IACR Cryptology ePrint Archive, Vol. 2019 (2019), 302. https:\/\/eprint.iacr.org\/2019\/302","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_14_1","volume-title":"Differential Power Analysis. In Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15--19, 1999, Proceedings. 388--397","author":"Kocher Paul C.","year":"1999","unstructured":"Paul C. Kocher , Joshua Jaffe , and Benjamin Jun . 1999 . Differential Power Analysis. In Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15--19, 1999, Proceedings. 388--397 . https:\/\/doi.org\/10.1007\/3-540-48405-1_25 10.1007\/3-540-48405-1_25 Paul C. Kocher, Joshua Jaffe, and Benjamin Jun. 1999. Differential Power Analysis. In Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15--19, 1999, Proceedings. 388--397. https:\/\/doi.org\/10.1007\/3-540-48405-1_25"},{"key":"e_1_3_2_1_15_1","volume-title":"Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"Moradi Amir","year":"2011","unstructured":"Amir Moradi , Axel Poschmann , San Ling , Christof Paar , and Huaxiong Wang . 2011. Pushing the Limits: A Very Compact and a Threshold Implementation of AES . In Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques , Tallinn, Estonia, May 15-19, 2011 . Proceedings . 69--88. https:\/\/doi.org\/10.1007\/978-3-642-20465-4_6 10.1007\/978-3-642-20465-4_6 Amir Moradi, Axel Poschmann, San Ling, Christof Paar, and Huaxiong Wang. 2011. Pushing the Limits: A Very Compact and a Threshold Implementation of AES. In Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings. 69--88. https:\/\/doi.org\/10.1007\/978-3-642-20465-4_6"},{"key":"e_1_3_2_1_16_1","volume-title":"8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4--7, 2006, Proceedings. 529--545","author":"Nikova Svetla","year":"2006","unstructured":"Svetla Nikova , Christian Rechberger , and Vincent Rijmen . 2006 . Threshold Implementations Against Side-Channel Attacks and Glitches. In Information and Communications Security , 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4--7, 2006, Proceedings. 529--545 . https:\/\/doi.org\/10.1007\/11935308_38 10.1007\/11935308_38 Svetla Nikova, Christian Rechberger, and Vincent Rijmen. 2006. Threshold Implementations Against Side-Channel Attacks and Glitches. In Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4--7, 2006, Proceedings. 529--545. https:\/\/doi.org\/10.1007\/11935308_38"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9085-7"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9086-6"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings, Part I. 764--783","author":"Reparaz Oscar","year":"2015","unstructured":"Oscar Reparaz , Beg\u00fc l Bilgin , Svetla Nikova , Benedikt Gierlichs , and Ingrid Verbauwhede . 2015 . Consolidating Masking Schemes. In Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16--20, 2015 , Proceedings, Part I. 764--783 . https:\/\/doi.org\/10.1007\/978-3-662-47989-6_37 10.1007\/978-3-662-47989-6_37 Oscar Reparaz, Beg\u00fc l Bilgin, Svetla Nikova, Benedikt Gierlichs, and Ingrid Verbauwhede. 2015. Consolidating Masking Schemes. In Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16--20, 2015, Proceedings, Part I. 764--783. https:\/\/doi.org\/10.1007\/978-3-662-47989-6_37"},{"key":"e_1_3_2_1_20_1","volume-title":"Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference","author":"Schneider Tobias","year":"2016","unstructured":"Tobias Schneider , Amir Moradi , and Tim G\u00fc neysu. 2016. ParTI - Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks . In Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference , Santa Barbara, CA, USA , August 14-18, 2016 , Proceedings, Part II. 302--332. https:\/\/doi.org\/10.1007\/978-3-662-53008-5_11 10.1007\/978-3-662-53008-5_11 Tobias Schneider, Amir Moradi, and Tim G\u00fc neysu. 2016. ParTI - Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks. In Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II. 302--332. https:\/\/doi.org\/10.1007\/978-3-662-53008-5_11"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of ACM Workshop on Theory of Implementation Security Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338467.3358949","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338467.3358949","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:48Z","timestamp":1750201968000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338467.3358949"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,11]]},"references-count":20,"alternative-id":["10.1145\/3338467.3358949","10.1145\/3338467"],"URL":"https:\/\/doi.org\/10.1145\/3338467.3358949","relation":{},"subject":[],"published":{"date-parts":[[2019,11,11]]},"assertion":[{"value":"2019-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}