{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T17:18:25Z","timestamp":1775323105843,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,10]]},"DOI":"10.1145\/3579856.3595798","type":"proceedings-article","created":{"date-parts":[[2023,7,5]],"date-time":"2023-07-05T14:52:13Z","timestamp":1688568733000},"page":"980-992","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Secure Context Switching of Masked Software Implementations"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7373-9493","authenticated-orcid":false,"given":"Barbara","family":"Gigerl","sequence":"first","affiliation":[{"name":"Graz University of Technology, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9569-8477","authenticated-orcid":false,"given":"Robert","family":"Primas","sequence":"additional","affiliation":[{"name":"Graz University of Technology, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9650-8041","authenticated-orcid":false,"given":"Stefan","family":"Mangard","sequence":"additional","affiliation":[{"name":"Graz University of Technology, Austria"}]}],"member":"320","published-online":{"date-parts":[[2023,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Third International Workshop","author":"Akkar Mehdi-Laurent","year":"2001","unstructured":"Mehdi-Laurent Akkar and Christophe Giraud . 2001 . An Implementation of DES and AES, Secure against Some Attacks. In Cryptographic Hardware and Embedded Systems - CHES 2001 , Third International Workshop , Paris, France , May 14-16, 2001, Proceedings(Lecture Notes in Computer Science, Vol.\u00a02162), \u00c7etin\u00a0Kaya Ko\u00e7, David Naccache, and Christof Paar (Eds.). Springer, 309\u2013318. Mehdi-Laurent Akkar and Christophe Giraud. 2001. An Implementation of DES and AES, Secure against Some Attacks. In Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings(Lecture Notes in Computer Science, Vol.\u00a02162), \u00c7etin\u00a0Kaya Ko\u00e7, David Naccache, and Christof Paar (Eds.). Springer, 309\u2013318."},{"key":"e_1_3_2_1_2_1","unstructured":"Inc. Amazon Web\u00a0Services. 2022. FreeRTOS. https:\/\/www.freertos.org\/ https:\/\/www.freertos.org\/. Retrieved on 15\/12\/2022.  Inc. Amazon Web\u00a0Services. 2022. FreeRTOS. https:\/\/www.freertos.org\/ https:\/\/www.freertos.org\/. Retrieved on 15\/12\/2022."},{"key":"e_1_3_2_1_3_1","volume-title":"Near-Native Interrupt Latency in Real-Time Guests: Handler Emulation Through Memory Map Morphing. In ICCDE 2021: 7th International Conference on Computing and Data Engineering","author":"Andalibi Farhad","year":"2021","unstructured":"Farhad Andalibi and Paulo Garcia . 2021 . Near-Native Interrupt Latency in Real-Time Guests: Handler Emulation Through Memory Map Morphing. In ICCDE 2021: 7th International Conference on Computing and Data Engineering , Phuket, Thailand, January 15 - 17 , 2021. ACM, 94\u201398. Farhad Andalibi and Paulo Garcia. 2021. Near-Native Interrupt Latency in Real-Time Guests: Handler Emulation Through Memory Map Morphing. In ICCDE 2021: 7th International Conference on Computing and Data Engineering, Phuket, Thailand, January 15 - 17, 2021. ACM, 94\u201398."},{"key":"e_1_3_2_1_4_1","unstructured":"Aspencore. 2019. 2019 Embedded Markets Study: Integrating IoT and Advanced Technology Designs Application Development & Processing Environments. https:\/\/www.embedded.com\/wp-content\/uploads\/2019\/11\/EETimes_Embedded_2019_Embedded_Markets_Study.pdf Retrieved on 3\/11\/2022.  Aspencore. 2019. 2019 Embedded Markets Study: Integrating IoT and Advanced Technology Designs Application Development & Processing Environments. https:\/\/www.embedded.com\/wp-content\/uploads\/2019\/11\/EETimes_Embedded_2019_Embedded_Markets_Study.pdf Retrieved on 3\/11\/2022."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2815038"},{"key":"e_1_3_2_1_6_1","volume-title":"Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security","author":"Balasch Josep","year":"2012","unstructured":"Josep Balasch , Sebastian Faust , Benedikt Gierlichs , and Ingrid Verbauwhede . 2012. Theory and Practice of a Leakage Resilient Masking Scheme . In Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security , Beijing, China, December 2-6, 2012 . Proceedings(Lecture Notes in Computer Science, Vol.\u00a07658), Xiaoyun Wang and Kazue Sako (Eds.). Springer , 758\u2013775. Josep Balasch, Sebastian Faust, Benedikt Gierlichs, and Ingrid Verbauwhede. 2012. Theory and Practice of a Leakage Resilient Masking Scheme. In Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings(Lecture Notes in Computer Science, Vol.\u00a07658), Xiaoyun Wang and Kazue Sako (Eds.). Springer, 758\u2013775."},{"key":"e_1_3_2_1_7_1","volume-title":"CARDIS 2014","author":"Balasch Josep","year":"2014","unstructured":"Josep Balasch , Benedikt Gierlichs , Vincent Grosso , Oscar Reparaz , and Fran\u00e7ois-Xavier Standaert . 2014 . On the Cost of Lazy Engineering for Masked Software Implementations. In Smart Card Research and Advanced Applications - 13th International Conference , CARDIS 2014 , Paris, France , November 5-7, 2014. Revised Selected Papers(Lecture Notes in Computer Science, Vol.\u00a08968). Springer, 64\u201381. Josep Balasch, Benedikt Gierlichs, Vincent Grosso, Oscar Reparaz, and Fran\u00e7ois-Xavier Standaert. 2014. On the Cost of Lazy Engineering for Masked Software Implementations. In Smart Card Research and Advanced Applications - 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers(Lecture Notes in Computer Science, Vol.\u00a08968). Springer, 64\u201381."},{"key":"e_1_3_2_1_8_1","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2015 - 17th International Workshop","author":"Balasch Josep","year":"2015","unstructured":"Josep Balasch , Benedikt Gierlichs , Oscar Reparaz , and Ingrid Verbauwhede . 2015. DPA , Bitslicing and Masking at 1 GHz . In Cryptographic Hardware and Embedded Systems - CHES 2015 - 17th International Workshop , Saint-Malo, France, September 13-16, 2015 , Proceedings(Lecture Notes in Computer Science, Vol.\u00a09293), Tim G\u00fcneysu and Helena Handschuh (Eds.). Springer , 599\u2013619. Josep Balasch, Benedikt Gierlichs, Oscar Reparaz, and Ingrid Verbauwhede. 2015. DPA, Bitslicing and Masking at 1 GHz. In Cryptographic Hardware and Embedded Systems - CHES 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings(Lecture Notes in Computer Science, Vol.\u00a09293), Tim G\u00fcneysu and Helena Handschuh (Eds.). Springer, 599\u2013619."},{"key":"e_1_3_2_1_9_1","volume-title":"Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"Barthe Gilles","year":"2017","unstructured":"Gilles Barthe , Fran\u00e7ois Dupressoir , Sebastian Faust , Benjamin Gr\u00e9goire , Fran\u00e7ois-Xavier Standaert , and Pierre-Yves Strub . 2017. Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model . In Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques , Paris, France , April 30 - May 4, 2017 . Gilles Barthe, Fran\u00e7ois Dupressoir, Sebastian Faust, Benjamin Gr\u00e9goire, Fran\u00e7ois-Xavier Standaert, and Pierre-Yves Strub. 2017. Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model. In Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i2.189-228"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","first-page":"275","DOI":"10.46586\/tches.v2021.i3.275-297","article-title":"Analysis and Comparison of Table-based Arithmetic to Boolean Masking","volume":"2021","author":"Beirendonck Michiel\u00a0Van","year":"2021","unstructured":"Michiel\u00a0Van Beirendonck , Jan-Pieter D\u2019Anvers , and Ingrid Verbauwhede . 2021 . Analysis and Comparison of Table-based Arithmetic to Boolean Masking . IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021 , 3 (2021), 275 \u2013 297 . Michiel\u00a0Van Beirendonck, Jan-Pieter D\u2019Anvers, and Ingrid Verbauwhede. 2021. Analysis and Comparison of Table-based Arithmetic to Boolean Masking. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021, 3 (2021), 275\u2013297.","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"e_1_3_2_1_12_1","volume-title":"USA","author":"Bela\u00efd Sonia","year":"2017","unstructured":"Sonia Bela\u00efd , Fabrice Benhamouda , Alain Passel\u00e8gue , Emmanuel Prouff , Adrian Thillard , and Damien Vergnaud . 2017 . Private Multiplication over Finite Fields. In Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA , USA , August 20-24, 2017, Proceedings, Part III(Lecture Notes in Computer Science, Vol.\u00a010403). Springer, 397\u2013426. Sonia Bela\u00efd, Fabrice Benhamouda, Alain Passel\u00e8gue, Emmanuel Prouff, Adrian Thillard, and Damien Vergnaud. 2017. Private Multiplication over Finite Fields. In Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part III(Lecture Notes in Computer Science, Vol.\u00a010403). Springer, 397\u2013426."},{"key":"e_1_3_2_1_13_1","volume-title":"Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations. In EUROCRYPT (3)(Lecture Notes in Computer Science, Vol.\u00a012107)","author":"Bela\u00efd Sonia","year":"2020","unstructured":"Sonia Bela\u00efd , Pierre-\u00c9variste Dagand , Darius Mercadier , Matthieu Rivain , and Rapha\u00ebl Wintersdorff . 2020 . Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations. In EUROCRYPT (3)(Lecture Notes in Computer Science, Vol.\u00a012107) . Springer , 311\u2013341. Sonia Bela\u00efd, Pierre-\u00c9variste Dagand, Darius Mercadier, Matthieu Rivain, and Rapha\u00ebl Wintersdorff. 2020. Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations. In EUROCRYPT (3)(Lecture Notes in Computer Science, Vol.\u00a012107). Springer, 311\u2013341."},{"key":"e_1_3_2_1_14_1","volume-title":"European Conference on Computer Systems, Proceedings of the Seventh EuroSys Conference 2012","author":"Blackham Bernard","year":"2012","unstructured":"Bernard Blackham , Yao Shi , and Gernot Heiser . 2012 . Improving interrupt response time in a verifiable protected microkernel . In European Conference on Computer Systems, Proceedings of the Seventh EuroSys Conference 2012 , EuroSys \u201912, Bern, Switzerland , April 10-13, 2012, Pascal Felber, Frank Bellosa, and Herbert Bos (Eds.). ACM, 323\u2013336. Bernard Blackham, Yao Shi, and Gernot Heiser. 2012. Improving interrupt response time in a verifiable protected microkernel. In European Conference on Computer Systems, Proceedings of the Seventh EuroSys Conference 2012, EuroSys \u201912, Bern, Switzerland, April 10-13, 2012, Pascal Felber, Frank Bellosa, and Herbert Bos (Eds.). ACM, 323\u2013336."},{"key":"e_1_3_2_1_15_1","volume-title":"19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings(Lecture Notes in Computer Science, Vol.\u00a01666)","author":"Chari Suresh","year":"1999","unstructured":"Suresh Chari , Charanjit\u00a0 S. Jutla , Josyula\u00a0 R. Rao , and Pankaj Rohatgi . 1999 . Towards Sound Approaches to Counteract Power-Analysis Attacks. In Advances in Cryptology - CRYPTO \u201999 , 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings(Lecture Notes in Computer Science, Vol.\u00a01666) , Michael\u00a0J. Wiener (Ed.). Springer, 398\u2013412. Suresh Chari, Charanjit\u00a0S. Jutla, Josyula\u00a0R. Rao, and Pankaj Rohatgi. 1999. Towards Sound Approaches to Counteract Power-Analysis Attacks. In Advances in Cryptology - CRYPTO \u201999, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings(Lecture Notes in Computer Science, Vol.\u00a01666), Michael\u00a0J. Wiener (Ed.). Springer, 398\u2013412."},{"key":"e_1_3_2_1_16_1","volume-title":"CHES(Lecture Notes in Computer Science, Vol.\u00a02523)","author":"Chari Suresh","unstructured":"Suresh Chari , Josyula\u00a0 R. Rao , and Pankaj Rohatgi . 2002. Template Attacks . In CHES(Lecture Notes in Computer Science, Vol.\u00a02523) . Springer , 13\u201328. Suresh Chari, Josyula\u00a0R. Rao, and Pankaj Rohatgi. 2002. Template Attacks. In CHES(Lecture Notes in Computer Science, Vol.\u00a02523). Springer, 13\u201328."},{"key":"e_1_3_2_1_17_1","volume-title":"USA","author":"Cnudde Thomas\u00a0De","year":"2016","unstructured":"Thomas\u00a0De Cnudde , Oscar Reparaz , Beg\u00fcl Bilgin , Svetla Nikova , Ventzislav Nikov , and Vincent Rijmen . 2016 . Masking AES with d+1 Shares in Hardware. In Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA , USA , August 17-19, 2016, Proceedings(Lecture Notes in Computer Science, Vol.\u00a09813). Springer, 194\u2013212. Thomas\u00a0De Cnudde, Oscar Reparaz, Beg\u00fcl Bilgin, Svetla Nikova, Ventzislav Nikov, and Vincent Rijmen. 2016. Masking AES with d+1 Shares in Hardware. In Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings(Lecture Notes in Computer Science, Vol.\u00a09813). Springer, 194\u2013212."},{"key":"e_1_3_2_1_18_1","volume-title":"Constructive Side-Channel Analysis and Secure Design - Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings(Lecture Notes in Computer Science, Vol.\u00a07275)","author":"Coron Jean-S\u00e9bastien","year":"2012","unstructured":"Jean-S\u00e9bastien Coron , Christophe Giraud , Emmanuel Prouff , Soline Renner , Matthieu Rivain , and Praveen\u00a0Kumar Vadnala . 2012 . Conversion of Security Proofs from One Leakage Model to Another: A New Issue . In Constructive Side-Channel Analysis and Secure Design - Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings(Lecture Notes in Computer Science, Vol.\u00a07275) . Springer, 69\u201381. Jean-S\u00e9bastien Coron, Christophe Giraud, Emmanuel Prouff, Soline Renner, Matthieu Rivain, and Praveen\u00a0Kumar Vadnala. 2012. Conversion of Security Proofs from One Leakage Model to Another: A New Issue. In Constructive Side-Channel Analysis and Secure Design - Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings(Lecture Notes in Computer Science, Vol.\u00a07275). Springer, 69\u201381."},{"key":"e_1_3_2_1_19_1","volume-title":"COSADE 2018, Singapore, April 23-24, 2018, Proceedings(Lecture Notes in Computer Science, Vol.\u00a010815)","author":"Corre Yann\u00a0Le","year":"2018","unstructured":"Yann\u00a0Le Corre , Johann Gro\u00dfsch\u00e4dl , and Daniel Dinu . 2018 . Micro-architectural Power Simulator for Leakage Assessment of Cryptographic Software on ARM Cortex-M3 Processors. In Constructive Side-Channel Analysis and Secure Design - 9th International Workshop , COSADE 2018, Singapore, April 23-24, 2018, Proceedings(Lecture Notes in Computer Science, Vol.\u00a010815) , Junfeng Fan and Benedikt Gierlichs (Eds.). Springer, 82\u201398. Yann\u00a0Le Corre, Johann Gro\u00dfsch\u00e4dl, and Daniel Dinu. 2018. Micro-architectural Power Simulator for Leakage Assessment of Cryptographic Software on ARM Cortex-M3 Processors. In Constructive Side-Channel Analysis and Secure Design - 9th International Workshop, COSADE 2018, Singapore, April 23-24, 2018, Proceedings(Lecture Notes in Computer Science, Vol.\u00a010815), Junfeng Fan and Benedikt Gierlichs (Eds.). Springer, 82\u201398."},{"key":"e_1_3_2_1_20_1","volume-title":"Erik Schneider, and Lejla Batina.","author":"de Groot Wouter","year":"2016","unstructured":"Wouter de Groot , Kostas Papagiannopoulos , Antonio de\u00a0la Piedra , Erik Schneider, and Lejla Batina. 2016 . Bitsliced Masking and ARM: Friends or Foes?. In Lightweight Cryptography for Security and Privacy - 5th International Workshop, LightSec 2016, Aksaray, Turkey, September 21-22, 2016, Revised Selected Papers(Lecture Notes in Computer Science, Vol.\u00a010098). Springer , 91\u2013109. Wouter de Groot, Kostas Papagiannopoulos, Antonio de\u00a0la Piedra, Erik Schneider, and Lejla Batina. 2016. Bitsliced Masking and ARM: Friends or Foes?. In Lightweight Cryptography for Security and Privacy - 5th International Workshop, LightSec 2016, Aksaray, Turkey, September 21-22, 2016, Revised Selected Papers(Lecture Notes in Computer Science, Vol.\u00a010098). Springer, 91\u2013109."},{"key":"e_1_3_2_1_21_1","unstructured":"AmbiML Developers. 2022. KataOS. https:\/\/opensource.googleblog.com\/2022\/10\/announcing-kataos-and-sparrow.html.  AmbiML Developers. 2022. KataOS. https:\/\/opensource.googleblog.com\/2022\/10\/announcing-kataos-and-sparrow.html."},{"key":"e_1_3_2_1_22_1","unstructured":"Christoph Dobraunig Maria Eichlseder Florian Mendel and Martin Schl\u00e4ffer. 2016. Ascon v1.2. Submission to the CEASAR Competition. https:\/\/ascon.iaik.tugraz.at\/files\/asconv12.pd. Retrieved on 4\/2\/2021.  Christoph Dobraunig Maria Eichlseder Florian Mendel and Martin Schl\u00e4ffer. 2016. Ascon v1.2. Submission to the CEASAR Competition. https:\/\/ascon.iaik.tugraz.at\/files\/asconv12.pd. Retrieved on 4\/2\/2021."},{"key":"e_1_3_2_1_23_1","volume-title":"Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs. In 30th USENIX Security Symposium, USENIX Security 2021","author":"Gigerl Barbara","year":"2021","unstructured":"Barbara Gigerl , Vedad Hadzic , Robert Primas , Stefan Mangard , and Roderick Bloem . 2021 . Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs. In 30th USENIX Security Symposium, USENIX Security 2021 , August 11-13, 2021, Michael Bailey and Rachel Greenstadt (Eds.). USENIX Association, 1469\u20131468. Barbara Gigerl, Vedad Hadzic, Robert Primas, Stefan Mangard, and Roderick Bloem. 2021. Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs. In 30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021, Michael Bailey and Rachel Greenstadt (Eds.). USENIX Association, 1469\u20131468."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92075-3_1"},{"key":"e_1_3_2_1_25_1","unstructured":"SYSGO GMBH. 2022. PikeOS. https:\/\/www.sysgo.com\/pikeos https:\/\/www.sysgo.com\/pikeos. Retrieved on 14\/12\/2022.  SYSGO GMBH. 2022. PikeOS. https:\/\/www.sysgo.com\/pikeos https:\/\/www.sysgo.com\/pikeos. Retrieved on 14\/12\/2022."},{"key":"e_1_3_2_1_26_1","volume-title":"First International Workshop, CHES\u201999","author":"Goubin Louis","year":"1999","unstructured":"Louis Goubin and Jacques Patarin . 1999 . DES and Differential Power Analysis (The \"Duplication\" Method). In Cryptographic Hardware and Embedded Systems , First International Workshop, CHES\u201999 , Worcester, MA, USA , August 12-13, 1999, Proceedings(Lecture Notes in Computer Science, Vol.\u00a01717), \u00c7etin\u00a0Kaya Ko\u00e7 and Christof Paar (Eds.). Springer, 158\u2013172. Louis Goubin and Jacques Patarin. 1999. DES and Differential Power Analysis (The \"Duplication\" Method). In Cryptographic Hardware and Embedded Systems, First International Workshop, CHES\u201999, Worcester, MA, USA, August 12-13, 1999, Proceedings(Lecture Notes in Computer Science, Vol.\u00a01717), \u00c7etin\u00a0Kaya Ko\u00e7 and Christof Paar (Eds.). Springer, 158\u2013172."},{"key":"e_1_3_2_1_27_1","volume-title":"COSADE 2018, Singapore, April 23-24, 2018, Proceedings(Lecture Notes in Computer Science, Vol.\u00a010815)","author":"Goudarzi Dahmun","year":"2018","unstructured":"Dahmun Goudarzi , Anthony Journault , Matthieu Rivain , and Fran\u00e7ois-Xavier Standaert . 2018 . Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison. In Constructive Side-Channel Analysis and Secure Design - 9th International Workshop , COSADE 2018, Singapore, April 23-24, 2018, Proceedings(Lecture Notes in Computer Science, Vol.\u00a010815) , Junfeng Fan and Benedikt Gierlichs (Eds.). Springer, 3\u201322. Dahmun Goudarzi, Anthony Journault, Matthieu Rivain, and Fran\u00e7ois-Xavier Standaert. 2018. Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison. In Constructive Side-Channel Analysis and Secure Design - 9th International Workshop, COSADE 2018, Singapore, April 23-24, 2018, Proceedings(Lecture Notes in Computer Science, Vol.\u00a010815), Junfeng Fan and Benedikt Gierlichs (Eds.). Springer, 3\u201322."},{"key":"e_1_3_2_1_28_1","volume-title":"Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"Goudarzi Dahmun","year":"2017","unstructured":"Dahmun Goudarzi and Matthieu Rivain . 2017. How Fast Can Higher-Order Masking Be in Software? . In Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques , Paris, France , April 30 - May 4, 2017 , Proceedings, Part I(Lecture Notes in Computer Science), Jean-S\u00e9bastien Coron and Jesper\u00a0Buus Nielsen (Eds .). Dahmun Goudarzi and Matthieu Rivain. 2017. How Fast Can Higher-Order Masking Be in Software?. In Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part I(Lecture Notes in Computer Science), Jean-S\u00e9bastien Coron and Jesper\u00a0Buus Nielsen (Eds.)."},{"key":"e_1_3_2_1_29_1","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference","author":"Gro\u00df Hannes","year":"2017","unstructured":"Hannes Gro\u00df and Stefan Mangard . 2017. Reconciling d+1 Masking in Hardware and Software . In Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference , Taipei, Taiwan, September 25-28, 2017 , Proceedings(Lecture Notes in Computer Science, Vol.\u00a010529). Springer , 115\u2013136. Hannes Gro\u00df and Stefan Mangard. 2017. Reconciling d+1 Masking in Hardware and Software. In Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings(Lecture Notes in Computer Science, Vol.\u00a010529). Springer, 115\u2013136."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-018-0184-y"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2996366.2996426"},{"key":"e_1_3_2_1_32_1","volume-title":"Higher-Order Side-Channel Protected Implementations of KECCAK. In Euromicro Conference on Digital System Design, DSD 2017","author":"Gro\u00df Hannes","year":"2017","unstructured":"Hannes Gro\u00df , David Schaffenrath , and Stefan Mangard . 2017 . Higher-Order Side-Channel Protected Implementations of KECCAK. In Euromicro Conference on Digital System Design, DSD 2017 , Vienna, Austria, August 30 - Sept. 1, 2017. IEEE Computer Society, 205\u2013212. Hannes Gro\u00df, David Schaffenrath, and Stefan Mangard. 2017. Higher-Order Side-Channel Protected Implementations of KECCAK. In Euromicro Conference on Digital System Design, DSD 2017, Vienna, Austria, August 30 - Sept. 1, 2017. IEEE Computer Society, 205\u2013212."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3089875"},{"key":"e_1_3_2_1_34_1","volume-title":"23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings(Lecture Notes in Computer Science, Vol.\u00a02729)","author":"Ishai Yuval","year":"2003","unstructured":"Yuval Ishai , Amit Sahai , and David\u00a0 A. Wagner . 2003 . Private Circuits: Securing Hardware against Probing Attacks. In Advances in Cryptology - CRYPTO 2003 , 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings(Lecture Notes in Computer Science, Vol.\u00a02729) . Springer, 463\u2013481. Yuval Ishai, Amit Sahai, and David\u00a0A. Wagner. 2003. Private Circuits: Securing Hardware against Probing Attacks. In Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings(Lecture Notes in Computer Science, Vol.\u00a02729). Springer, 463\u2013481."},{"key":"e_1_3_2_1_35_1","first-page":"589","article-title":"Automated Generation of Masked Hardware","volume":"2022","author":"Knichel David","year":"2022","unstructured":"David Knichel , Amir Moradi , Nicolai M\u00fcller , and Pascal Sasdrich . 2022 . Automated Generation of Masked Hardware . IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022 , 1 (2022), 589 \u2013 629 . David Knichel, Amir Moradi, Nicolai M\u00fcller, and Pascal Sasdrich. 2022. Automated Generation of Masked Hardware. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022, 1 (2022), 589\u2013629.","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"e_1_3_2_1_36_1","volume-title":"CRYPTO(Lecture Notes in Computer Science, Vol.\u00a01666)","author":"Kocher C.","unstructured":"Paul\u00a0 C. Kocher , Joshua Jaffe , and Benjamin Jun . 1999. Differential Power Analysis . In CRYPTO(Lecture Notes in Computer Science, Vol.\u00a01666) . Springer , 388\u2013397. Paul\u00a0C. Kocher, Joshua Jaffe, and Benjamin Jun. 1999. Differential Power Analysis. In CRYPTO(Lecture Notes in Computer Science, Vol.\u00a01666). Springer, 388\u2013397."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132786"},{"key":"e_1_3_2_1_38_1","unstructured":"lowRISC contributors. 2019. AES HWIP Technical Specification. https:\/\/opentitan.org\/book\/hw\/ip\/aes\/index.html https:\/\/opentitan.org\/book\/hw\/ip\/aes\/index.html. Retrieved on 19\/4\/2023.  lowRISC contributors. 2019. AES HWIP Technical Specification. https:\/\/opentitan.org\/book\/hw\/ip\/aes\/index.html https:\/\/opentitan.org\/book\/hw\/ip\/aes\/index.html. Retrieved on 19\/4\/2023."},{"key":"e_1_3_2_1_39_1","first-page":"175","article-title":"MIRACLE: MIcRo-ArChitectural Leakage Evaluation A study of micro-architectural power leakage across many devices","volume":"2022","author":"Marshall Ben","year":"2022","unstructured":"Ben Marshall , Dan Page , and James Webb . 2022 . MIRACLE: MIcRo-ArChitectural Leakage Evaluation A study of micro-architectural power leakage across many devices . IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022 , 1 (2022), 175 \u2013 220 . Ben Marshall, Dan Page, and James Webb. 2022. MIRACLE: MIcRo-ArChitectural Leakage Evaluation A study of micro-architectural power leakage across many devices. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022, 1 (2022), 175\u2013220.","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"e_1_3_2_1_40_1","volume-title":"Box\u2019 Modelling for Instruction Leakages. In 26th USENIX Security Symposium, USENIX Security 2017","author":"McCann David","year":"2017","unstructured":"David McCann , Elisabeth Oswald , and Carolyn Whitnall . 2017 . Towards Practical Tools for Side Channel Aware Software Engineering: \u2019Grey Box\u2019 Modelling for Instruction Leakages. In 26th USENIX Security Symposium, USENIX Security 2017 , Vancouver, BC, Canada , August 16-18, 2017. USENIX Association, 199\u2013216. David McCann, Elisabeth Oswald, and Carolyn Whitnall. 2017. Towards Practical Tools for Side Channel Aware Software Engineering: \u2019Grey Box\u2019 Modelling for Instruction Leakages. In 26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, August 16-18, 2017. USENIX Association, 199\u2013216."},{"key":"e_1_3_2_1_41_1","first-page":"1297","article-title":"On the Effect of the (Micro)Architecture on the Development of Side-Channel Resistant Software","volume":"2020","author":"Meyer Lauren\u00a0De","year":"2020","unstructured":"Lauren\u00a0De Meyer , Elke\u00a0De Mulder , and Michael Tunstall . 2020 . On the Effect of the (Micro)Architecture on the Development of Side-Channel Resistant Software . IACR Cryptol. ePrint Arch. 2020 (2020), 1297 . Lauren\u00a0De Meyer, Elke\u00a0De Mulder, and Michael Tunstall. 2020. On the Effect of the (Micro)Architecture on the Development of Side-Channel Resistant Software. IACR Cryptol. ePrint Arch. 2020 (2020), 1297.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_42_1","volume-title":"8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings(Lecture Notes in Computer Science, Vol.\u00a04307)","author":"Nikova Svetla","year":"2006","unstructured":"Svetla Nikova , Christian Rechberger , and Vincent Rijmen . 2006 . Threshold Implementations Against Side-Channel Attacks and Glitches. In Information and Communications Security , 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings(Lecture Notes in Computer Science, Vol.\u00a04307) . Springer, 529\u2013545. Svetla Nikova, Christian Rechberger, and Vincent Rijmen. 2006. Threshold Implementations Against Side-Channel Attacks and Glitches. In Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings(Lecture Notes in Computer Science, Vol.\u00a04307). Springer, 529\u2013545."},{"key":"e_1_3_2_1_43_1","volume-title":"6th International Workshop, WISA 2005","author":"Oswald Elisabeth","year":"2005","unstructured":"Elisabeth Oswald and Kai Schramm . 2005 . An Efficient Masking Scheme for AES Software Implementations. In Information Security Applications , 6th International Workshop, WISA 2005 , Jeju Island, Korea , August 22-24, 2005, Revised Selected Papers(Lecture Notes in Computer Science, Vol.\u00a03786), JooSeok Song, Taekyoung Kwon, and Moti Yung (Eds.). Springer, 292\u2013305. Elisabeth Oswald and Kai Schramm. 2005. An Efficient Masking Scheme for AES Software Implementations. In Information Security Applications, 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers(Lecture Notes in Computer Science, Vol.\u00a03786), JooSeok Song, Taekyoung Kwon, and Moti Yung (Eds.). Springer, 292\u2013305."},{"key":"e_1_3_2_1_44_1","volume-title":"COSADE 2017","author":"Papagiannopoulos Kostas","year":"2017","unstructured":"Kostas Papagiannopoulos and Nikita Veshchikov . 2017 . Mind the Gap: Towards Secure 1st-Order Masking in Software. In Constructive Side-Channel Analysis and Secure Design - 8th International Workshop , COSADE 2017 , Paris, France , April 13-14, 2017, Revised Selected Papers(Lecture Notes in Computer Science, Vol.\u00a010348). Springer, 282\u2013297. Kostas Papagiannopoulos and Nikita Veshchikov. 2017. Mind the Gap: Towards Secure 1st-Order Masking in Software. In Constructive Side-Channel Analysis and Secure Design - 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised Selected Papers(Lecture Notes in Computer Science, Vol.\u00a010348). Springer, 282\u2013297."},{"key":"e_1_3_2_1_45_1","unstructured":"Zephyr Project. 2022. Zephyr OS. https:\/\/www.zephyrproject.org\/ https:\/\/www.zephyrproject.org\/. Retrieved on 14\/12\/2022.  Zephyr Project. 2022. Zephyr OS. https:\/\/www.zephyrproject.org\/ https:\/\/www.zephyrproject.org\/. Retrieved on 14\/12\/2022."},{"key":"e_1_3_2_1_46_1","volume-title":"USA","author":"Reparaz Oscar","year":"2015","unstructured":"Oscar Reparaz , Beg\u00fcl Bilgin , Svetla Nikova , Benedikt Gierlichs , and Ingrid Verbauwhede . 2015 . Consolidating Masking Schemes. In Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA , USA , August 16-20, 2015, Proceedings, Part I(Lecture Notes in Computer Science, Vol.\u00a09215). Springer, 764\u2013783. Oscar Reparaz, Beg\u00fcl Bilgin, Svetla Nikova, Benedikt Gierlichs, and Ingrid Verbauwhede. 2015. Consolidating Masking Schemes. In Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I(Lecture Notes in Computer Science, Vol.\u00a09215). Springer, 764\u2013783."},{"key":"e_1_3_2_1_47_1","volume-title":"CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings(Lecture Notes in Computer Science, Vol.\u00a06225)","author":"Rivain Matthieu","year":"2010","unstructured":"Matthieu Rivain and Emmanuel Prouff . 2010 . Provably Secure Higher-Order Masking of AES. In Cryptographic Hardware and Embedded Systems , CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings(Lecture Notes in Computer Science, Vol.\u00a06225) . Springer, 413\u2013427. Matthieu Rivain and Emmanuel Prouff. 2010. Provably Secure Higher-Order Masking of AES. In Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings(Lecture Notes in Computer Science, Vol.\u00a06225). Springer, 413\u2013427."},{"key":"e_1_3_2_1_48_1","unstructured":"NXP Semiconductors. 2022. MQX Real-Time Operating System (RTOS). https:\/\/www.nxp.com\/design\/software\/embedded-software\/mqx-software-solutions\/mqx-real-time-operating-system-rtos:MQXRTOS. Retrieved on 14\/12\/2022.  NXP Semiconductors. 2022. MQX Real-Time Operating System (RTOS). https:\/\/www.nxp.com\/design\/software\/embedded-software\/mqx-software-solutions\/mqx-real-time-operating-system-rtos:MQXRTOS. Retrieved on 14\/12\/2022."},{"key":"e_1_3_2_1_49_1","unstructured":"Amazon\u00a0Web Services. 2022. FreeRTOS Kernel Ports. https:\/\/www.freertos.org\/RTOS_ports.html https:\/\/www.freertos.org\/RTOS_ports.html. Retrieved on 5\/11\/2022.  Amazon\u00a0Web Services. 2022. FreeRTOS Kernel Ports. https:\/\/www.freertos.org\/RTOS_ports.html https:\/\/www.freertos.org\/RTOS_ports.html. Retrieved on 5\/11\/2022."},{"key":"e_1_3_2_1_50_1","unstructured":"Amazon\u00a0Web Services. 2022. FreeRTOS Scheduling. https:\/\/www.freertos.org\/implementation\/a00005.html https:\/\/www.freertos.org\/implementation\/a00005.html. Retrieved on 5\/12\/2022.  Amazon\u00a0Web Services. 2022. FreeRTOS Scheduling. https:\/\/www.freertos.org\/implementation\/a00005.html https:\/\/www.freertos.org\/implementation\/a00005.html. Retrieved on 5\/12\/2022."},{"key":"e_1_3_2_1_51_1","volume-title":"2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19","author":"Shelton A.","year":"2021","unstructured":"Madura\u00a0 A. Shelton , Lukasz Chmielewski , Niels Samwel , Markus Wagner , Lejla Batina , and Yuval Yarom . 2021 . Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code. In CCS \u201921 : 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19 , 2021, Yongdae Kim, Jong Kim, Giovanni Vigna, and Elaine Shi (Eds.). ACM, 685\u2013699. Madura\u00a0A. Shelton, Lukasz Chmielewski, Niels Samwel, Markus Wagner, Lejla Batina, and Yuval Yarom. 2021. Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code. In CCS \u201921: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021, Yongdae Kim, Jong Kim, Giovanni Vigna, and Elaine Shi (Eds.). ACM, 685\u2013699."},{"key":"e_1_3_2_1_52_1","volume-title":"Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers. In 28th Annual Network and Distributed System Security Symposium, NDSS 2021","author":"Shelton A.","year":"2021","unstructured":"Madura\u00a0 A. Shelton , Niels Samwel , Lejla Batina , Francesco Regazzoni , Markus Wagner , and Yuval Yarom . 2021 . Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers. In 28th Annual Network and Distributed System Security Symposium, NDSS 2021 , virtually, February 21-25, 2021. The Internet Society. Madura\u00a0A. Shelton, Niels Samwel, Lejla Batina, Francesco Regazzoni, Markus Wagner, and Yuval Yarom. 2021. Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers. In 28th Annual Network and Distributed System Security Symposium, NDSS 2021, virtually, February 21-25, 2021. The Internet Society."},{"key":"e_1_3_2_1_53_1","volume-title":"Retrieved on February 2nd","author":"Snyder Wilson","year":"2022","unstructured":"Wilson Snyder . 2022 . Verilator. https:\/\/www.veripool.org\/wiki\/verilator . Retrieved on February 2nd , 2021. Wilson Snyder. 2022. Verilator. https:\/\/www.veripool.org\/wiki\/verilator. Retrieved on February 2nd, 2021."},{"key":"e_1_3_2_1_54_1","volume-title":"RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings, Kaisa Nyberg (Ed.). Springer.","author":"Wang Junwei","year":"2015","unstructured":"Junwei Wang , Praveen\u00a0Kumar Vadnala , Johann Gro\u00dfsch\u00e4dl , and Qiuliang Xu . 2015 . Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON. In Topics in Cryptology - CT-RSA 2015, The Cryptographer\u2019s Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings, Kaisa Nyberg (Ed.). Springer. Junwei Wang, Praveen\u00a0Kumar Vadnala, Johann Gro\u00dfsch\u00e4dl, and Qiuliang Xu. 2015. Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON. In Topics in Cryptology - CT-RSA 2015, The Cryptographer\u2019s Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings, Kaisa Nyberg (Ed.). Springer."},{"key":"e_1_3_2_1_55_1","unstructured":"Claire Wolf. 2016. Yosys Open SYnthesis Suite. http:\/\/www.clifford.at\/yosys\/. Retrieved on February 2\/2\/2021.  Claire Wolf. 2016. Yosys Open SYnthesis Suite. http:\/\/www.clifford.at\/yosys\/. Retrieved on February 2\/2\/2021."},{"key":"e_1_3_2_1_56_1","volume-title":"International Conference on Scalable Computing and Communications \/ Eighth International Conference on Embedded Computing, ScalCom-EmbeddedCom 2009","author":"Zhang Peifeng","year":"2009","unstructured":"Peifeng Zhang , Hong Li , and Zhigang Gao . 2009 . PIL: A Method to Improve Interrupt Latency in Real-Time Kernels . In International Conference on Scalable Computing and Communications \/ Eighth International Conference on Embedded Computing, ScalCom-EmbeddedCom 2009 , Dalian, China , September 25-27, 2009, Keqiu Li, Geyong Min, Yongxin Zhu, Meikang Qiu, and Wenyu Qu (Eds.). Peifeng Zhang, Hong Li, and Zhigang Gao. 2009. PIL: A Method to Improve Interrupt Latency in Real-Time Kernels. In International Conference on Scalable Computing and Communications \/ Eighth International Conference on Embedded Computing, ScalCom-EmbeddedCom 2009, Dalian, China, September 25-27, 2009, Keqiu Li, Geyong Min, Yongxin Zhu, Meikang Qiu, and Wenyu Qu (Eds.)."}],"event":{"name":"ASIA CCS '23: ACM ASIA Conference on Computer and Communications Security","location":"Melbourne VIC Australia","acronym":"ASIA CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3595798","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:17Z","timestamp":1750183697000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3595798"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":56,"alternative-id":["10.1145\/3579856.3595798","10.1145\/3579856"],"URL":"https:\/\/doi.org\/10.1145\/3579856.3595798","relation":{},"subject":[],"published":{"date-parts":[[2023,7,10]]},"assertion":[{"value":"2023-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}