{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T02:10:04Z","timestamp":1755915004064,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,7]],"date-time":"2024-05-07T00:00:00Z","timestamp":1715040000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ANR","award":["ANR-22-CE39-0008"],"award-info":[{"award-number":["ANR-22-CE39-0008"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,7]]},"DOI":"10.1145\/3637543.3654658","type":"proceedings-article","created":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T06:19:21Z","timestamp":1719814761000},"page":"35-42","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Relaxed Threshold Implementations"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2746-5911","authenticated-orcid":false,"given":"Rim","family":"Zahmoul","sequence":"first","affiliation":[{"name":"MSD Sant\u00e9 Animale France, Beaucouz\u00e9, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3874-7527","authenticated-orcid":false,"given":"Vincent","family":"Grosso","sequence":"additional","affiliation":[{"name":"Laboratoire Hubert Curien, Saint-\u00c9tienne, France"}]}],"member":"320","published-online":{"date-parts":[[2024,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-017-0015-0"},{"key":"e_1_3_2_1_2_1","unstructured":"Beg\u00fcl Bilgin. 2015. Threshold implementations: as countermeasure against higher-order differential power analysis. Ph.D. Dissertation. University of Twente Enschede Netherlands. http:\/\/purl.utwente.nl\/publications\/95796"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45608-8_18"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_5"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_26"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_30"},{"key":"e_1_3_2_1_7_1","first-page":"536","article-title":"Protecting against Statistical Ineffective Fault Attacks","volume":"2019","author":"Daemen Joan","year":"2019","unstructured":"Joan Daemen, Christoph Dobraunig, Maria Eichlseder, Hannes Gro\u00df, Florian Mendel, and Robert Primas. 2019. Protecting against Statistical Ineffective Fault Attacks. IACR Cryptol. ePrint Arch. 2019 (2019), 536. https:\/\/eprint.iacr.org\/2019\/536","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.13154\/tches.v2019.i3.119-147"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.13154\/tches.v2018.i3.547-572"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-018-9284-1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.13154\/tches.v2018.i3.89-120"},{"key":"e_1_3_2_1_12_1","first-page":"492","article-title":"Masking vs. Multiparty Computation: How Large is the Gap for AES","volume":"2015","author":"Grosso Vincent","year":"2015","unstructured":"Vincent Grosso, Fran\u00e7ois-Xavier Standaert, and Sebastian Faust. 2015. Masking vs. Multiparty Computation: How Large is the Gap for AES? IACR Cryptol. ePrint Arch. 2015 (2015), 492. http:\/\/eprint.iacr.org\/2015\/492","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_27"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30574-3_24"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.13154\/tches.v2019.i2.256-292"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/11935308_38"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_9"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23951-9_5"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47989-6_37"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96884-1_5"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15031-9_28"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45721-1_21"}],"event":{"name":"CF '24: 21st ACM International Conference on Computing Frontiers","sponsor":["SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing"],"location":"Ischia Italy","acronym":"CF '24"},"container-title":["Proceedings of the 21st ACM International Conference on Computing Frontiers: Workshops and Special Sessions"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637543.3654658","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3637543.3654658","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T01:46:43Z","timestamp":1755913603000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637543.3654658"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,7]]},"references-count":22,"alternative-id":["10.1145\/3637543.3654658","10.1145\/3637543"],"URL":"https:\/\/doi.org\/10.1145\/3637543.3654658","relation":{},"subject":[],"published":{"date-parts":[[2024,5,7]]},"assertion":[{"value":"2024-07-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}