{"id":"https://openalex.org/W4214668663","doi":"https://doi.org/10.1007/s13389-022-00286-x","title":"A relation calculus for reasoning about t-probing security","display_name":"A relation calculus for reasoning about t-probing security","publication_year":2022,"publication_date":"2022-02-26","ids":{"openalex":"https://openalex.org/W4214668663","doi":"https://doi.org/10.1007/s13389-022-00286-x"},"language":"en","primary_location":{"id":"doi:10.1007/s13389-022-00286-x","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s13389-022-00286-x","pdf_url":"https://link.springer.com/content/pdf/10.1007/s13389-022-00286-x.pdf","source":{"id":"https://openalex.org/S2764800400","display_name":"Journal of Cryptographic Engineering","issn_l":"2190-8508","issn":["2190-8508","2190-8516"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cryptographic Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s13389-022-00286-x.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055479495","display_name":"Maria Chiara Molteni","orcid":"https://orcid.org/0000-0003-2901-2972"},"institutions":[{"id":"https://openalex.org/I189158943","display_name":"University of Milan","ror":"https://ror.org/00wjc7c48","country_code":"IT","type":"education","lineage":["https://openalex.org/I189158943"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Maria Chiara Molteni","raw_affiliation_strings":["Dipartimento di Informatica \"Giovanni Degli Antoni\", Universit degli Studi di Milano, Via Celoria 18, 20133 Milano, Italy","Dipartimento di Informatica \u201cGiovanni Degli Antoni\u201d, Universit\u00e0 degli Studi di Milano, Via Celoria 18, 20133, Milano, Italy"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Informatica \"Giovanni Degli Antoni\", Universit degli Studi di Milano, Via Celoria 18, 20133 Milano, Italy","institution_ids":["https://openalex.org/I189158943"]},{"raw_affiliation_string":"Dipartimento di Informatica \u201cGiovanni Degli Antoni\u201d, Universit\u00e0 degli Studi di Milano, Via Celoria 18, 20133, Milano, Italy","institution_ids":["https://openalex.org/I189158943"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086350616","display_name":"Vittorio Zaccaria","orcid":"https://orcid.org/0000-0001-5685-9795"},"institutions":[{"id":"https://openalex.org/I93860229","display_name":"Politecnico di Milano","ror":"https://ror.org/01nffqt88","country_code":"IT","type":"education","lineage":["https://openalex.org/I93860229"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Vittorio Zaccaria","raw_affiliation_strings":["Department of Electronics, Information and Bioengineering, Politecnico di Milano, Piazza Leonardo da Vinci 32, 20133 Milano, Italy","Department of Electronics, Information and Bioengineering, Politecnico di Milano, Piazza Leonardo da Vinci 32, 20133, Milano, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Electronics, Information and Bioengineering, Politecnico di Milano, Piazza Leonardo da Vinci 32, 20133 Milano, Italy","institution_ids":["https://openalex.org/I93860229"]},{"raw_affiliation_string":"Department of Electronics, Information and Bioengineering, Politecnico di Milano, Piazza Leonardo da Vinci 32, 20133, Milano, Italy","institution_ids":["https://openalex.org/I93860229"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5086350616"],"corresponding_institution_ids":["https://openalex.org/I93860229"],"apc_list":{"value":2390,"currency":"EUR","value_usd":2990},"apc_paid":{"value":2390,"currency":"EUR","value_usd":2990},"fwci":0.1326,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.49244036,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"12","issue":"1","first_page":"1","last_page":"14"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.676428496837616},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6660953760147095},{"id":"https://openalex.org/keywords/formalism","display_name":"Formalism (music)","score":0.6245008707046509},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.6167735457420349},{"id":"https://openalex.org/keywords/boolean-function","display_name":"Boolean function","score":0.6155928373336792},{"id":"https://openalex.org/keywords/masking","display_name":"Masking (illustration)","score":0.46985307335853577},{"id":"https://openalex.org/keywords/algebraic-number","display_name":"Algebraic number","score":0.43072742223739624},{"id":"https://openalex.org/keywords/calculus","display_name":"Calculus (dental)","score":0.32374998927116394},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3170045018196106},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2872151732444763}],"concepts":[{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.676428496837616},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6660953760147095},{"id":"https://openalex.org/C73301696","wikidata":"https://www.wikidata.org/wiki/Q5469984","display_name":"Formalism (music)","level":3,"score":0.6245008707046509},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.6167735457420349},{"id":"https://openalex.org/C187455244","wikidata":"https://www.wikidata.org/wiki/Q942353","display_name":"Boolean function","level":2,"score":0.6155928373336792},{"id":"https://openalex.org/C2777402240","wikidata":"https://www.wikidata.org/wiki/Q6783436","display_name":"Masking (illustration)","level":2,"score":0.46985307335853577},{"id":"https://openalex.org/C9376300","wikidata":"https://www.wikidata.org/wiki/Q168817","display_name":"Algebraic number","level":2,"score":0.43072742223739624},{"id":"https://openalex.org/C2777686260","wikidata":"https://www.wikidata.org/wiki/Q144037","display_name":"Calculus (dental)","level":2,"score":0.32374998927116394},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3170045018196106},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2872151732444763},{"id":"https://openalex.org/C558565934","wikidata":"https://www.wikidata.org/wiki/Q2743","display_name":"Musical","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C199343813","wikidata":"https://www.wikidata.org/wiki/Q12128","display_name":"Dentistry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s13389-022-00286-x","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s13389-022-00286-x","pdf_url":"https://link.springer.com/content/pdf/10.1007/s13389-022-00286-x.pdf","source":{"id":"https://openalex.org/S2764800400","display_name":"Journal of Cryptographic Engineering","issn_l":"2190-8508","issn":["2190-8508","2190-8516"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cryptographic Engineering","raw_type":"journal-article"},{"id":"pmh:oai:re.public.polimi.it:11311/1221272","is_oa":false,"landing_page_url":"http://hdl.handle.net/11311/1221272","pdf_url":null,"source":{"id":"https://openalex.org/S4306400312","display_name":"Virtual Community of Pathological Anatomy (University of Castilla La Mancha)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79189158","host_organization_name":"University of Castilla-La Mancha","host_organization_lineage":["https://openalex.org/I79189158"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.1007/s13389-022-00286-x","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s13389-022-00286-x","pdf_url":"https://link.springer.com/content/pdf/10.1007/s13389-022-00286-x.pdf","source":{"id":"https://openalex.org/S2764800400","display_name":"Journal of Cryptographic Engineering","issn_l":"2190-8508","issn":["2190-8508","2190-8516"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cryptographic Engineering","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6800000071525574}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4214668663.pdf","grobid_xml":"https://content.openalex.org/works/W4214668663.grobid-xml"},"referenced_works_count":23,"referenced_works":["https://openalex.org/W1425736675","https://openalex.org/W1481080270","https://openalex.org/W1592625985","https://openalex.org/W1847989447","https://openalex.org/W1980279697","https://openalex.org/W2038571804","https://openalex.org/W2061108769","https://openalex.org/W2161740631","https://openalex.org/W2187204584","https://openalex.org/W2504274129","https://openalex.org/W2536698892","https://openalex.org/W2612816951","https://openalex.org/W2767304336","https://openalex.org/W2795180100","https://openalex.org/W2809909270","https://openalex.org/W2894097363","https://openalex.org/W2934725803","https://openalex.org/W3043385097","https://openalex.org/W3184500914","https://openalex.org/W4237902866","https://openalex.org/W4241617894","https://openalex.org/W4252227927","https://openalex.org/W4253729258"],"related_works":["https://openalex.org/W3081694532","https://openalex.org/W1969211203","https://openalex.org/W1517958729","https://openalex.org/W2092272653","https://openalex.org/W1980230116","https://openalex.org/W4387002515","https://openalex.org/W1992704972","https://openalex.org/W2002555665","https://openalex.org/W4253723665","https://openalex.org/W4390188610"],"abstract_inverted_index":{"Abstract":[0],"In":[1,68],"the":[2,14,40,84,102,123,139],"context":[3],"of":[4,16,43,76,87,104,117,125,142],"side-channel":[5],"attacks":[6],"against":[7],"cryptographic":[8,144],"circuits,":[9],"t":[10,26],"-probing":[11],"security":[12,42,141],"characterizes":[13],"amount":[15],"information":[17],"derivable":[18],"about":[19,57,80,101],"sensitive":[20],"values":[21],"(e.g.,":[22],"keys)":[23],"by":[24,36,82],"observing":[25],"output/internal":[27],"values.":[28],"Non-interference":[29],"is":[30],"a":[31,44,73,88,96,105,113],"useful":[32],"mathematical":[33],"tool":[34],"used":[35],"researchers":[37],"to":[38,50,78,137],"assess":[39],"probing":[41,140],"circuit":[45],"which":[46],"employs":[47],"Boolean":[48,89],"masking":[49],"protect":[51],"itself":[52],"from":[53],"attacks.":[54],"However,":[55],"reasoning":[56,100],"non-interference":[58],"still":[59],"requires":[60],"either":[61],"difficult":[62],"ratiocination":[63],"or":[64],"complex":[65],"automatic":[66],"tools.":[67],"this":[69,92,110,132],"work,":[70],"we":[71,94,129],"propose":[72],"novel":[74],"point":[75],"view":[77],"reason":[79],"non-interference,":[81],"exploiting":[83],"Walsh":[85],"transform":[86],"function.":[90],"To":[91],"end,":[93],"introduce":[95],"calculus":[97],"for":[98,122],"mechanically":[99],"shares":[103],"variable":[106],"and":[107],"show":[108,130],"that":[109],"formalism":[111,133],"provides":[112],"lean":[114],"algebraic":[115],"explanation":[116],"known":[118,143],"compositional":[119],"patterns":[120],"allowing":[121],"discovery":[124],"new":[126],"ones.":[127],"Eventually,":[128],"how":[131],"can":[134],"be":[135],"applied":[136],"study":[138],"gadgets.":[145]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2022-03-02T00:00:00"}
