{"id":"https://openalex.org/W2927948414","doi":"https://doi.org/10.13154/tches.v2019.i2.256-292","title":"Glitch-Resistant Masking Revisited","display_name":"Glitch-Resistant Masking Revisited","publication_year":2019,"publication_date":"2019-02-28","ids":{"openalex":"https://openalex.org/W2927948414","doi":"https://doi.org/10.13154/tches.v2019.i2.256-292","mag":"2927948414"},"language":"en","primary_location":{"id":"pmh:oai:dial.uclouvain.be:boreal:225487","is_oa":true,"landing_page_url":"http://hdl.handle.net/2078.1/225487","pdf_url":null,"source":{"id":"https://openalex.org/S4306401902","display_name":"Digital Access to Libraries (Universit\u00e9 catholique de Louvain (UCL), l'Universit\u00e9 de Namur (UNamur) and the Universit\u00e9 Saint-Louis (USL-B))","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I95674353","host_organization_name":"UCLouvain","host_organization_lineage":["https://openalex.org/I95674353"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2019, no.2, p. 256-292 (2019)","raw_type":"info:eu-repo/semantics/article"},"type":"article","indexed_in":["datacite","doaj"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://hdl.handle.net/2078.1/225487","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014843693","display_name":"Thorben Moos","orcid":"https://orcid.org/0000-0003-3809-9803"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Moos, Thorben","raw_affiliation_strings":["Horst G\u00f6rtz Institute for IT-Security, Ruhr-Universit\u00e4t Bochum"],"affiliations":[{"raw_affiliation_string":"Horst G\u00f6rtz Institute for IT-Security, Ruhr-Universit\u00e4t Bochum","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012815811","display_name":"Amir Moradi","orcid":"https://orcid.org/0000-0002-4032-7433"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Moradi, Amir","raw_affiliation_strings":["Horst G\u00f6rtz Institute for IT-Security, Ruhr-Universit\u00e4t Bochum"],"affiliations":[{"raw_affiliation_string":"Horst G\u00f6rtz Institute for IT-Security, Ruhr-Universit\u00e4t Bochum","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101961426","display_name":"Tobias Schneider","orcid":"https://orcid.org/0000-0002-6849-5949"},"institutions":[{"id":"https://openalex.org/I95674353","display_name":"UCLouvain","ror":"https://ror.org/02495e989","country_code":"BE","type":"education","lineage":["https://openalex.org/I95674353"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Schneider, Tobias","raw_affiliation_strings":["ICTEAM/ELEN/Crypto Group, Universit\u00e9 catholique de Louvain"],"affiliations":[{"raw_affiliation_string":"ICTEAM/ELEN/Crypto Group, Universit\u00e9 catholique de Louvain","institution_ids":["https://openalex.org/I95674353"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070542865","display_name":"Fran\u00e7ois\u2010Xavier Standaert","orcid":"https://orcid.org/0000-0001-7444-0285"},"institutions":[{"id":"https://openalex.org/I95674353","display_name":"UCLouvain","ror":"https://ror.org/02495e989","country_code":"BE","type":"education","lineage":["https://openalex.org/I95674353"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Standaert, Fran\u00e7ois-Xavier","raw_affiliation_strings":["ICTEAM/ELEN/Crypto Group, Universit\u00e9 catholique de Louvain"],"affiliations":[{"raw_affiliation_string":"ICTEAM/ELEN/Crypto Group, Universit\u00e9 catholique de Louvain","institution_ids":["https://openalex.org/I95674353"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5014843693"],"corresponding_institution_ids":["https://openalex.org/I904495901"],"apc_list":null,"apc_paid":null,"fwci":1.5913,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.87521237,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9794999957084656,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/glitch","display_name":"Glitch","score":0.9105501770973206},{"id":"https://openalex.org/keywords/masking","display_name":"Masking (illustration)","score":0.7374241352081299},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3473154902458191},{"id":"https://openalex.org/keywords/art","display_name":"Art","score":0.20102232694625854},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11465036869049072},{"id":"https://openalex.org/keywords/literature","display_name":"Literature","score":0.04834428429603577}],"concepts":[{"id":"https://openalex.org/C191287063","wikidata":"https://www.wikidata.org/wiki/Q543281","display_name":"Glitch","level":3,"score":0.9105501770973206},{"id":"https://openalex.org/C2777402240","wikidata":"https://www.wikidata.org/wiki/Q6783436","display_name":"Masking (illustration)","level":2,"score":0.7374241352081299},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3473154902458191},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.20102232694625854},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11465036869049072},{"id":"https://openalex.org/C124952713","wikidata":"https://www.wikidata.org/wiki/Q8242","display_name":"Literature","level":1,"score":0.04834428429603577},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"pmh:oai:dial.uclouvain.be:boreal:225487","is_oa":true,"landing_page_url":"http://hdl.handle.net/2078.1/225487","pdf_url":null,"source":{"id":"https://openalex.org/S4306401902","display_name":"Digital Access to Libraries (Universit\u00e9 catholique de Louvain (UCL), l'Universit\u00e9 de Namur (UNamur) and the Universit\u00e9 Saint-Louis (USL-B))","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I95674353","host_organization_name":"UCLouvain","host_organization_lineage":["https://openalex.org/I95674353"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2019, no.2, p. 256-292 (2019)","raw_type":"info:eu-repo/semantics/article"},{"id":"pmh:oai:doaj.org/article:c5675184ad3b4836b5bdb6d9693ae705","is_oa":true,"landing_page_url":"https://doaj.org/article/c5675184ad3b4836b5bdb6d9693ae705","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Transactions on Cryptographic Hardware and Embedded Systems, Vol 2019, Iss 2 (2019)","raw_type":"article"},{"id":"doi:10.13154/tches.v2019.i2.256-292","is_oa":true,"landing_page_url":"https://doi.org/10.13154/tches.v2019.i2.256-292","pdf_url":null,"source":{"id":"https://openalex.org/S7407052971","display_name":"UB Bochum","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"pmh:oai:dial.uclouvain.be:boreal:225487","is_oa":true,"landing_page_url":"http://hdl.handle.net/2078.1/225487","pdf_url":null,"source":{"id":"https://openalex.org/S4306401902","display_name":"Digital Access to Libraries (Universit\u00e9 catholique de Louvain (UCL), l'Universit\u00e9 de Namur (UNamur) and the Universit\u00e9 Saint-Louis (USL-B))","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I95674353","host_organization_name":"UCLouvain","host_organization_lineage":["https://openalex.org/I95674353"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2019, no.2, p. 256-292 (2019)","raw_type":"info:eu-repo/semantics/article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5699999928474426}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4200114095","https://openalex.org/W1918586957","https://openalex.org/W4321353912","https://openalex.org/W3133865019","https://openalex.org/W2005165833","https://openalex.org/W2129401784","https://openalex.org/W2076676192","https://openalex.org/W2781863968","https://openalex.org/W2903908145","https://openalex.org/W2154831879"],"abstract_inverted_index":{"Implementing":[0],"the":[1,19,31,62,92,108,116,150,158,171,187,222,230,249,267,273],"masking":[2,94],"countermeasure":[3],"in":[4,59,64,107,186,272],"hardware":[5],"is":[6],"a":[7,88,113,255,264,278],"delicate":[8],"task.":[9],"Various":[10],"solutions":[11],"have":[12,69],"been":[13,71,102],"proposed":[14],"for":[15,128,143,254,266],"this":[16,134,139,164],"purpose":[17],"over":[18],"last":[20],"years:":[21],"we":[22,136,166,258],"focus":[23],"on":[24,229],"Threshold":[25],"Implementations":[26],"(TIs),":[27],"Domain-Oriented":[28],"Masking":[29,33,40],"(DOM),":[30],"Unified":[32],"Approach":[34],"(UMA)":[35],"and":[36,58,78,99,105,147,200,220],"Generic":[37],"Low":[38],"Latency":[39],"(GLM).":[41],"The":[42],"latter":[43],"generally":[44],"come":[45],"with":[46,51,246],"innovative":[47],"ideas":[48],"to":[49,61,120,192,238,248],"cope":[50],"physical":[52,122],"defaults":[53,123],"such":[54,124],"as":[55,125,157],"glitches.":[56],"Yet,":[57],"contrast":[60],"situation":[63],"software-oriented":[65],"masking,":[66],"these":[67,176,212,261],"schemes":[68,177],"not":[70,235],"formally":[72],"proven":[73],"at":[74,241,281],"arbitrary":[75],"security":[76,154,184,227,243,270,283],"orders":[77],"their":[79,153],"composability":[80,199],"properties":[81],"were":[82],"left":[83],"unclear.":[84],"So":[85],"far,":[86],"only":[87],"2-cycle":[89],"implementation":[90],"of":[91,115,131,141,152,160,174,232,252,269],"seminal":[93],"scheme":[95],"by":[96,180],"Ishai,":[97],"Sahai":[98],"Wagner":[100],"has":[101],"shown":[103],"secure":[104],"composable":[106],"robust":[109,225,274],"probing":[110,117,189,226,275],"model":[111,118,276],"\u2013":[112,127],"variation":[114],"aimed":[119],"capture":[121],"glitches":[126,203],"any":[129],"number":[130,159,251],"shares.":[132],"In":[133],"paper,":[135],"argue":[137,259],"that":[138,170,198,260],"lack":[140],"proofs":[142,271],"TIs,":[144],"DOM,":[145],"UMA":[146],"GLM":[148],"makes":[149],"interpretation":[151],"guarantees":[155],"difficult":[156],"shares":[161],"increases.":[162],"For":[163],"purpose,":[165],"first":[167],"put":[168],"forward":[169],"higher-order":[172],"variants":[173],"all":[175],"are":[178],"affected":[179],"(local":[181],"or":[182],"composability)":[183],"flaws":[185,214],"(robust)":[188],"model,":[190],"due":[191],"insufficient":[193],"refreshing.":[194],"We":[195,208],"then":[196],"show":[197],"robustness":[201],"against":[202],"cannot":[204],"be":[205],"analyzed":[206],"independently.":[207],"finally":[209],"detail":[210],"how":[211],"abstract":[213],"translate":[215],"into":[216],"concrete":[217],"(experimental)":[218],"attacks,":[219],"discuss":[221],"additional":[223],"constraints":[224],"implies":[228],"need":[231,268],"registers.":[233],"Despite":[234],"systematically":[236],"leading":[237],"improved":[239],"complexities":[240],"low":[242],"orders,":[244],"e.g.,":[245],"respect":[247],"required":[250],"measurements":[253],"successful":[256],"attack,":[257],"weaknesses":[262],"provide":[263],"case":[265],"(or":[277],"similar":[279],"abstraction)":[280],"higher":[282],"orders.":[284]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":6}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2019-04-11T00:00:00"}
