{"id":"https://openalex.org/W2035391051","doi":"https://doi.org/10.1515/jmc-2012-0018","title":"Leakage squeezing: Optimal implementation and security evaluation","display_name":"Leakage squeezing: Optimal implementation and security evaluation","publication_year":2014,"publication_date":"2014-06-07","ids":{"openalex":"https://openalex.org/W2035391051","doi":"https://doi.org/10.1515/jmc-2012-0018","mag":"2035391051"},"language":"en","primary_location":{"id":"doi:10.1515/jmc-2012-0018","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jmc-2012-0018","pdf_url":"https://www.degruyter.com/document/doi/10.1515/jmc-2012-0018/pdf","source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Mathematical Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://www.degruyter.com/document/doi/10.1515/jmc-2012-0018/pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088687711","display_name":"Claude Carlet","orcid":"https://orcid.org/0000-0002-6118-7927"},"institutions":[{"id":"https://openalex.org/I4210091279","display_name":"Universit\u00e9 Sorbonne Paris Nord","ror":"https://ror.org/0199hds37","country_code":"FR","type":"education","lineage":["https://openalex.org/I4210091279"]},{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"government","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I48825208","display_name":"Universit\u00e9 Paris 8","ror":"https://ror.org/04wez5e68","country_code":"FR","type":"education","lineage":["https://openalex.org/I48825208"]},{"id":"https://openalex.org/I4210102686","display_name":"Laboratoire Analyse, G\u00e9om\u00e9trie et Applications","ror":"https://ror.org/018nzqy79","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I4210091279","https://openalex.org/I4210102686","https://openalex.org/I4210141950","https://openalex.org/I48825208"]},{"id":"https://openalex.org/I102197404","display_name":"Universit\u00e9 Paris-Sud","ror":"https://ror.org/028rypz17","country_code":"FR","type":"education","lineage":["https://openalex.org/I102197404"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Claude Carlet","raw_affiliation_strings":["LAGA, UMR 7539, CNRS, University of Paris XIII and University of Paris VIII, 2 rue de la libert\u00e9, 93526 Saint-Denis Cedex, France"],"affiliations":[{"raw_affiliation_string":"LAGA, UMR 7539, CNRS, University of Paris XIII and University of Paris VIII, 2 rue de la libert\u00e9, 93526 Saint-Denis Cedex, France","institution_ids":["https://openalex.org/I1294671590","https://openalex.org/I4210091279","https://openalex.org/I48825208","https://openalex.org/I102197404","https://openalex.org/I4210102686"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054213189","display_name":"Jean\u2010Luc Danger","orcid":"https://orcid.org/0000-0001-5063-7964"},"institutions":[{"id":"https://openalex.org/I12356871","display_name":"T\u00e9l\u00e9com Paris","ror":"https://ror.org/01naq7912","country_code":"FR","type":"education","lineage":["https://openalex.org/I12356871","https://openalex.org/I205703379","https://openalex.org/I4210145102"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Jean-Luc Danger","raw_affiliation_strings":["TELECOM-ParisTech, Crypto Group, 37/39 rue Dareau, 75634 Paris Cedex 13; and Secure-IC S.A.S., 80 avenue des Buttes de Co\u00ebsmes, 35700 Rennes, France"],"affiliations":[{"raw_affiliation_string":"TELECOM-ParisTech, Crypto Group, 37/39 rue Dareau, 75634 Paris Cedex 13; and Secure-IC S.A.S., 80 avenue des Buttes de Co\u00ebsmes, 35700 Rennes, France","institution_ids":["https://openalex.org/I12356871"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008439372","display_name":"Sylvain Guilley","orcid":"https://orcid.org/0000-0002-5044-3534"},"institutions":[{"id":"https://openalex.org/I12356871","display_name":"T\u00e9l\u00e9com Paris","ror":"https://ror.org/01naq7912","country_code":"FR","type":"education","lineage":["https://openalex.org/I12356871","https://openalex.org/I205703379","https://openalex.org/I4210145102"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Sylvain Guilley","raw_affiliation_strings":["TELECOM-ParisTech, Crypto Group, 37/39 rue Dareau, 75634 Paris Cedex 13; and Secure-IC S.A.S., 80 avenue des Buttes de Co\u00ebsmes, 35700 Rennes, France"],"affiliations":[{"raw_affiliation_string":"TELECOM-ParisTech, Crypto Group, 37/39 rue Dareau, 75634 Paris Cedex 13; and Secure-IC S.A.S., 80 avenue des Buttes de Co\u00ebsmes, 35700 Rennes, France","institution_ids":["https://openalex.org/I12356871"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044158966","display_name":"Houssem Maghrebi","orcid":null},"institutions":[{"id":"https://openalex.org/I190752583","display_name":"ParisTech","ror":"https://ror.org/05c2qg481","country_code":"FR","type":"education","lineage":["https://openalex.org/I190752583"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Houssem Maghrebi","raw_affiliation_strings":["TELECOM-ParisTech, Crypto Group, 37/39 rue Dareau, 75634 Paris Cedex 13; and MORPHO, 18 chauss\u00e9e Jules C\u00e9sar, 95520 Osny, France"],"affiliations":[{"raw_affiliation_string":"TELECOM-ParisTech, Crypto Group, 37/39 rue Dareau, 75634 Paris Cedex 13; and MORPHO, 18 chauss\u00e9e Jules C\u00e9sar, 95520 Osny, France","institution_ids":["https://openalex.org/I190752583"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5088687711"],"corresponding_institution_ids":["https://openalex.org/I102197404","https://openalex.org/I1294671590","https://openalex.org/I4210091279","https://openalex.org/I4210102686","https://openalex.org/I48825208"],"apc_list":{"value":1000,"currency":"EUR","value_usd":1078},"apc_paid":{"value":1000,"currency":"EUR","value_usd":1078},"fwci":2.4541,"has_fulltext":true,"cited_by_count":17,"citation_normalized_percentile":{"value":0.90669305,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"8","issue":"3","first_page":"249","last_page":"295"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bijection","display_name":"Bijection","score":0.8506479263305664},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.7677065134048462},{"id":"https://openalex.org/keywords/hamming-weight","display_name":"Hamming weight","score":0.6435515880584717},{"id":"https://openalex.org/keywords/offset","display_name":"Offset (computer science)","score":0.6296160221099854},{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.6176378726959229},{"id":"https://openalex.org/keywords/hamming-distance","display_name":"Hamming distance","score":0.5801323056221008},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.4771142303943634},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.46560317277908325},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.464780330657959},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.4468480348587036},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.43679118156433105},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.43081557750701904},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.42620429396629333},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.40788352489471436},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4059426486492157},{"id":"https://openalex.org/keywords/hamming-code","display_name":"Hamming code","score":0.3750392496585846},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.36465802788734436},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.28718000650405884},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.23333269357681274},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.16429513692855835}],"concepts":[{"id":"https://openalex.org/C24424167","wikidata":"https://www.wikidata.org/wiki/Q180907","display_name":"Bijection","level":2,"score":0.8506479263305664},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.7677065134048462},{"id":"https://openalex.org/C63361517","wikidata":"https://www.wikidata.org/wiki/Q5645805","display_name":"Hamming weight","level":5,"score":0.6435515880584717},{"id":"https://openalex.org/C175291020","wikidata":"https://www.wikidata.org/wiki/Q1156822","display_name":"Offset (computer science)","level":2,"score":0.6296160221099854},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.6176378726959229},{"id":"https://openalex.org/C193319292","wikidata":"https://www.wikidata.org/wiki/Q272172","display_name":"Hamming distance","level":2,"score":0.5801323056221008},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.4771142303943634},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.46560317277908325},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.464780330657959},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.4468480348587036},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.43679118156433105},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.43081557750701904},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.42620429396629333},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.40788352489471436},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4059426486492157},{"id":"https://openalex.org/C73150493","wikidata":"https://www.wikidata.org/wiki/Q853922","display_name":"Hamming code","level":4,"score":0.3750392496585846},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.36465802788734436},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.28718000650405884},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.23333269357681274},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.16429513692855835},{"id":"https://openalex.org/C157125643","wikidata":"https://www.wikidata.org/wiki/Q884707","display_name":"Block code","level":3,"score":0.0},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1515/jmc-2012-0018","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jmc-2012-0018","pdf_url":"https://www.degruyter.com/document/doi/10.1515/jmc-2012-0018/pdf","source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Mathematical Cryptology","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:334c82eed6f945d2bb068362b5a4447c","is_oa":true,"landing_page_url":"https://doaj.org/article/334c82eed6f945d2bb068362b5a4447c","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Mathematical Cryptology, Vol 8, Iss 3, Pp 249-295 (2014)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1515/jmc-2012-0018","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jmc-2012-0018","pdf_url":"https://www.degruyter.com/document/doi/10.1515/jmc-2012-0018/pdf","source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Mathematical Cryptology","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320322322","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2035391051.pdf","grobid_xml":"https://content.openalex.org/works/W2035391051.grobid-xml"},"referenced_works_count":44,"referenced_works":["https://openalex.org/W7685012","https://openalex.org/W71167860","https://openalex.org/W94705146","https://openalex.org/W109405981","https://openalex.org/W130371449","https://openalex.org/W307759903","https://openalex.org/W1499081748","https://openalex.org/W1512363553","https://openalex.org/W1531810027","https://openalex.org/W1541150254","https://openalex.org/W1548656471","https://openalex.org/W1562362230","https://openalex.org/W1562542037","https://openalex.org/W1584807987","https://openalex.org/W1606480398","https://openalex.org/W1668897352","https://openalex.org/W1740609432","https://openalex.org/W1748081333","https://openalex.org/W1752847028","https://openalex.org/W1980279697","https://openalex.org/W2014766330","https://openalex.org/W2096434182","https://openalex.org/W2107377972","https://openalex.org/W2112244944","https://openalex.org/W2124785100","https://openalex.org/W2134620466","https://openalex.org/W2141841663","https://openalex.org/W2145267250","https://openalex.org/W2145881907","https://openalex.org/W2160893622","https://openalex.org/W2161740631","https://openalex.org/W2163432699","https://openalex.org/W2173356534","https://openalex.org/W2178161958","https://openalex.org/W2247006822","https://openalex.org/W2248552015","https://openalex.org/W2504274129","https://openalex.org/W2614080401","https://openalex.org/W3031869162","https://openalex.org/W3104417989","https://openalex.org/W4244617962","https://openalex.org/W4298876800","https://openalex.org/W6605577574","https://openalex.org/W6629118211"],"related_works":["https://openalex.org/W2008960744","https://openalex.org/W2130011722","https://openalex.org/W2105471374","https://openalex.org/W2963549154","https://openalex.org/W2158117886","https://openalex.org/W1987803429","https://openalex.org/W1582340598","https://openalex.org/W2152162311","https://openalex.org/W1530654122","https://openalex.org/W2507607395"],"abstract_inverted_index":{"Abstract":[0],"Hardware":[1],"devices":[2],"can":[3,39,83,128,254,287],"be":[4,41,84,129,255,288,380],"protected":[5],"against":[6,355],"side-channel":[7,45,126],"attacks":[8,359],"by":[9,86,141],"introducing":[10],"one":[11,225,341],"random":[12],"mask":[13,95,226,264,342],"per":[14],"sensitive":[15],"variable.":[16],"The":[17],"computation":[18],"throughout":[19,229],"is":[20,46,62,227,265,291,377],"unaltered":[21],"if":[22,43],"the":[23,44,55,75,81,87,94,102,105,119,124,143,148,153,177,205,230,270,278,284,294,312,335,375,387,392],"shares":[24,149],"(masked":[25],"variable":[26],"and":[27,150],"mask)":[28],"are":[29,218,275],"processed":[30],"concomitantly,":[31],"in":[32,78,92,115,145,261,277],"two":[33,56],"distinct":[34],"registers.":[35],"Nonetheless,":[36],"this":[37,49,173],"setup":[38],"still":[40],"attacked":[42],"squared,":[47],"because":[48],"operation":[50],"causes":[51],"an":[52],"interference":[53],"between":[54,104],"shares.":[57],"This":[58,257,330],"more":[59],"sophisticated":[60],"analysis":[61,71],"referred":[63],"to":[64,200,259,340,379,382],"as":[65,347],"a":[66,97,158],"zero-offset":[67,111,182,357],"second-order":[68],"correlation":[69],"power":[70,122],"(CPA)":[72],"attack.":[73],"When":[74],"device":[76],"leaks":[77],"Hamming":[79],"distance,":[80],"countermeasure":[82,376],"improved":[85],"\u201cleakage":[88],"squeezing\u201d.":[89],"It":[90,353],"consists":[91],"manipulating":[93],"through":[96],"bijection,":[98],"aimed":[99],"at":[100,135],"reducing":[101],"dependency":[103],"shares'":[106],"leakage.":[107],"Thus":[108],"d":[109,120,132,189],"th-order":[110],"attacks,":[112],"that":[113,156,180,194,235,338],"consist":[114],"applying":[116],"CPA":[117,184],"on":[118],"th":[121],"of":[123,147,160,186,207,238,269,300,343,360,394],"centered":[125],"traces,":[127],"thwarted":[130],"for":[131,197,220,236,240],"\u2265":[133],"2":[134],"no":[136],"extra":[137],"cost.":[138],"We":[139,191],"denote":[140],"n":[142,239,280],"size":[144,301],"bits":[146],"call":[151],"F":[152,179,198,215,286],"transformation":[154],"function,":[155],"is,":[157],"bijection":[159],"<m:math":[161,302,314,362],"xmlns:m=\"http://www.w3.org/1998/Math/MathML\">":[162,303,315,363],"<m:msubsup>":[163],"<m:mi>\ud835\udd3d</m:mi>":[164],"<m:mn>2</m:mn>":[165,305],"<m:mi>n</m:mi>":[166,306],"</m:msubsup>":[167],"</m:math>":[168,308,325,369],"$\\mathbb":[169],"{F}_2^n$":[170],".":[171,190,373],"In":[172],"paper,":[174],"we":[175,211,233],"explore":[176],"functions":[178],"thwart":[181],"high-order":[183],"(HO-CPA)":[185],"maximal":[187],"order":[188,361],"mathematically":[192],"demonstrate":[193],"optimal":[195,201,213,285,295,336],"choices":[196],"relate":[199],"binary":[202,298],"codes":[203,243],"(in":[204],"sense":[206],"communication":[208],"theory).":[209],"First,":[210],"exhibit":[212],"linear":[214,249],"functions.":[216],"They":[217],"suitable":[219],"masking":[221],"schemes":[222],"where":[223,283,386],"only":[224],"used":[228],"algorithm.":[231],"Second,":[232],"note":[234],"values":[237],"which":[241,262],"non-linear":[242],"exist":[244],"with":[245,334],"better":[246,251],"parameters":[247],"than":[248,391],"ones,":[250],"protection":[252,337],"levels":[253],"obtained.":[256],"applies":[258],"implementations":[260],"each":[263],"randomly":[266],"cast":[267],"independently":[268],"previous":[271],"ones.":[272],"These":[273],"results":[274],"exemplified":[276],"case":[279],"=":[281],"8,":[282],"identified:":[289],"it":[290],"derived":[292],"from":[293],"rate":[296],"1/2":[297],"code":[299],"<m:mrow>":[304,316,364],"</m:mrow>":[307,324,368],"$2n$":[309],",":[310],"namely":[311],"Nordstrom\u2013Robinson":[313],"<m:mo>(</m:mo>":[317],"<m:mn>16</m:mn>":[318],"<m:mo>,</m:mo>":[319,321],"<m:mn>256</m:mn>":[320],"<m:mn>6</m:mn>":[322],"<m:mo>)</m:mo>":[323],"$(16,":[326],"256,":[327],"6)$":[328],"code.":[329],"example":[331],"provides":[332],"explicitly":[333],"limits":[339],"byte-oriented":[344],"algorithms":[345],"such":[346],"AES":[348],"or":[349],"AES-based":[350],"SHA-3":[351],"candidates.":[352],"protects":[354],"all":[356],"HO-CPA":[358],"<m:mi>d</m:mi>":[365],"<m:mo>\u2264</m:mo>":[366],"<m:mn>5</m:mn>":[367],"$d":[370],"\\le":[371],"5$":[372],"Eventually,":[374],"shown":[378],"resilient":[381],"imperfect":[383],"leakage":[384],"models,":[385],"registers":[388],"leak":[389],"differently":[390],"sum":[393],"their":[395],"toggling":[396],"bits.":[397]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2}],"updated_date":"2025-12-07T23:40:59.601060","created_date":"2016-06-24T00:00:00"}
