{"id":"https://openalex.org/W4294325141","doi":"https://doi.org/10.46586/tches.v2022.i4.693-717","title":"Riding the Waves Towards Generic Single-Cycle Masking in Hardware","display_name":"Riding the Waves Towards Generic Single-Cycle Masking in Hardware","publication_year":2022,"publication_date":"2022-08-31","ids":{"openalex":"https://openalex.org/W4294325141","doi":"https://doi.org/10.46586/tches.v2022.i4.693-717"},"language":"en","primary_location":{"id":"doi:10.46586/tches.v2022.i4.693-717","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2022.i4.693-717","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/9837/9340","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://tches.iacr.org/index.php/TCHES/article/download/9837/9340","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064280287","display_name":"Rishub Nagpal","orcid":"https://orcid.org/0000-0003-2756-2065"},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Rishub Nagpal","raw_affiliation_strings":["Lamarr Security Research GmbH, Graz, Austria; Institute for Applied Information Processing and Communication (IAIK), Graz University of Technology, Graz, Austria","Lamarr Security Research GmbH, Graz, Austria","Institute for Applied Information Processing and Communication (IAIK), Graz University of Technology, Graz, Austria"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Lamarr Security Research GmbH, Graz, Austria; Institute for Applied Information Processing and Communication (IAIK), Graz University of Technology, Graz, Austria","institution_ids":["https://openalex.org/I4092182"]},{"raw_affiliation_string":"Lamarr Security Research GmbH, Graz, Austria","institution_ids":[]},{"raw_affiliation_string":"Institute for Applied Information Processing and Communication (IAIK), Graz University of Technology, Graz, Austria","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082629635","display_name":"Barbara Gigerl","orcid":"https://orcid.org/0000-0002-7373-9493"},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Barbara Gigerl","raw_affiliation_strings":["Institute for Applied Information Processing and Communication (IAIK), Graz University of Technology, Graz, Austria"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Institute for Applied Information Processing and Communication (IAIK), Graz University of Technology, Graz, Austria","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076967039","display_name":"Robert Primas","orcid":"https://orcid.org/0000-0002-9569-8477"},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Robert Primas","raw_affiliation_strings":["Institute for Applied Information Processing and Communication (IAIK), Graz University of Technology, Graz, Austria"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Institute for Applied Information Processing and Communication (IAIK), Graz University of Technology, Graz, Austria","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015437576","display_name":"Stefan Mangard","orcid":"https://orcid.org/0000-0001-9650-8041"},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Stefan Mangard","raw_affiliation_strings":["Lamarr Security Research GmbH, Graz, Austria; Institute for Applied Information Processing and Communication (IAIK), Graz University of Technology, Graz, Austria","Institute for Applied Information Processing and Communication (IAIK), Graz University of Technology, Graz, Austria","Lamarr Security Research GmbH, Graz, Austria"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Lamarr Security Research GmbH, Graz, Austria; Institute for Applied Information Processing and Communication (IAIK), Graz University of Technology, Graz, Austria","institution_ids":["https://openalex.org/I4092182"]},{"raw_affiliation_string":"Institute for Applied Information Processing and Communication (IAIK), Graz University of Technology, Graz, Austria","institution_ids":["https://openalex.org/I4092182"]},{"raw_affiliation_string":"Lamarr Security Research GmbH, Graz, Austria","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5064280287"],"corresponding_institution_ids":["https://openalex.org/I4092182"],"apc_list":null,"apc_paid":null,"fwci":1.9435,"has_fulltext":true,"cited_by_count":14,"citation_normalized_percentile":{"value":0.88173815,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"693","last_page":"717"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7899998426437378},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6062073111534119},{"id":"https://openalex.org/keywords/electronic-circuit","display_name":"Electronic circuit","score":0.562856137752533},{"id":"https://openalex.org/keywords/synchronization","display_name":"Synchronization (alternating current)","score":0.5412092208862305},{"id":"https://openalex.org/keywords/masking","display_name":"Masking (illustration)","score":0.5236679911613464},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.5104426145553589},{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.5072552561759949},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.5005099773406982},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.43941304087638855},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.42771369218826294},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.22632324695587158},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.15194115042686462},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.14042255282402039},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.0932198166847229}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7899998426437378},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6062073111534119},{"id":"https://openalex.org/C134146338","wikidata":"https://www.wikidata.org/wiki/Q1815901","display_name":"Electronic circuit","level":2,"score":0.562856137752533},{"id":"https://openalex.org/C2778562939","wikidata":"https://www.wikidata.org/wiki/Q1298791","display_name":"Synchronization (alternating current)","level":3,"score":0.5412092208862305},{"id":"https://openalex.org/C2777402240","wikidata":"https://www.wikidata.org/wiki/Q6783436","display_name":"Masking (illustration)","level":2,"score":0.5236679911613464},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.5104426145553589},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.5072552561759949},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.5005099773406982},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.43941304087638855},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.42771369218826294},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.22632324695587158},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.15194115042686462},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.14042255282402039},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0932198166847229},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.46586/tches.v2022.i4.693-717","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2022.i4.693-717","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/9837/9340","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:4281b992ec8943319dc20e2026cf98c5","is_oa":false,"landing_page_url":"https://doaj.org/article/4281b992ec8943319dc20e2026cf98c5","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Transactions on Cryptographic Hardware and Embedded Systems, Vol 2022, Iss 4 (2022)","raw_type":"article"},{"id":"pmh:oai:doaj.org/article:7e50fa3d807f49a997c87558938c5f0c","is_oa":false,"landing_page_url":"https://doaj.org/article/7e50fa3d807f49a997c87558938c5f0c","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Transactions on Cryptographic Hardware and Embedded Systems, Vol 2022, Iss 4 (2022)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.46586/tches.v2022.i4.693-717","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2022.i4.693-717","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/9837/9340","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G523495190","display_name":"Securing Software against Physical Attacks","funder_award_id":"681402","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G7842005466","display_name":null,"funder_award_id":"Horizon 2020","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320310430","display_name":"TU Graz, Internationale Beziehungen und Mobilit\u00e4tsprogramme","ror":"https://ror.org/00d7xrm67"},{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4294325141.pdf","grobid_xml":"https://content.openalex.org/works/W4294325141.grobid-xml"},"referenced_works_count":34,"referenced_works":["https://openalex.org/W211399846","https://openalex.org/W1514993642","https://openalex.org/W1575446397","https://openalex.org/W1592625985","https://openalex.org/W1703129327","https://openalex.org/W1724890242","https://openalex.org/W1982882557","https://openalex.org/W2051041430","https://openalex.org/W2071290994","https://openalex.org/W2149174385","https://openalex.org/W2154909745","https://openalex.org/W2176568615","https://openalex.org/W2556763991","https://openalex.org/W2570230384","https://openalex.org/W2583522611","https://openalex.org/W2617458104","https://openalex.org/W2740740730","https://openalex.org/W2758799253","https://openalex.org/W2769808448","https://openalex.org/W2791747042","https://openalex.org/W2807166278","https://openalex.org/W2896450231","https://openalex.org/W2902280009","https://openalex.org/W2954479288","https://openalex.org/W3042770083","https://openalex.org/W3088704016","https://openalex.org/W3096767560","https://openalex.org/W3198058250","https://openalex.org/W3198521247","https://openalex.org/W3211234604","https://openalex.org/W4231098049","https://openalex.org/W4231286867","https://openalex.org/W4289659621","https://openalex.org/W4391285994"],"related_works":["https://openalex.org/W2793847091","https://openalex.org/W2912325400","https://openalex.org/W2952746059","https://openalex.org/W2142274949","https://openalex.org/W2949403411","https://openalex.org/W3123720978","https://openalex.org/W1515909117","https://openalex.org/W84597634","https://openalex.org/W4378192120","https://openalex.org/W2560330557"],"abstract_inverted_index":{"Research":[0],"on":[1,15,142,148,274],"the":[2,10,41,65,73,81,85,111,149,153,208,265,338],"design":[3,230],"of":[4,43,58,75,84,113,152,172,188,201,238,247,259,281,341],"masked":[5,44,61,170,202],"cryptographic":[6,101,173],"hardware":[7,45,62,171],"circuits":[8,46,63,233,267,272],"in":[9,60,223,236,245,306],"past":[11],"has":[12],"mostly":[13],"focused":[14],"reducing":[16],"area":[17,248],"and":[18,28,162,217,249,261,263,277,290,350],"randomness":[19,308],"requirements.":[20],"However,":[21],"many":[22,53,107],"embedded":[23],"devices":[24],"like":[25,118],"smart":[26],"cards":[27],"IoT":[29],"nodes":[30],"also":[31,47,331,336],"need":[32,66],"to":[33,94,177,192,229,256,268,287,295,314],"meet":[34],"certain":[35],"performance":[36],"criteria,":[37],"which":[38],"is":[39,64,191,285,325],"why":[40],"latency":[42,59,131,270,280],"represents":[48],"an":[49],"important":[50],"metric":[51],"for":[52,67,165,309],"practical":[54,339],"applications.The":[55],"root":[56],"cause":[57],"additional":[68],"register":[69,194],"stages":[70,195],"that":[71,127,204,214],"synchronize":[72],"propagation":[74],"shares.":[76],"Otherwise,":[77],"glitches":[78],"would":[79],"violate":[80],"basic":[82],"assumptions":[83,147],"used":[86,222],"masking":[87,143,227],"scheme.":[88],"This":[89],"issue":[90],"can":[91,220],"be":[92,221],"addressed":[93],"some":[95],"extent,":[96],"e.g.,":[97],"by":[98,330],"using":[99],"lightweight":[100],"algorithms":[102],"with":[103,115,136,196,225,301],"low-degree":[104],"Sboxes,":[105],"however,":[106],"applications":[108],"still":[109],"require":[110],"usage":[112],"schemes":[114,228],"higher-degree":[116,239],"S-boxes":[117,258],"AES.":[119],"Several":[120],"recent":[121],"works":[122],"have":[123,241],"already":[124],"proposed":[125],"solutions":[126],"help":[128],"reduce":[129],"this":[130,156,178],"yet":[132],"they":[133],"either":[134],"come":[135],"noticeably":[137,242],"increased":[138],"area/randomness":[139],"requirements,":[140],"limitations":[141],"orders,":[144],"or":[145],"specific":[146],"general":[150],"architecture":[151],"crypto":[154],"core.In":[155],"work,":[157],"we":[158,212],"introduce":[159],"a":[160,197,302],"generic":[161],"efficient":[163],"method":[164,255],"designing":[166],"single-cycle":[167,231,288],"glitch-resistant":[168],"(higher-order)":[169],"S-boxes.":[174],"We":[175,252,335],"refer":[176],"technique":[179],"as":[180],"(generic)":[181],"Self-Synchronized":[182],"Masking":[183],"(\u201cSESYM\u201d).":[184],"The":[185,279],"main":[186],"idea":[187],"our":[189,254,298,318,342],"approach":[190,299,319],"replace":[193],"partial":[198],"dual-rail":[199],"encoding":[200],"signals":[203],"ensures":[205],"synchronization":[206],"within":[207],"circuit.":[209],"More":[210],"concretely,":[211],"show":[213],"WDDL":[215],"gates":[216],"Muller":[218],"C-elements":[219],"combination":[224],"standard":[226],"S-box":[232],"that,":[234],"especially":[235],"case":[237],"S-boxes,":[240],"lower":[243],"requirements":[244],"terms":[246],"online":[250,307],"randomness.":[251],"apply":[253],"DOM-based":[257],"Ascon":[260],"AES":[262],"compare":[264],"resulting":[266],"existing":[269],"optimized":[271],"based":[273],"TI,":[275],"GLM,":[276],"LMDPL.":[278],"all":[282,310],"three":[283],"designs":[284],"reduced":[286],"operation":[289],"are":[291],"dth-order":[292],"secure.":[293],"Compared":[294,313],"GLM-masked":[296],"Ascon,":[297],"comes":[300],"6.4":[303],"times":[304],"reduction":[305],"protection":[311,340],"orders.":[312],"1st-order":[315],"LMDPL-masked":[316],"AES,":[317],"achieves":[320],"comparable":[321],"results,":[322],"while":[323],"it":[324],"more":[326],"generic,":[327],"amongst":[328],"others,":[329],"supporting":[332],"higher-order":[333],"designs.":[334],"underline":[337],"constructions":[343],"against":[344],"power":[345],"analysis":[346],"attacks":[347],"via":[348],"empirical":[349],"formal":[351],"verification":[352],"approaches.":[353]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":5}],"updated_date":"2026-05-09T13:55:54.758798","created_date":"2025-10-10T00:00:00"}
