S. Gilles-barthe, F. Bela¨?dbela¨?d, P. Dupressoir, B. Fouque, and . Grégoire, Compositional verification of higher-order masking: Application to a verifying masking compiler, Cryptology ePrint Archive, vol.506, 2015.

S. Gilles-barthe, F. Bela¨?dbela¨?d, P. Dupressoir, B. Fouque, P. Grégoire et al., Verified proofs of higher-order masking, Advances in Cryptology -EUROCRYPT 2015 -34th Annual International Conference on the Theory and Applications of Cryptographic Techniques Proceedings, Part I, pp.457-485, 2015.

B. Bilgin, S. Gierlichs, V. Nikova, V. R. Nikov, . Kaoshiung et al., Higher-order threshold implementations Safeguarding cryptographic keys, Advances in Cryptology -ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security Proceedings, Part II National Comp. Conf., volume, pp.326-343, 1979.
DOI : 10.1007/978-3-662-45608-8_18

URL : http://doc.utwente.nl/92489/1/chp_10.1007_978-3-662-45608-8_18.pdf

C. Carlet, L. Goubin, E. Prouff, M. Quisquater, and M. Rivain, Higher-Order Masking Schemes for S-Boxes, Lecture Notes in Computer Science, vol.7549, pp.366-384, 2012.
DOI : 10.1007/978-3-642-34047-5_21

A. Jean-sebastien-coron, E. Greuet, R. Prouff, S. Zeitoun-charanjit, J. R. Jutla et al., Faster evaluation of sboxes via common shares Cryptology ePrint Archive Towards sound approaches to counteract power-analysis attacks, CRYPTO, 1999.

J. Coron, Higher Order Masking of Look-Up Tables, Advances in Cryptology -EUROCRYPT 2014 -33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques Proceedings, pp.441-458, 2014.
DOI : 10.1007/978-3-642-55220-5_25

E. Jean-sébastien-coron, M. Prouff, T. Rivain, and . Roche, Higher-Order Side Channel Security and Mask Refreshing, Fast Software Encryption -20th International Workshop, FSE 2013, pp.410-424, 2013.
DOI : 10.1007/978-3-662-43933-3_21

C. Carlet, E. Prouff, M. Rivain, and T. Roche, Algebraic Decomposition for Probing Security, Advances in Cryptology -CRYPTO 2015 - 35th Annual Cryptology Conference Proceedings, Part ICRV14] Jean-Sébastien Coron, Arnab Roy, and Srinivas Vivek Cryptographic Hardware and Embedded Systems -CHES 2014 -16th International Workshop Proceedings, pp.742-763, 2014.
DOI : 10.1007/978-3-662-47989-6_36

A. Duc, S. Dziembowski, S. Faust, [. Gentry, S. Halevi et al., Unifying leakage models: From probing attacks to noisy leakage Homomorphic evaluation of the AES circuit Efficient masked s-boxes processing -A step forward - Private circuits: Securing hardware against probing attacks, Advances in Cryptology -EUROCRYPT 2014 -33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques Proceedings Advances in Cryptology -CRYPTO 2012 -32nd Annual Cryptology Conference Proceedings Progress in Cryptology -AFRICACRYPT 2014 -7th International Conference on Cryptology in Africa Advances in Cryptology -CRYPTO 2003, 23rd Annual International Cryptology Conference ProceedingsKJJ99] P. Kocher, J. Jaffe, and B. Jun. Differential Power Analysis. In M.J, pp.423-440, 2003.

W. Stefan, M. , and K. Schramm, Pinpointing the side-channel leakage of masked AES hardware implementations, Advances in Cryptology ? CRYPTO '99 Cryptographic Hardware and Embedded Systems -CHES 2006, 8th International Workshop Proceedings, volume 4249 of Lecture Notes in Computer Science, pp.388-397, 1999.

S. Nikova, V. Rijmen, and M. Schläffer, Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches, PR11] Emmanuel Prouff and Thomas Roche CHESPR13] Emmanuel Prouff and Matthieu Rivain. Higher-Order Side Channel Security and Mask Refreshing Advances in Cryptology -EUROCRYPT 2013 -32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques Proceedings, pp.292-321, 2011.
DOI : 10.1007/s00145-010-9085-7

O. Reparaz, B. Bilgin, S. Nikova, B. Gierlichs, and I. Verbauwhede, Consolidating Masking Schemes, Advances in Cryptology -CRYPTO 2015 - 35th Annual Cryptology Conference Proceedings, Part I Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, pp.764-783, 2010.
DOI : 10.1007/978-3-662-47989-6_37

A. Roy and S. Vivek, Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012, CHES, pp.417-434, 2013.
DOI : 10.1007/978-3-642-40349-1_24

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979.
DOI : 10.1145/359168.359176