M. Ajtai, Secure computation with information leaking to an adversary, Proceedings of the 43rd annual ACM symposium on Theory of computing - STOC '11, pp.715-724, 2011.

P. Ananth, Y. Ishai, and A. Sahai, Private Circuits: A Modular Approach, Lecture Notes in Computer Science, vol.10993, pp.427-455, 2018.

M. Andrychowicz, S. Dziembowski, and S. Faust, Circuit Compilers with $$O(1/\log (n))$$ O ( 1 / log ( n ) ) Leakage Rate, Advances in Cryptology ? EUROCRYPT 2016, vol.9666, pp.586-615, 2016.

G. Barthe, S. Belaïd, F. Dupressoir, P. Fouque, B. Grégoire et al., Verified Proofs of Higher-Order Masking, Advances in Cryptology -- EUROCRYPT 2015, vol.9056, pp.457-485, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01216699

G. Barthe, S. Belaïd, F. Dupressoir, P. Fouque, B. Grégoire et al., Strong Non-Interference and Type-Directed Higher-Order Masking, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp.116-129, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01410216

G. Barthe, F. Dupressoir, S. Faust, B. Grégoire, F. Standaert et al., Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model, Lecture Notes in Computer Science, vol.10210, pp.535-566, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01414009

A. Battistello, J. Coron, E. Prouff, and R. Zeitoun, Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme, Lecture Notes in Computer Science, vol.9813, pp.23-39, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01399577

S. Belaïd, F. Benhamouda, A. Passelègue, E. Prouff, A. Thillard et al., Randomness Complexity of Private Circuits for Multiplication, Advances in Cryptology ? EUROCRYPT 2016, vol.9666, pp.616-648, 2016.

S. Belaïd, F. Benhamouda, A. Passelègue, E. Prouff, A. Thillard et al., Private Multiplication over Finite Fields, Advances in Cryptology ? CRYPTO 2017, vol.10403, pp.397-426, 2017.

S. Belaïd, P. Dagand, D. Mercadier, M. Rivain, and R. Wintersdorff, Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations, Advances in Cryptology ? EUROCRYPT 2020, vol.12107, pp.311-341, 2020.

S. Belaïd, D. Goudarzi, and M. Rivain, Tight Private Circuits: Achieving Probing Security with the Least Refreshing, Lecture Notes in Computer Science, vol.11273, pp.343-372, 2018.

S. Chari, C. S. Jutla, J. R. Rao, and P. Rohatgi, Towards Sound Approaches to Counteract Power-Analysis Attacks, Advances in Cryptology ? CRYPTO? 99, vol.1666, pp.398-412, 1999.

G. Cohen, I. B. Damgård, Y. Ishai, J. Kölker, P. B. Miltersen et al., Efficient Multiparty Protocols via Log-Depth Threshold Formulae, Advances in Cryptology ? CRYPTO 2013, vol.8043, pp.185-202, 2013.

J. Coron, Formal Verification of Side-Channel Countermeasures via Elementary Circuit Transformations, Applied Cryptography and Network Security, vol.10892, pp.65-82, 2018.

E. Jean-sébastien-coron, M. Prouff, T. Rivain, and . Roche, Higher-order side channel security and mask refreshing, Fast Software Encryption -FSE 2013, vol.8424, pp.410-424, 2014.

I. Damgård and M. Keller, Secure Multiparty AES, Financial Cryptography and Data Security, vol.6052, pp.367-374, 2010.

A. Duc, S. Dziembowski, and S. Faust, Unifying Leakage Models: From Probing Attacks to Noisy Leakage., Advances in Cryptology ? EUROCRYPT 2014, vol.8441, pp.423-440, 2014.

L. Goubin and J. Patarin, DES and Differential Power Analysis The ?Duplication? Method, Cryptographic Hardware and Embedded Systems, vol.1717, pp.158-172, 1999.

M. Hirt and U. M. Maurer, Player Simulation and General Adversary Structures in Perfect Multiparty Computation, Journal of Cryptology, vol.13, issue.1, pp.31-60, 2000.

Y. Ishai, A. Sahai, and D. Wagner, Private Circuits: Securing Hardware against Probing Attacks, Advances in Cryptology - CRYPTO 2003, vol.2729, pp.463-481, 2003.

C. Paul, J. Kocher, B. Jaffe, and . Jun, Differential power analysis, Advances in Cryptology -CRYPTO'99, vol.1666, pp.388-397, 1999.

M. Ueli and . Maurer, Security in Communication Networks, SCN 02: 3rd International Conference on Security in Communication Networks, vol.2576, pp.14-28, 2003.

S. Micali and L. Reyzin, Physically Observable Cryptography, Theory of Cryptography, vol.2951, pp.278-296, 2004.

E. Prouff and M. Rivain, Masking against Side-Channel Attacks: A Formal Security Proof, Advances in Cryptology ? EUROCRYPT 2013, vol.7881, pp.142-159, 2013.

M. Rivain and E. Prouff, Provably Secure Higher-Order Masking of AES, Cryptographic Hardware and Embedded Systems, CHES 2010, vol.6225, pp.413-427, 2010.

, World Federation of Neurology, The British Journal of Radiology, vol.33, issue.392, pp.528-528, 1960.

, 23538, 1857-04-18, {0, vol.27, p.1