J. Balasch, S. Faust, and B. Gierlichs, Inner Product Masking Revisited, Advances in Cryptology -EUROCRYPT 2015 -34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, vol.9056, pp.486-510, 2015.

J. Balasch, S. Faust, B. Gierlichs, C. Paglialonga, and F. Standaert, Consolidating Inner Product Masking, Advances in Cryptology -ASIACRYPT 2017 -23rd International Conference on the Theory and Applications of Cryptology and Information Security, vol.10624, pp.724-754, 2017.

J. Balasch, S. Faust, B. Gierlichs, and I. Verbauwhede, Theory and Practice of a Leakage Resilient Masking Scheme, Advances in Cryptology -ASIACRYPT 2012 -18th International Conference on the Theory and Application of Cryptology and Information Security, vol.7658, pp.758-775, 2012.

G. Barthe, F. Dupressoir, S. Faust, B. Grégoire, F. Standaert et al., Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model, Advances in Cryptology -EUROCRYPT 2017 -36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, vol.10210, pp.535-566, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01414009

É. Brier, C. Clavier, and F. Olivier, Correlation Power Analysis with a Leakage Model, CHES, vol.3156, pp.16-29, 2004.
URL : https://hal.archives-ouvertes.fr/hal-02487026

É. Brier, C. Clavier, and F. Olivier, Correlation power analysis with a leakage model, Cryptographic Hardware and Embedded Systems -CHES 2004: 6th International Workshop, vol.3156, pp.16-29, 2004.
URL : https://hal.archives-ouvertes.fr/hal-02487026

J. Bringer, C. Carlet, H. Chabanne, S. Guilley, and H. Maghrebi, Orthogonal Direct Sum Masking -A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks, Information Security Theory and Practice. Securing the Internet of Things -8th IFIP WG 11.2 International Workshop, vol.8501, pp.40-56, 2014.

N. Bruneau, S. Guilley, A. Heuser, O. Rioul, ;. Kaoshiung et al., Masks Will Fall Off -Higher-Order Optimal Distinguishers, Advances in Cryptology -ASIACRYPT 2014 -20th International Conference on the Theory and Application of Cryptology and Information Security, vol.8874, pp.344-365, 2014.
URL : https://hal.archives-ouvertes.fr/hal-02287072

. Jean-françois-cardoso and . Dependence, Correlation and Gaussianity in Independent Component Analysis, Journal of Machine Learning Research, vol.4, pp.1177-1203, 2003.

C. Carlet, Boolean Functions for Cryptography and Error Correcting Codes, Chapter of the monography Boolean Models and Methods in Mathematics, Computer Science, and Engineering, pp.257-397

, Preliminary version is, 2010.

C. Carlet, J. Danger, S. Guilley, H. Maghrebi, and E. Prouff, Achieving side-channel high-order correlation immunity with leakage squeezing, J. Cryptographic Engineering, vol.4, issue.2, pp.107-121, 2014.
URL : https://hal.archives-ouvertes.fr/hal-02286851

C. Carlet and S. Guilley, Statistical properties of side-channel and fault injection attacks using coding theory. Cryptography and Communications, vol.10, pp.909-933, 2018.

C. Carlet and P. Guillot, A New Representation of Boolean Functions, Lecture Notes in Computer Science, vol.1719, pp.94-103, 1999.

W. Cheng, S. Guilley, J. Danger, C. Carlet, and S. Mesnager, Optimal Linear Codes for IPM, 2020.

, Application of Attack Potential to Smartcards, Mandatory Technical Document, Version 2.9, vol.2, 2013.

G. Fumaroli, A. Martinelli, E. Prouff, and M. Rivain, Affine Masking against Higher-Order Side Channel Analysis, Selected Areas in Cryptography, vol.6544, pp.262-280, 2010.

J. Dj, C. Goli?, and . Tymen, Multiplicative Masking and Power Analysis of AES, CHES, vol.2523, pp.198-212, 2002.

L. Goubin and A. Martinelli, Protecting AES with Shamir's Secret Sharing Scheme, vol.29, pp.79-94

V. Grosso, F. Standaert, and S. Faust, Masking vs. multiparty computation: How large is the gap for aes, Cryptographic Hardware and Embedded Systems -CHES 2013 -15th International Workshop, vol.8086, pp.400-416, 2013.

Y. Ishai, A. Sahai, and D. Wagner, Private Circuits: Securing Hardware against Probing Attacks, CRYPTO, vol.2729, pp.463-481, 2003.

C. Paul, J. Kocher, and B. Jaffe, Differential power analysis, Lecture Notes in Computer Science, vol.1666, pp.388-397, 1999.

T. Le and M. Berthier, Mutual Information Analysis under the View of Higher-Order Statistics, Lecture Notes in Computer Science, vol.6434, pp.285-300, 2010.

F. , J. Macwilliams, and N. J. Sloane, The Theory of Error-Correcting Codes, 1977.

S. Mangard, E. Oswald, and T. Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards, 2006.

L. Gary, D. Mullen, and . Panario, Handbook of Finite Fields, 2013.

N. Nisan and M. Szegedy, On the degree of boolean functions as real polynomials, Computational Complexity, vol.4, pp.301-313, 1994.

A. Papoulis and S. Pillai, Probability Random Variables and Stochastic Processes, 2002.

R. Poussier, Q. Guo, F. Standaert, C. Carlet, and S. Guilley, Connecting and Improving Direct Sum Masking and Inner Product Masking, Smart Card Research and Advanced Applications -16th International Conference, vol.10728, pp.123-141, 2017.

, Cryptographic Hardware and Embedded Systems -CHES 2011 -13th International Workshop, vol.6917, 2011.

E. Prouff and M. Rivain, Masking against Side-Channel Attacks: A Formal Security Proof, Advances in Cryptology -EUROCRYPT 2013, p.32

, Proceedings, Annual International Conference on the Theory and Applications of Cryptographic Techniques, vol.7881, pp.142-159, 2013.

E. Prouff, M. Rivain, and R. Bevan, Statistical Analysis of Second Order Differential Power Analysis, IEEE Trans. Computers, vol.58, issue.6, pp.799-811, 2009.

E. Prouff and T. Roche, Higher-Order Glitches Free Implementation of the AES Using Secure Multi-party Computation Protocols, vol.29, pp.63-78

. Nist-fips, Federal Information Processing Standards) publication 140-3. Security Requirements for Cryptographic Modules (Draft, Revised), vol.63, p.9, 2009.

M. Rivain and E. Prouff, Provably Secure Higher-Order Masking of AES, LNCS, vol.6225, pp.413-427, 2010.

W. Schindler, K. Lemke, and C. Paar, A Stochastic Model for Differential Side Channel Cryptanalysis, LNCS, vol.3659, pp.30-46, 2005.

F. Standaert, T. Malkin, and M. Yung, A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, EUROCRYPT, vol.5479, pp.443-461, 2009.

. Nist-fips, Security Requirements for Cryptographic Modules publication 140-2, Federal Information Processing Standards), 2001.

, Magma Computational Algebra System, pp.2014-2022

W. Wang, F. Standaert, Y. Yu, S. Pu, J. Liu et al., Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages, Smart Card Research and Advanced Applications -15th International Conference, vol.10146, pp.174-191, 2016.

H. Zhao, Y. Zhou, F. Standaert, and H. Zhang, Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test Based Side-Channel Distinguishers, Lecture Notes in Computer Science, vol.7863, pp.336-352, 2013.