M. Andrychowicz, S. Dziembowski, and S. Faust, Circuit compilers with O(1/ log(n)) leakage rate, EUROCRYPT 2016, pp.586-615, 2016.
DOI : 10.1007/978-3-662-49896-5_21

J. Balasch, B. Gierlichs, V. Grosso, O. Reparaz, and F. Standaert, On the Cost of Lazy Engineering for Masked Software Implementations, Proceedings of the Smart Card Research and Advanced Application Conference (CARDIS), pp.64-81, 2014.
DOI : 10.1007/978-3-319-16763-3_5

K. Bansal, A. Reynolds, C. Barrett, and C. Tinelli, A New Decision Procedure for Finite Sets and Cardinality Constraints in SMT, Proceedings of the 8th International Joint Conference on Automated Reasoning (IJCAR), pp.82-98, 2016.
DOI : 10.1007/978-3-319-40229-1_7

G. Barthe, S. Bela¨?dbela¨?d, F. Dupressoir, P. Fouque, B. Grégoire et al., Verified Proofs of Higher-Order Masking, EUROCRYPT 2015, pp.457-485, 2015.
DOI : 10.1007/978-3-662-46800-5_18

URL : https://hal.archives-ouvertes.fr/hal-01216699

G. Barthe, F. Dupressoir, B. Grégoire, C. Kunz, B. Schmidt et al., EasyCrypt: A Tutorial, Foundations of Security Analysis and Design VII -FOSAD 2012/2013 Tutorial Lectures, pp.146-166, 2013.
DOI : 10.1007/978-3-642-22792-9_5

URL : https://hal.archives-ouvertes.fr/hal-01114366

A. Battistello, E. Jean-sébastien-coron, R. Prouff, and . Zeitoun, Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme, CHES 2016, pp.23-29, 2016.
DOI : 10.1007/978-3-662-53140-2_2

URL : https://hal.archives-ouvertes.fr/hal-01399577

A. Galip-bayrak, F. Regazzoni, D. Novo, and P. Ienne, Sleuth: Automated verification of software power analysis countermeasures, CHES 2013, pp.293-310, 2013.

S. Bela¨?dbela¨?d, F. Benhamouda, E. Alainpasseì-egue, A. Prouff, D. Thillard et al., Randomness complexity of private circuits for multiplication, EUROCRYPT 2016, pp.616-648, 2016.

B. Begül-bilgin, S. Gierlichs, V. Nikova, V. Nikov, and . Rijmen, Higher-Order Threshold Implementations, ASI- ACRYPT 2014, pp.326-343, 2014.
DOI : 10.1007/978-3-662-45608-8_18

C. Carlet, E. Prouff, M. Rivain, and T. Roche, Algebraic Decomposition for Probing Security, CRYPTO 2015, pp.742-763, 2015.
DOI : 10.1007/978-3-662-47989-6_36

S. Chari, C. S. Jutla, J. R. Rao, and P. Rohatgi, Towards Sound Approaches to Counteract Power-Analysis Attacks, LNCS, vol.1666, issue.99, pp.398-412, 1999.
DOI : 10.1007/3-540-48405-1_26

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.94.8951

J. Coron, Higher Order Masking of Look-Up Tables, EUROCRYPT 2014, pp.441-458, 2014.
DOI : 10.1007/978-3-642-55220-5_25

J. Jean-sébastien-coron, M. Großschädl, P. Tibouchi, and . Vadnala, Conversion from arithmetic to boolean masking with logarithmic complexity, LNCS, vol.2015, issue.9054, pp.130-149, 2015.

J. Jean-sébastien-coron, P. Großschädl, and . Vadnala, Secure conversion between boolean and arithmetic masking of any order, CHES 2014, pp.188-205, 2014.

E. Jean-sébastien-coron, M. Prouff, T. Rivain, and . Roche, Higher-order side channel security and mask refreshing, LNCS, vol.2013, issue.8424, pp.410-424, 2014.

A. Jean-sébastien-coron, E. Greuet, R. Prouff, and . Zeitoun, Faster evaluation of sboxes via common shares, CHES 2016, pp.498-514, 2016.

A. Duc, S. Dziembowski, and S. Faust, Unifying Leakage Models: From Probing Attacks to Noisy Leakage., EUROCRYPT 2014, pp.423-440, 2014.
DOI : 10.1007/978-3-642-55220-5_24

A. Duc, S. Faust, and F. Standaert, Making masking security proofs concrete -or how to evaluate the security of any leaking device, EUROCRYPT 2015, Part I, pp.401-429, 2015.

H. Eldib and C. Wang, Synthesis of Masking Countermeasures against Side Channel Attacks, Proceedings of the 26th International Conference on Computer Aided Verification, pp.114-130, 2014.
DOI : 10.1007/978-3-319-08867-9_8

H. Eldib, C. Wang, and P. Schaumont, SMT-Based Verification of Software Countermeasures against Side-Channel Attacks, Proceedings of the 20th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, pp.62-77, 2014.
DOI : 10.1007/978-3-642-54862-8_5

S. Faust, T. Rabin, L. Reyzin, E. Tromer, and V. Vaikuntanathan, Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases, LNCS, vol.6110, pp.135-156, 2010.
DOI : 10.1007/978-3-642-13190-5_7

L. Goubin and J. Patarin, DES and Differential Power Analysis The ???Duplication??? Method, CHES'99, pp.158-172, 1999.
DOI : 10.1007/3-540-48059-5_15

D. Goudarzi and M. Rivain, How fast can higher-order masking be in software? Cryptology ePrint Archive, 2016.
DOI : 10.1007/978-3-319-56620-7_20

Y. Ishai, A. Sahai, and D. Wagner, Private Circuits: Securing Hardware against Probing Attacks, LNCS, vol.2729, pp.463-481, 2003.
DOI : 10.1007/978-3-540-45146-4_27

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.115.9436

C. Paul, J. Kocher, B. Jaffe, and . Jun, Differential power analysis, CRYPTO'99, pp.388-397, 1999.

T. Walker and L. , Binary adders, 1996.

A. Moss, E. Oswald, D. Page, and M. Tunstall, Compiler Assisted Masking, CHES 2012, pp.58-75, 2012.
DOI : 10.1007/978-3-642-33027-8_4

URL : http://urn.kb.se/resolve?urn=urn:nbn:se:bth-7057

S. Nikova, V. Rijmen, and M. Schläffer, Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches, Journal of Cryptology, vol.22, issue.11, pp.292-321, 2011.
DOI : 10.1007/s00145-010-9085-7

M. Pettai and P. Laud, Automatic Proofs of Privacy of Secure Multi-party Computation Protocols against Active Adversaries, 2015 IEEE 28th Computer Security Foundations Symposium, pp.75-89, 2015.
DOI : 10.1109/CSF.2015.13

E. Prouff and M. Rivain, Masking against Side-Channel Attacks: A Formal Security Proof, EUROCRYPT 2013, pp.142-159, 2013.
DOI : 10.1007/978-3-642-38348-9_9

M. Rivain and E. Prouff, Provably Secure Higher-Order Masking of AES, CHES 2010, pp.413-427, 2010.
DOI : 10.1007/978-3-642-15031-9_28

G. Calogero and . Zarba, Combining sets with cardinals, Journal of Automated Reasoning, vol.34, issue.1, pp.1-29, 2005.

S. Zdancewic, L. Zheng, N. Nystrom, and A. C. Myers, Untrusted hosts and confidentiality: Secure program partitioning, Proceedings of the 18th ACM Symposium on Operating System Principles, pp.1-14, 2001.
DOI : 10.1109/fits.2003.1264931