{"id":"https://openalex.org/W4246519515","doi":"https://doi.org/10.1109/cases.2015.7324539","title":"QuadSeal: Quadruple algorithmic symmetrizing countermeasure against power based side-channel attacks","display_name":"QuadSeal: Quadruple algorithmic symmetrizing countermeasure against power based side-channel attacks","publication_year":2015,"publication_date":"2015-10-01","ids":{"openalex":"https://openalex.org/W4246519515","doi":"https://doi.org/10.1109/cases.2015.7324539"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/cases.2015.7324539","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027719580","display_name":"Darshana Jayasinghe","orcid":"https://orcid.org/0000-0003-1910-4048"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"funder","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Darshana Jayasinghe","raw_affiliation_strings":["University of New South Wales, Australia"],"affiliations":[{"raw_affiliation_string":"University of New South Wales, Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079126989","display_name":"Aleksandar Ignjatovi\u0107","orcid":"https://orcid.org/0000-0001-7427-4934"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"funder","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Aleksandar Ignjatovic","raw_affiliation_strings":["University of New South Wales, Australia"],"affiliations":[{"raw_affiliation_string":"University of New South Wales, Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056701255","display_name":"Jude Angelo Ambrose","orcid":null},"institutions":[{"id":"https://openalex.org/I4210129385","display_name":"Canon (Australia)","ror":"https://ror.org/03895v451","country_code":"AU","type":"company","lineage":["https://openalex.org/I1320697193","https://openalex.org/I4210129385"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jude Angelo Ambrose","raw_affiliation_strings":["Canon Information Systems, Research Australia, Australia"],"affiliations":[{"raw_affiliation_string":"Canon Information Systems, Research Australia, Australia","institution_ids":["https://openalex.org/I4210129385"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058096999","display_name":"Roshan Ragel","orcid":"https://orcid.org/0000-0002-4511-2335"},"institutions":[{"id":"https://openalex.org/I111199411","display_name":"University of Peradeniya","ror":"https://ror.org/025h79t26","country_code":"LK","type":"funder","lineage":["https://openalex.org/I111199411"]}],"countries":["LK"],"is_corresponding":false,"raw_author_name":"Roshan Ragel","raw_affiliation_strings":["University of Peradeniya, Sri Lanka"],"affiliations":[{"raw_affiliation_string":"University of Peradeniya, Sri Lanka","institution_ids":["https://openalex.org/I111199411"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030042327","display_name":"Sri Parameswaran","orcid":"https://orcid.org/0000-0003-0435-9080"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"funder","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Sri Parameswaran","raw_affiliation_strings":["University of New South Wales, Australia"],"affiliations":[{"raw_affiliation_string":"University of New South Wales, Australia","institution_ids":["https://openalex.org/I31746571"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.178,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":10,"citation_normalized_percentile":{"value":0.837352,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":85,"max":86},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9985,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9946,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.7575624},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.70587826},{"id":"https://openalex.org/keywords/hamming-weight","display_name":"Hamming weight","score":0.58970183},{"id":"https://openalex.org/keywords/hamming-distance","display_name":"Hamming distance","score":0.5867088}],"concepts":[{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.7575624},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.74434054},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7374369},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.70587826},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.703937},{"id":"https://openalex.org/C63361517","wikidata":"https://www.wikidata.org/wiki/Q5645805","display_name":"Hamming weight","level":5,"score":0.58970183},{"id":"https://openalex.org/C193319292","wikidata":"https://www.wikidata.org/wiki/Q272172","display_name":"Hamming distance","level":2,"score":0.5867088},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5298322},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.45984566},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.45644054},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.43245775},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.4146125},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.41053632},{"id":"https://openalex.org/C73150493","wikidata":"https://www.wikidata.org/wiki/Q853922","display_name":"Hamming code","level":4,"score":0.39400423},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3742159},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.33749157},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2973723},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2573577},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.123615},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.10647324},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C157125643","wikidata":"https://www.wikidata.org/wiki/Q884707","display_name":"Block code","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/cases.2015.7324539","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.73,"display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":35,"referenced_works":["https://openalex.org/W1506423869","https://openalex.org/W1548571590","https://openalex.org/W1562542037","https://openalex.org/W1569380263","https://openalex.org/W1580211761","https://openalex.org/W1779923173","https://openalex.org/W1790072549","https://openalex.org/W1862426464","https://openalex.org/W1865530175","https://openalex.org/W1967407262","https://openalex.org/W1972859418","https://openalex.org/W1998454494","https://openalex.org/W200116028","https://openalex.org/W2001577466","https://openalex.org/W2026337571","https://openalex.org/W2029191730","https://openalex.org/W2037844954","https://openalex.org/W2058153458","https://openalex.org/W2078199274","https://openalex.org/W2116793614","https://openalex.org/W2120562931","https://openalex.org/W2137035418","https://openalex.org/W2137508921","https://openalex.org/W2140979409","https://openalex.org/W2144765857","https://openalex.org/W2147273330","https://openalex.org/W2149099062","https://openalex.org/W2150302545","https://openalex.org/W2167918316","https://openalex.org/W2179166491","https://openalex.org/W2332237006","https://openalex.org/W2949534271","https://openalex.org/W3149463215","https://openalex.org/W3151798437","https://openalex.org/W4297787210"],"related_works":["https://openalex.org/W592466131","https://openalex.org/W4285111982","https://openalex.org/W3172985976","https://openalex.org/W3171880430","https://openalex.org/W2376652919","https://openalex.org/W2368507225","https://openalex.org/W2332427846","https://openalex.org/W2091042641","https://openalex.org/W2060505199","https://openalex.org/W2008071701"],"abstract_inverted_index":{"Power":[0],"based":[1,95,291],"side-channel":[2,292],"attacks":[3,29,206,247,293],"attempt":[4],"to":[5,33,47,104,217,221,225,250],"obtain":[6],"the":[7,23,42,82,106,109,114,120,127,131,150,154,161,171,187,190,212,257,272,281],"secret":[8,43,110,258,273],"key":[9,111,274],"from":[10,112],"implementations":[11],"of":[12,36,41,108,119,164,173,209,256,288],"cryptographic":[13],"algorithms,":[14],"such":[15,56],"as":[16],"Advanced":[17],"Encryption":[18],"Standard":[19],"(AES),":[20],"by":[21,170],"analyzing":[22],"power":[24,37,65,69,121,204,266,277,290],"traces":[25,38,122,267],"during":[26],"execution.":[27],"Such":[28],"employ":[30],"statistical":[31],"methods":[32],"find":[34],"correlations":[35],"with":[39,177],"parts":[40],"key.":[44],"In":[45,78],"order":[46],"be":[48,218],"effective,":[49],"a":[50,57,87,251],"countermeasure":[51,128,214,236],"must":[52],"remove":[53,105],"or":[54,67,224],"conceal":[55],"signature.":[58],"Previous":[59],"countermeasures":[60],"have":[61,72],"either":[62],"removed":[63],"dynamic":[64,117],"signatures":[66],"leakage":[68],"signatures,":[70],"but":[71],"not":[73,208],"demonstrated":[74],"effectiveness":[75],"against":[76,194,203,243],"both.":[77],"this":[79],"paper,":[80],"for":[81,92,231,239],"first":[83],"time,":[84],"we":[85],"propose":[86],"balance":[88],"and":[89,97,116,123,134,146,156,160,166,180,198,241,245,254,298],"rotate":[90],"technique":[91],"block":[93],"cipher":[94],"algorithms":[96],"demonstrate":[98,125],"it":[99],"on":[100,141,153],"an":[101],"AES":[102,240,269],"circuitry":[103],"signature":[107],"both":[113],"static":[115],"components":[118,216],"further":[124],"that":[126],"can":[129],"withstand":[130],"path":[132,196,296],"imbalances":[133,197,297],"process":[135],"variation":[136],"effects.":[137,200],"Our":[138],"solution,":[139],"relies":[140],"algorithmically":[142],"balancing":[143],"Hamming":[144,147],"distances":[145],"weights":[148],"(where":[149],"bit":[151],"transitions":[152],"registers":[155],"gates":[157],"are":[158,168,301],"balanced,":[159],"total":[162],"number":[163],"1s":[165],"0s":[167],"balanced)":[169],"use":[172],"four":[174,188,227],"identical":[175],"circuits":[176],"differing":[178],"inputs":[179],"modified":[181],"SubByte":[182],"tables.":[183],"By":[184],"randomly":[185],"rotating":[186],"encryptions,":[189],"system":[191],"is":[192,207,237,280,286],"protected":[193],"variations,":[195,295],"aging":[199,299],"When":[201],"resistance":[202],"analysis":[205],"high":[210,232],"priority,":[211],"proposed":[213,235],"allows":[215],"switched":[219],"off":[220],"save":[222],"power,":[223],"run":[226],"executions":[228],"in":[229],"parallel":[230],"performance.":[233],"The":[234],"implemented":[238],"tested":[242],"CPA":[244],"MIA":[246],"(for":[248],"up":[249],"million":[252,265],"traces)":[253],"none":[255],"keys":[259],"were":[260],"found":[261],"even":[262],"after":[263],"one":[264],"(unprotected":[268],"circuit":[270,284],"revealed":[271],"within":[275],"5,000":[276],"traces).":[278],"This":[279],"smallest":[282],"known":[283],"which":[285],"capable":[287],"withstanding":[289],"when":[294],"effects":[300],"considered.":[302]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4246519515","counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":2}],"updated_date":"2025-04-22T10:10:51.887239","created_date":"2022-05-12"}