{"id":"https://openalex.org/W1998540796","doi":"https://doi.org/10.1109/mdt.2007.202","title":"Secured CAD Back-End Flow for Power-Analysis-Resistant Cryptoprocessors","display_name":"Secured CAD Back-End Flow for Power-Analysis-Resistant Cryptoprocessors","publication_year":2007,"publication_date":"2007-11-01","ids":{"openalex":"https://openalex.org/W1998540796","doi":"https://doi.org/10.1109/mdt.2007.202","mag":"1998540796"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/mdt.2007.202","pdf_url":null,"source":{"id":"https://openalex.org/S73404582","display_name":"IEEE Design & Test of Computers","issn_l":"0740-7475","issn":["0740-7475","1558-1918"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008439372","display_name":"Sylvain Guilley","orcid":"https://orcid.org/0000-0002-5044-3534"},"institutions":[{"id":"https://openalex.org/I12356871","display_name":"T\u00e9l\u00e9com Paris","ror":"https://ror.org/01naq7912","country_code":"FR","type":"education","lineage":["https://openalex.org/I12356871","https://openalex.org/I4210145102"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Sylvain Guilley","raw_affiliation_strings":["ENST - Ecole Nationale Sup\u00e9rieure des T\u00e9l\u00e9communications (46 rue Barrault 75634 Paris Cedex 13 - France)"],"affiliations":[{"raw_affiliation_string":"ENST - Ecole Nationale Sup\u00e9rieure des T\u00e9l\u00e9communications (46 rue Barrault 75634 Paris Cedex 13 - France)","institution_ids":["https://openalex.org/I12356871"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045978200","display_name":"Florent Flament","orcid":null},"institutions":[{"id":"https://openalex.org/I1324840837","display_name":"Hewlett-Packard (United States)","ror":"https://ror.org/059rn9488","country_code":"US","type":"company","lineage":["https://openalex.org/I1324840837"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Florent Flament","raw_affiliation_strings":["Hewlett-Packard (\u00c9tats-Unis)"],"affiliations":[{"raw_affiliation_string":"Hewlett-Packard (\u00c9tats-Unis)","institution_ids":["https://openalex.org/I1324840837"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111611965","display_name":"Philippe Hoogvorst","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165912","display_name":"Laboratoire Traitement et Communication de l\u2019Information","ror":"https://ror.org/057er4c39","country_code":"FR","type":"facility","lineage":["https://openalex.org/I12356871","https://openalex.org/I4210145102","https://openalex.org/I4210165912"]},{"id":"https://openalex.org/I12356871","display_name":"T\u00e9l\u00e9com Paris","ror":"https://ror.org/01naq7912","country_code":"FR","type":"education","lineage":["https://openalex.org/I12356871","https://openalex.org/I4210145102"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Philippe Hoogvorst","raw_affiliation_strings":["ENST - Ecole Nationale Sup\u00e9rieure des T\u00e9l\u00e9communications (46 rue Barrault 75634 Paris Cedex 13 - France)","LTCI - Laboratoire Traitement et Communication de l'Information (46 rue Barrault F-75634 Paris Cedex 13 - France)"],"affiliations":[{"raw_affiliation_string":"LTCI - Laboratoire Traitement et Communication de l'Information (46 rue Barrault F-75634 Paris Cedex 13 - France)","institution_ids":["https://openalex.org/I4210165912"]},{"raw_affiliation_string":"ENST - Ecole Nationale Sup\u00e9rieure des T\u00e9l\u00e9communications (46 rue Barrault 75634 Paris Cedex 13 - France)","institution_ids":["https://openalex.org/I12356871"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066041952","display_name":"Renaud Pacalet","orcid":"https://orcid.org/0000-0002-6676-1123"},"institutions":[{"id":"https://openalex.org/I12356871","display_name":"T\u00e9l\u00e9com Paris","ror":"https://ror.org/01naq7912","country_code":"FR","type":"education","lineage":["https://openalex.org/I12356871","https://openalex.org/I4210145102"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Renaud Pacalet","raw_affiliation_strings":["ENST - Ecole Nationale Sup\u00e9rieure des T\u00e9l\u00e9communications (46 rue Barrault 75634 Paris Cedex 13 - France)"],"affiliations":[{"raw_affiliation_string":"ENST - Ecole Nationale Sup\u00e9rieure des T\u00e9l\u00e9communications (46 rue Barrault 75634 Paris Cedex 13 - France)","institution_ids":["https://openalex.org/I12356871"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089721534","display_name":"Yves Mathieu","orcid":null},"institutions":[{"id":"https://openalex.org/I12356871","display_name":"T\u00e9l\u00e9com Paris","ror":"https://ror.org/01naq7912","country_code":"FR","type":"education","lineage":["https://openalex.org/I12356871","https://openalex.org/I4210145102"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Yves Mathieu","raw_affiliation_strings":["ENST - Ecole Nationale Sup\u00e9rieure des T\u00e9l\u00e9communications (46 rue Barrault 75634 Paris Cedex 13 - France)"],"affiliations":[{"raw_affiliation_string":"ENST - Ecole Nationale Sup\u00e9rieure des T\u00e9l\u00e9communications (46 rue Barrault 75634 Paris Cedex 13 - France)","institution_ids":["https://openalex.org/I12356871"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.384,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":13,"citation_normalized_percentile":{"value":0.843579,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":85,"max":86},"biblio":{"volume":"24","issue":"6","first_page":"546","last_page":"555"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9965,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9742,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/netlist","display_name":"Netlist","score":0.9405745},{"id":"https://openalex.org/keywords/schematic","display_name":"Schematic","score":0.8206314},{"id":"https://openalex.org/keywords/design-flow","display_name":"Design flow","score":0.6249279},{"id":"https://openalex.org/keywords/electronic-design-automation","display_name":"Electronic design automation","score":0.50370044},{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.4770174}],"concepts":[{"id":"https://openalex.org/C177650935","wikidata":"https://www.wikidata.org/wiki/Q1760303","display_name":"Netlist","level":2,"score":0.9405745},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.85136753},{"id":"https://openalex.org/C192328126","wikidata":"https://www.wikidata.org/wiki/Q4514647","display_name":"Schematic","level":2,"score":0.8206314},{"id":"https://openalex.org/C37135326","wikidata":"https://www.wikidata.org/wiki/Q931942","display_name":"Design flow","level":2,"score":0.6249279},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6062121},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6018872},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5142712},{"id":"https://openalex.org/C64260653","wikidata":"https://www.wikidata.org/wiki/Q1194864","display_name":"Electronic design automation","level":2,"score":0.50370044},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.4770174},{"id":"https://openalex.org/C194789388","wikidata":"https://www.wikidata.org/wiki/Q17855283","display_name":"CAD","level":2,"score":0.47692224},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.475881},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.45951974},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.45540226},{"id":"https://openalex.org/C38349280","wikidata":"https://www.wikidata.org/wiki/Q1434290","display_name":"Flow (mathematics)","level":2,"score":0.41248533},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.305767},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3006323},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.24899045},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.24250665},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22983202},{"id":"https://openalex.org/C199639397","wikidata":"https://www.wikidata.org/wiki/Q1788588","display_name":"Engineering drawing","level":1,"score":0.17559648},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/mdt.2007.202","pdf_url":null,"source":{"id":"https://openalex.org/S73404582","display_name":"IEEE Design & Test of Computers","issn_l":"0740-7475","issn":["0740-7475","1558-1918"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":false,"landing_page_url":"https://hal.telecom-paris.fr/hal-02893104","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":["Centre National de la Recherche Scientifique"],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7","score":0.83}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":25,"referenced_works":["https://openalex.org/W1506423869","https://openalex.org/W1512062395","https://openalex.org/W1520049216","https://openalex.org/W153455290","https://openalex.org/W1540392439","https://openalex.org/W1548656471","https://openalex.org/W1575446397","https://openalex.org/W1594464909","https://openalex.org/W1595639514","https://openalex.org/W1602420333","https://openalex.org/W1602426192","https://openalex.org/W1790072549","https://openalex.org/W2003841157","https://openalex.org/W2047248627","https://openalex.org/W2108742901","https://openalex.org/W2116406812","https://openalex.org/W2138900190","https://openalex.org/W2144630005","https://openalex.org/W2153317824","https://openalex.org/W2154909745","https://openalex.org/W2172070324","https://openalex.org/W4231098049","https://openalex.org/W4236056036","https://openalex.org/W4285719527","https://openalex.org/W60393894"],"related_works":["https://openalex.org/W5280335","https://openalex.org/W4384807855","https://openalex.org/W4323926098","https://openalex.org/W4244949874","https://openalex.org/W2782264121","https://openalex.org/W2425598453","https://openalex.org/W2164725015","https://openalex.org/W2022533428","https://openalex.org/W2013165531","https://openalex.org/W182679101"],"abstract_inverted_index":{"Side-channel":[0],"attacks":[1,24],"threaten":[2],"the":[3,46,55,60,64,83,91],"security":[4],"of":[5,93],"any":[6],"electronic":[7],"device.":[8],"We":[9,58,99],"have":[10],"developed":[11],"a":[12,34,70],"comprehensive":[13],"back-end":[14,76,84],"design":[15,47],"flow":[16,62],"that":[17,25,101],"natively":[18],"protects":[19],"constant-power":[20],"cryptoprocessors":[21],"against":[22],"side-channel":[23],"exploit":[26],"instant":[27],"power":[28,109],"consumption.":[29],"The":[30],"proposed":[31],"methodology":[32,51],"uses":[33],"fully":[35],"custom,":[36],"balanced":[37],"cell":[38],"library":[39,68],"and":[40],"an":[41],"innovative":[42],"place-and-route":[43],"method.":[44],"All":[45],"steps":[48],"in":[49],"this":[50,87],"take":[52],"place":[53],"at":[54,111],"layout":[56],"level.":[57],"apply":[59],"described":[61],"to":[63,105],"quasi-delay-insensitive":[65],"(QDI)":[66],"SecLib":[67],"with":[69],"shielded":[71],"routing":[72],"method":[73],"derived":[74],"from":[75],"duplication,":[77],"using":[78],"legacy":[79],"CAD":[80],"tools":[81],"for":[82],"steps.":[85],"In":[86],"article,":[88],"we":[89],"investigate":[90],"feasibility":[92],"implementing":[94],"optimally":[95],"secured":[96],"unmasked":[97],"logic.":[98],"argue":[100],"it":[102],"is":[103],"possible":[104],"thwart":[106],"all":[107],"known":[108],"attacks,":[110],"least":[112],"on":[113],"carefully":[114],"designed":[115],"netlist":[116],"schematics.":[117]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1998540796","counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2014,"cited_by_count":2}],"updated_date":"2025-01-19T22:20:35.568250","created_date":"2016-06-24"}