{"id":"https://openalex.org/W3008840318","doi":"https://doi.org/10.1109/tetc.2020.2976711","title":"3-Phase Adiabatic Logic and its Sound SCA Evaluation","display_name":"3-Phase Adiabatic Logic and its Sound SCA Evaluation","publication_year":2020,"publication_date":"2020-02-27","ids":{"openalex":"https://openalex.org/W3008840318","doi":"https://doi.org/10.1109/tetc.2020.2976711","mag":"3008840318"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tetc.2020.2976711","pdf_url":null,"source":{"id":"https://openalex.org/S2496326734","display_name":"IEEE Transactions on Emerging Topics in Computing","issn_l":"2168-6750","issn":["2168-6750","2376-4562"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017179827","display_name":"Bijan Fadaeinia","orcid":"https://orcid.org/0000-0001-8205-4552"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Bijan Fadaeinia","raw_affiliation_strings":["Horst\u00a0G\u00f6rtz\u00a0Institute, Ruhr-University Bochum, Horst G\u00f6rtz Institute for IT Security, Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Horst\u00a0G\u00f6rtz\u00a0Institute, Ruhr-University Bochum, Horst G\u00f6rtz Institute for IT Security, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012815811","display_name":"Amir Moradi","orcid":"https://orcid.org/0000-0002-4032-7433"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Amir Moradi","raw_affiliation_strings":["Horst\u00a0G\u00f6rtz\u00a0Institute, Ruhr-University Bochum, Horst G\u00f6rtz Institute for IT Security, Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Horst\u00a0G\u00f6rtz\u00a0Institute, Ruhr-University Bochum, Horst G\u00f6rtz Institute for IT Security, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.595,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.630057,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":79,"max":81},"biblio":{"volume":"9","issue":"4","first_page":"2175","last_page":"2188"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.999,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9962,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.7908803}],"concepts":[{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.7908803},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7135002},{"id":"https://openalex.org/C109663097","wikidata":"https://www.wikidata.org/wiki/Q182453","display_name":"Adiabatic process","level":2,"score":0.6964481},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4908343},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.4653811},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.36366612},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34680247},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28617936},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.22384363},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.172358},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.120939255},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11601922}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tetc.2020.2976711","pdf_url":null,"source":{"id":"https://openalex.org/S2496326734","display_name":"IEEE Transactions on Emerging Topics in Computing","issn_l":"2168-6750","issn":["2168-6750","2376-4562"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[{"funder":"https://openalex.org/F4320320879","funder_display_name":"Deutsche Forschungsgemeinschaft","award_id":"390781972"}],"datasets":[],"versions":[],"referenced_works_count":39,"referenced_works":["https://openalex.org/W1495989020","https://openalex.org/W1501277346","https://openalex.org/W1506423869","https://openalex.org/W1562542037","https://openalex.org/W1580211761","https://openalex.org/W1580550895","https://openalex.org/W1607006990","https://openalex.org/W1613874182","https://openalex.org/W1640136614","https://openalex.org/W1752847028","https://openalex.org/W1790072549","https://openalex.org/W1862426464","https://openalex.org/W1894646615","https://openalex.org/W1992434343","https://openalex.org/W1995447946","https://openalex.org/W1996543053","https://openalex.org/W2020353556","https://openalex.org/W2041928836","https://openalex.org/W2045383911","https://openalex.org/W2053422044","https://openalex.org/W2076154794","https://openalex.org/W2108782258","https://openalex.org/W2117476047","https://openalex.org/W2122984966","https://openalex.org/W2145267250","https://openalex.org/W2153921466","https://openalex.org/W2154909745","https://openalex.org/W2170191597","https://openalex.org/W2292672296","https://openalex.org/W2506289401","https://openalex.org/W2518864955","https://openalex.org/W2535104156","https://openalex.org/W2563286732","https://openalex.org/W2794729549","https://openalex.org/W2800791460","https://openalex.org/W2885947374","https://openalex.org/W2909742158","https://openalex.org/W2973406619","https://openalex.org/W4231098049"],"related_works":["https://openalex.org/W3090064150","https://openalex.org/W2913264063","https://openalex.org/W2170575992","https://openalex.org/W2081998479","https://openalex.org/W2066443301","https://openalex.org/W2053832511","https://openalex.org/W2043669269","https://openalex.org/W1998454494","https://openalex.org/W1968560271","https://openalex.org/W182679101"],"abstract_inverted_index":{"Nowadays":[0],"there":[1],"is":[2,49],"no":[3],"doubt":[4],"on":[5,43,133,188,197,209],"the":[6,17,33,73,85,121,124,153,161,164,176,180,189],"susceptibility":[7],"of":[8,21,32,47,53,56,123,127,163,179,206],"pure":[9],"cryptographic":[10],"devices":[11,25],"to":[12,50,84,100,120],"side-channel":[13],"analysis":[14,149],"attacks.":[15,104],"During":[16],"last":[18],"decade,":[19],"integration":[20],"corresponding":[22,203],"countermeasures":[23],"into":[24],"which":[26,48,60,78],"deal":[27],"with":[28],"security":[29],"and":[30,136,174],"privacy":[31],"users":[34],"has":[35],"become":[36],"a":[37,76,199],"must.":[38],"This":[39],"motivated":[40,64],"several":[41,110],"research":[42],"designing":[44],"countermeasures,":[45],"one":[46],"make":[51],"use":[52],"power-balancing":[54],"feature":[55],"adiabatic":[57,155,172,211],"logic":[58,156,212],"families":[59],"have":[61],"been":[62],"originally":[63],"for":[65,170],"low-power":[66],"applications.":[67],"In":[68],"this":[69,106],"work":[70],"we":[71,108,116,141,193],"introduce":[72],"first":[74],"such":[75,198],"construction":[77,145],"operates":[79],"in":[80],"three":[81],"phases":[82],"compared":[83],"entire":[86],"state-of-the-art":[87,154],"schemes":[88],"requiring":[89],"at":[90],"least":[91],"four":[92],"phases.":[93],"We":[94,158],"especially":[95],"designed":[96],"our":[97,128,144],"proposed":[98,129],"scheme":[99],"harden":[101,147],"power-analysis":[102],"SCA":[103,139,190,204],"To":[105],"end,":[107],"considered":[109],"relevant":[111],"design":[112],"criteria.":[113],"For":[114],"example,":[115],"payed":[117],"particular":[118],"attention":[119],"symmetry":[122],"fundamental":[125],"gates":[126],"3-phase":[130],"construction.":[131],"Based":[132],"simulation":[134],"results":[135],"information-theoretic":[137],"based":[138],"evaluations":[140],"claim":[142],"that":[143],"can":[146],"power":[148,166,185],"attacks":[150],"more":[151],"than":[152],"families.":[157,213],"further":[159],"highlight":[160],"importance":[162],"way":[165],"clocks":[167],"are":[168],"generated":[169],"an":[171,195],"circuit,":[173],"show":[175],"negative":[177],"effect":[178],"widely-known":[181],"stepwise":[182],"charge":[183],"sharing":[184],"clock":[186],"generator":[187],"security.":[191],"Accordingly,":[192],"present":[194],"adjustment":[196],"circuit":[200],"followed":[201],"by":[202],"evaluation":[205],"its":[207],"application":[208],"various":[210]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3008840318","counts_by_year":[{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":3}],"updated_date":"2024-12-12T04:44:47.995019","created_date":"2020-03-06"}