{"id":"https://openalex.org/W4389609823","doi":"https://doi.org/10.1109/tvlsi.2023.3339810","title":"Compacting Side-Channel Measurements With Amplitude Peak Location Algorithm","display_name":"Compacting Side-Channel Measurements With Amplitude Peak Location Algorithm","publication_year":2023,"publication_date":"2023-12-12","ids":{"openalex":"https://openalex.org/W4389609823","doi":"https://doi.org/10.1109/tvlsi.2023.3339810"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tvlsi.2023.3339810","pdf_url":null,"source":{"id":"https://openalex.org/S37538908","display_name":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems","issn_l":"1063-8210","issn":["1063-8210","1557-9999"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022462569","display_name":"Thai-Ha Tran","orcid":"https://orcid.org/0000-0001-8011-5518"},"institutions":[{"id":"https://openalex.org/I20529979","display_name":"University of Electro-Communications","ror":"https://ror.org/02x73b849","country_code":"JP","type":"education","lineage":["https://openalex.org/I20529979"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Thai-Ha Tran","raw_affiliation_strings":["Department of Computer and Network Engineering, The University of Electro-Communications, Chofu, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Network Engineering, The University of Electro-Communications, Chofu, Japan","institution_ids":["https://openalex.org/I20529979"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092636076","display_name":"Duc-Thuan Dam","orcid":"https://orcid.org/0000-0001-8998-9721"},"institutions":[{"id":"https://openalex.org/I20529979","display_name":"University of Electro-Communications","ror":"https://ror.org/02x73b849","country_code":"JP","type":"education","lineage":["https://openalex.org/I20529979"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Duc-Thuan Dam","raw_affiliation_strings":["Department of Computer and Network Engineering, The University of Electro-Communications, Chofu, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Network Engineering, The University of Electro-Communications, Chofu, Japan","institution_ids":["https://openalex.org/I20529979"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061203663","display_name":"Ba-Anh Dao","orcid":"https://orcid.org/0000-0002-8761-6398"},"institutions":[{"id":"https://openalex.org/I4210155035","display_name":"Academy of Cryptography Techniques","ror":"https://ror.org/05nfbnp91","country_code":"VN","type":"education","lineage":["https://openalex.org/I4210155035"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Ba-Anh Dao","raw_affiliation_strings":["Institute of Scientific and Technological Research and Application, Academy of Cryptography Techniques, Hanoi, Vietnam"],"affiliations":[{"raw_affiliation_string":"Institute of Scientific and Technological Research and Application, Academy of Cryptography Techniques, Hanoi, Vietnam","institution_ids":["https://openalex.org/I4210155035"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082516246","display_name":"Van\u2010Phuc Hoang","orcid":"https://orcid.org/0000-0003-0944-8701"},"institutions":[{"id":"https://openalex.org/I131359167","display_name":"Le Quy Don Technical University","ror":"https://ror.org/04wgyjv21","country_code":"VN","type":"education","lineage":["https://openalex.org/I131359167"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Van-Phuc Hoang","raw_affiliation_strings":["Institute of System Integration, Le Quy Don Technical University, Hanoi, Vietnam"],"affiliations":[{"raw_affiliation_string":"Institute of System Integration, Le Quy Don Technical University, Hanoi, Vietnam","institution_ids":["https://openalex.org/I131359167"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042912660","display_name":"Cong\u2010Kha Pham","orcid":"https://orcid.org/0000-0001-5255-4919"},"institutions":[{"id":"https://openalex.org/I20529979","display_name":"University of Electro-Communications","ror":"https://ror.org/02x73b849","country_code":"JP","type":"education","lineage":["https://openalex.org/I20529979"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Cong-Kha Pham","raw_affiliation_strings":["Department of Computer and Network Engineering, The University of Electro-Communications, Chofu, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Network Engineering, The University of Electro-Communications, Chofu, Japan","institution_ids":["https://openalex.org/I20529979"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025387024","display_name":"Trong-Thuc Hoang","orcid":"https://orcid.org/0000-0002-4078-0836"},"institutions":[{"id":"https://openalex.org/I20529979","display_name":"University of Electro-Communications","ror":"https://ror.org/02x73b849","country_code":"JP","type":"education","lineage":["https://openalex.org/I20529979"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Trong-Thuc Hoang","raw_affiliation_strings":["Department of Computer and Network Engineering, The University of Electro-Communications, Chofu, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Network Engineering, The University of Electro-Communications, Chofu, Japan","institution_ids":["https://openalex.org/I20529979"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":67,"max":78},"biblio":{"volume":"32","issue":"3","first_page":"573","last_page":"586"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9928,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9535,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.55904603},{"id":"https://openalex.org/keywords/interpolation","display_name":"Interpolation","score":0.51544863},{"id":"https://openalex.org/keywords/timing-attack","display_name":"Timing attack","score":0.4425965}],"concepts":[{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.7956097},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7195859},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6637047},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.6098199},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.55904603},{"id":"https://openalex.org/C45357846","wikidata":"https://www.wikidata.org/wiki/Q2001982","display_name":"Notation","level":2,"score":0.5187733},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5173597},{"id":"https://openalex.org/C137800194","wikidata":"https://www.wikidata.org/wiki/Q11713455","display_name":"Interpolation (computer graphics)","level":3,"score":0.51544863},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.50820374},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.49618298},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4918785},{"id":"https://openalex.org/C2777402240","wikidata":"https://www.wikidata.org/wiki/Q6783436","display_name":"Masking (illustration)","level":2,"score":0.490565},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.44680583},{"id":"https://openalex.org/C28420585","wikidata":"https://www.wikidata.org/wiki/Q2665075","display_name":"Timing attack","level":4,"score":0.4425965},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.4381869},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.32385835},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.19380113},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17090422},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16641513},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.147068},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.13765228},{"id":"https://openalex.org/C104114177","wikidata":"https://www.wikidata.org/wiki/Q79782","display_name":"Motion (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tvlsi.2023.3339810","pdf_url":null,"source":{"id":"https://openalex.org/S37538908","display_name":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems","issn_l":"1063-8210","issn":["1063-8210","1557-9999"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":42,"referenced_works":["https://openalex.org/W1543721789","https://openalex.org/W1560093457","https://openalex.org/W1562542037","https://openalex.org/W1592516903","https://openalex.org/W1979792591","https://openalex.org/W2026142048","https://openalex.org/W2064323827","https://openalex.org/W2117130990","https://openalex.org/W2146675862","https://openalex.org/W2154909745","https://openalex.org/W2169560641","https://openalex.org/W2578142399","https://openalex.org/W2592257304","https://openalex.org/W2765665541","https://openalex.org/W2807669647","https://openalex.org/W2905574772","https://openalex.org/W2923594358","https://openalex.org/W2955681262","https://openalex.org/W2990296674","https://openalex.org/W3020865293","https://openalex.org/W3024757631","https://openalex.org/W3093818042","https://openalex.org/W3114532883","https://openalex.org/W3161792922","https://openalex.org/W3186830680","https://openalex.org/W3199545563","https://openalex.org/W3208224324","https://openalex.org/W4206230818","https://openalex.org/W4206378268","https://openalex.org/W4211164178","https://openalex.org/W4211211259","https://openalex.org/W4240560709","https://openalex.org/W4245524709","https://openalex.org/W4285110201","https://openalex.org/W4292056025","https://openalex.org/W4292971241","https://openalex.org/W4309156431","https://openalex.org/W4312853588","https://openalex.org/W4361799285","https://openalex.org/W4361983685","https://openalex.org/W4385342460","https://openalex.org/W4385408002"],"related_works":["https://openalex.org/W4384807855","https://openalex.org/W4244949874","https://openalex.org/W2981727040","https://openalex.org/W2809979774","https://openalex.org/W2354319712","https://openalex.org/W2170261837","https://openalex.org/W2127307719","https://openalex.org/W2083001766","https://openalex.org/W1971956962","https://openalex.org/W1533979697"],"abstract_inverted_index":{"Nowadays,":[0],"cryptographic":[1,61],"algorithms":[2,18],"are":[3,19,72],"widely":[4],"used":[5,154],"to":[6,46,74,88,117,124,211],"build":[7],"safety":[8],"mechanisms":[9],"for":[10,155],"specific":[11],"objects":[12],"in":[13,21,131,184],"security":[14],"services.":[15],"Nevertheless,":[16],"these":[17],"implemented":[20],"the":[22,27,39,90,95,107,119,125,128,150,157,166,182,185,190,203,213],"hardware":[23],"or":[24,207],"software":[25],"of":[26,97,149],"physical":[28,34],"devices.":[29],"Consequently,":[30],"attackers":[31],"will":[32],"exploit":[33],"information":[35],"leakages,":[36],"such":[37],"as":[38],"device's":[40],"power":[41,52,152],"consumption,":[42],"and":[43,59,111,171],"use":[44],"them":[45],"get":[47],"secret":[48],"keys.":[49],"The":[50,63,104],"correlation":[51],"analysis":[53],"(CPA)":[54],"attack":[55],"is":[56,134],"a":[57,85],"powerful":[58],"efficient":[60],"technique.":[62],"evaluation":[64],"method,":[65],"however,":[66],"takes":[67],"time":[68,92,130],"because":[69],"many":[70],"traces":[71,153,210],"necessary":[73],"overcome":[75],"designs":[76],"protected":[77],"by":[78,93,136],"different":[79],"countermeasures.":[80],"Therefore,":[81],"this":[82,161],"article":[83],"proposes":[84],"new":[86],"technique":[87,162],"reduce":[89],"computation":[91],"extracting":[94],"point":[96],"interest":[98],"(POI)":[99],"with":[100,146,165],"an":[101],"interpolation":[102],"method.":[103],"proposal":[105,183],"uses":[106],"local":[108],"extreme":[109],"value":[110],"two":[112],"adjacent":[113],"samples":[114],"around":[115],"it":[116],"interpolate":[118],"actual":[120],"peak":[121],"amplitude.":[122],"Compared":[123],"conventional":[126],"CPA,":[127],"execution":[129],"our":[132],"solution":[133],"decreased":[135],"approximately":[137],"":[140],"$9.55\\times":[142],"$":[143],"":[144],",":[145],"only":[147,199],"53.32%":[148],"given":[151],"attacking":[156],"masking":[158],"design.":[159],"Moreover,":[160],"can":[163],"deal":[164],"public":[167],"desynchronized":[168],"ASCAD":[169],"database":[170],"has":[172],"better":[173],"results":[174],"than":[175],"recent":[176],"alignment":[177],"preprocessing":[178,186],"methods.":[179],"We":[180],"apply":[181],"step":[187],"before":[188],"performing":[189],"previously":[191],"non-profiled":[192],"deep":[193],"learning-based":[194],"attacks.":[195],"Our":[196],"suggestion":[197],"requires":[198],"5000":[200],"traces,":[201],"while":[202],"reported":[204],"attacks":[205],"fail":[206],"require":[208],"more":[209],"recover":[212],"correct":[214],"subkey.":[215]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4389609823","counts_by_year":[],"updated_date":"2025-01-07T17:10:03.730101","created_date":"2023-12-13"}