{"id":"https://openalex.org/W2945461167","doi":"https://doi.org/10.1145/3316781.3323485","title":"Protecting RISC-V against Side-Channel Attacks","display_name":"Protecting RISC-V against Side-Channel Attacks","publication_year":2019,"publication_date":"2019-05-23","ids":{"openalex":"https://openalex.org/W2945461167","doi":"https://doi.org/10.1145/3316781.3323485","mag":"2945461167"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3316781.3323485","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108247146","display_name":"Elke De Mulder","orcid":null},"institutions":[{"id":"https://openalex.org/I1339014352","display_name":"Rambus (United Kingdom)","ror":"https://ror.org/04z6j1174","country_code":"GB","type":"company","lineage":["https://openalex.org/I1339014352","https://openalex.org/I4210095722"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Elke De Mulder","raw_affiliation_strings":["Rambus Cryptography Research Division"],"affiliations":[{"raw_affiliation_string":"Rambus Cryptography Research Division","institution_ids":["https://openalex.org/I1339014352"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035377077","display_name":"Samatha Gummalla","orcid":null},"institutions":[{"id":"https://openalex.org/I1339014352","display_name":"Rambus (United Kingdom)","ror":"https://ror.org/04z6j1174","country_code":"GB","type":"company","lineage":["https://openalex.org/I1339014352","https://openalex.org/I4210095722"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Samatha Gummalla","raw_affiliation_strings":["Rambus Cryptography Research Division"],"affiliations":[{"raw_affiliation_string":"Rambus Cryptography Research Division","institution_ids":["https://openalex.org/I1339014352"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032974710","display_name":"Michael Hutter","orcid":"https://orcid.org/0009-0006-0138-5151"},"institutions":[{"id":"https://openalex.org/I1339014352","display_name":"Rambus (United Kingdom)","ror":"https://ror.org/04z6j1174","country_code":"GB","type":"company","lineage":["https://openalex.org/I1339014352","https://openalex.org/I4210095722"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Michael Hutter","raw_affiliation_strings":["Rambus Cryptography Research Division"],"affiliations":[{"raw_affiliation_string":"Rambus Cryptography Research Division","institution_ids":["https://openalex.org/I1339014352"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.991,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":23,"citation_normalized_percentile":{"value":0.886008,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":92,"max":93},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9923,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9919,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.75897616},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.4986682},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.45534784},{"id":"https://openalex.org/keywords/software-implementation","display_name":"Software implementation","score":0.42711505},{"id":"https://openalex.org/keywords/aes-implementations","display_name":"AES implementations","score":0.41447616}],"concepts":[{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.9157739},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8045343},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.75897616},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6817193},{"id":"https://openalex.org/C126298526","wikidata":"https://www.wikidata.org/wiki/Q189376","display_name":"Reduced instruction set computing","level":3,"score":0.6069005},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.54932994},{"id":"https://openalex.org/C2777402240","wikidata":"https://www.wikidata.org/wiki/Q6783436","display_name":"Masking (illustration)","level":2,"score":0.53658754},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.52938956},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.4986682},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.47654206},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.45534784},{"id":"https://openalex.org/C2983609787","wikidata":"https://www.wikidata.org/wiki/Q10534782","display_name":"Software implementation","level":3,"score":0.42711505},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.42048526},{"id":"https://openalex.org/C46331935","wikidata":"https://www.wikidata.org/wiki/Q4651362","display_name":"AES implementations","level":4,"score":0.41447616},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3257587},{"id":"https://openalex.org/C202491316","wikidata":"https://www.wikidata.org/wiki/Q272683","display_name":"Instruction set","level":2,"score":0.32149497},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.22971353},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.18153},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.11201751},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.08500269},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3316781.3323485","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy","score":0.73}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":4,"referenced_works":["https://openalex.org/W1589364525","https://openalex.org/W1873852107","https://openalex.org/W2150892302","https://openalex.org/W2604725724"],"related_works":["https://openalex.org/W4318037411","https://openalex.org/W4282541326","https://openalex.org/W4220799736","https://openalex.org/W3037313463","https://openalex.org/W2972319298","https://openalex.org/W2945461167","https://openalex.org/W2474827264","https://openalex.org/W2071290994","https://openalex.org/W1622403295","https://openalex.org/W1492604955"],"abstract_inverted_index":{"Software":[0],"(SW)":[1],"implementations":[2,36],"of":[3,25,62,73,139,141,166],"cryptographic":[4,168],"algorithms":[5,74],"are":[6,77,89,159],"vulnerable":[7],"to":[8,17,80,106,151],"Side-channel":[9],"Analysis":[10],"(SCA)":[11],"attacks,":[12],"basically":[13],"relinquishing":[14],"the":[15,18,26,57,129,142,163],"key":[16],"outside":[19],"world":[20],"through":[21],"measurable":[22],"physical":[23],"properties":[24],"processor":[27],"like":[28],"power":[29,123],"consumption":[30],"and":[31,42,146],"electromagnetic":[32,125],"radiation.":[33],"Protected":[34],"SW":[35],"typically":[37],"have":[38],"a":[39,49,104,115,148],"significant":[40],"timing":[41],"code":[43],"size":[44],"overhead":[45],"as":[46,48,82,132,134],"well":[47],"substantially":[50],"long":[51],"development":[52],"time":[53],"because":[54],"hands-on":[55],"testing":[56],"result":[58],"is":[59],"crucial.":[60],"Plenty":[61],"scientific":[63],"publications":[64],"offer":[65],"solutions":[66,95],"for":[67,70],"this":[68,107],"problem":[69,108],"all":[71],"kinds":[72],"but":[75],"they":[76,83],"not":[78],"straightforward":[79],"implement":[81],"rely":[84],"on":[85,171],"device":[86],"assumptions":[87],"which":[88],"rarely":[90],"met,":[91],"nor":[92],"do":[93],"these":[94],"take":[96],"micro-architecture":[97],"related":[98],"leakages":[99],"into":[100,114],"account.":[101],"We":[102,136],"present":[103,147],"solution":[105,119,150],"by":[109],"integrating":[110],"side-channel":[111],"analysis":[112],"countermeasures":[113],"RISC-V":[116],"implementation.":[117],"Our":[118],"protects":[120],"against":[121,155],"first-order":[122],"or":[124],"attacks":[126],"while":[127],"keeping":[128],"implementation":[130],"costs":[131],"low":[133],"possible.":[135],"made":[137],"use":[138],"state":[140],"art":[143],"masking":[144],"techniques":[145],"novel":[149],"protect":[152],"memory":[153],"access":[154],"SCA.":[156],"Practical":[157],"results":[158,165],"provided":[160],"that":[161],"demonstrate":[162],"leakage":[164],"various":[167],"primitives":[169],"running":[170],"our":[172],"protected":[173],"hardware":[174],"platform.":[175]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2945461167","counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":12},{"year":2020,"cited_by_count":1}],"updated_date":"2025-02-25T11:31:02.683807","created_date":"2019-05-29"}