{"id":"https://openalex.org/W1433738083","doi":"https://doi.org/10.1007/978-3-642-31912-9_5","title":"An Efficient Leakage Characterization Method for Profiled Power Analysis Attacks","display_name":"An Efficient Leakage Characterization Method for Profiled Power Analysis Attacks","publication_year":2012,"publication_date":"2012-01-01","ids":{"openalex":"https://openalex.org/W1433738083","doi":"https://doi.org/10.1007/978-3-642-31912-9_5","mag":"1433738083"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-31912-9_5","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-31912-9_5","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100377405","display_name":"Hailong Zhang","orcid":"https://orcid.org/0000-0002-4903-010X"},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hailong Zhang","raw_affiliation_strings":["Graduate University of Chinese Academy of Sciences, 19A Yuquan Lu, Beijing, 100049, P.R. China","State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, P.O. Box 8718, Beijing, 100190, P.R. China","Graduate University of Chinese Academy of Sciences, Beijing, P.R. China","State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, P.R. China"],"affiliations":[{"raw_affiliation_string":"Graduate University of Chinese Academy of Sciences, 19A Yuquan Lu, Beijing, 100049, P.R. China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, P.O. Box 8718, Beijing, 100190, P.R. China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Graduate University of Chinese Academy of Sciences, Beijing, P.R. China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, P.R. China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063991302","display_name":"Yongbin Zhou","orcid":"https://orcid.org/0000-0002-1337-0655"},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongbin Zhou","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, P.O. Box 8718, Beijing, 100190, P.R. China","State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, P.R. China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, P.O. Box 8718, Beijing, 100190, P.R. China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, P.R. China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101790997","display_name":"Dengguo Feng","orcid":"https://orcid.org/0000-0002-8515-7124"},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dengguo Feng","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, P.O. Box 8718, Beijing, 100190, P.R. China","State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, P.R. China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, P.O. Box 8718, Beijing, 100190, P.R. China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, P.R. China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100377405"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210128818","https://openalex.org/I4210165038"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.13792209,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":null,"issue":null,"first_page":"61","last_page":"73"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7904068231582642},{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.7867211103439331},{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.6792682409286499},{"id":"https://openalex.org/keywords/covariance","display_name":"Covariance","score":0.5160593390464783},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.43825992941856384},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.41918885707855225},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.3720719516277313},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3458544611930847},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3414435386657715},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.330721914768219},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.3275679051876068},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2189525067806244},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1818820834159851},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.11184927821159363},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09046342968940735},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08552482724189758},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08187735080718994}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7904068231582642},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.7867211103439331},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.6792682409286499},{"id":"https://openalex.org/C178650346","wikidata":"https://www.wikidata.org/wiki/Q201984","display_name":"Covariance","level":2,"score":0.5160593390464783},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.43825992941856384},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.41918885707855225},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.3720719516277313},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3458544611930847},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3414435386657715},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.330721914768219},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3275679051876068},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2189525067806244},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1818820834159851},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.11184927821159363},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09046342968940735},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08552482724189758},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08187735080718994},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-642-31912-9_5","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-31912-9_5","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","score":0.75,"id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1489312470","https://openalex.org/W1499081748","https://openalex.org/W1514899339","https://openalex.org/W1549962104","https://openalex.org/W1560022750","https://openalex.org/W1562542037","https://openalex.org/W1595334710","https://openalex.org/W1752847028","https://openalex.org/W1797487015","https://openalex.org/W1862426464","https://openalex.org/W2055876860","https://openalex.org/W2153971105","https://openalex.org/W2154909745","https://openalex.org/W2188162208","https://openalex.org/W2480309795","https://openalex.org/W2484860292","https://openalex.org/W2486433473","https://openalex.org/W2490813647","https://openalex.org/W2491896407","https://openalex.org/W2493587259","https://openalex.org/W2495889793","https://openalex.org/W2496045601","https://openalex.org/W2612534041","https://openalex.org/W2914572864","https://openalex.org/W4240560709"],"related_works":["https://openalex.org/W2615598724","https://openalex.org/W154749848","https://openalex.org/W2358304601","https://openalex.org/W2365182058","https://openalex.org/W1739870862","https://openalex.org/W2099004443","https://openalex.org/W2461425825","https://openalex.org/W2161444195","https://openalex.org/W2148684293","https://openalex.org/W2079595599"],"abstract_inverted_index":null,"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
