{"id":"https://openalex.org/W2955281856","doi":"https://doi.org/10.1007/978-3-030-23696-0_18","title":"Side Channel Analysis of SPARX-64/128: Cryptanalysis and Countermeasures","display_name":"Side Channel Analysis of SPARX-64/128: Cryptanalysis and Countermeasures","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2955281856","doi":"https://doi.org/10.1007/978-3-030-23696-0_18","mag":"2955281856"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-23696-0_18","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-23696-0_18","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103122333","display_name":"Sumesh Manjunath Ramesh","orcid":"https://orcid.org/0000-0002-1604-5612"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sumesh Manjunath Ramesh","raw_affiliation_strings":["Center for Cyber Security, New York University Abu Dhabi, Abu Dhabi, UAE","Division of Engineering, New York University Abu Dhabi, Abu Dhabi, UAE","Tandon School of Engineering, New York University, New York, USA"],"affiliations":[{"raw_affiliation_string":"Center for Cyber Security, New York University Abu Dhabi, Abu Dhabi, UAE","institution_ids":[]},{"raw_affiliation_string":"Division of Engineering, New York University Abu Dhabi, Abu Dhabi, UAE","institution_ids":[]},{"raw_affiliation_string":"Tandon School of Engineering, New York University, New York, USA","institution_ids":["https://openalex.org/I57206974"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037093261","display_name":"Hoda Alkhzaimi","orcid":"https://orcid.org/0009-0005-3103-8321"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hoda AlKhzaimi","raw_affiliation_strings":["Center for Cyber Security, New York University Abu Dhabi, Abu Dhabi, UAE","Division of Engineering, New York University Abu Dhabi, Abu Dhabi, UAE","Tandon School of Engineering, New York University, New York, USA"],"affiliations":[{"raw_affiliation_string":"Center for Cyber Security, New York University Abu Dhabi, Abu Dhabi, UAE","institution_ids":[]},{"raw_affiliation_string":"Division of Engineering, New York University Abu Dhabi, Abu Dhabi, UAE","institution_ids":[]},{"raw_affiliation_string":"Tandon School of Engineering, New York University, New York, USA","institution_ids":["https://openalex.org/I57206974"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5103122333"],"corresponding_institution_ids":["https://openalex.org/I57206974"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.2756,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.54215116,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"352","last_page":"369"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9846000075340271,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9757999777793884,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.8229353427886963},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.798724889755249},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.6911367177963257},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.6504260301589966},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.6111871004104614},{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.6035834550857544},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.6015697717666626},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.5017452239990234},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.478471964597702},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4701162874698639},{"id":"https://openalex.org/keywords/modulo","display_name":"Modulo","score":0.4443756937980652},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.43135517835617065},{"id":"https://openalex.org/keywords/block-cipher-mode-of-operation","display_name":"Block cipher mode of operation","score":0.4167514443397522},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.38758575916290283},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.36594027280807495},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3581603169441223},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.3547768294811249},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3167445957660675},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22435322403907776},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.19709330797195435},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11904701590538025},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11443954706192017},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.1063825786113739},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.09832772612571716},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.06850376725196838}],"concepts":[{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.8229353427886963},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.798724889755249},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.6911367177963257},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.6504260301589966},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.6111871004104614},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.6035834550857544},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.6015697717666626},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.5017452239990234},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.478471964597702},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4701162874698639},{"id":"https://openalex.org/C54732982","wikidata":"https://www.wikidata.org/wiki/Q1415345","display_name":"Modulo","level":2,"score":0.4443756937980652},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.43135517835617065},{"id":"https://openalex.org/C60448319","wikidata":"https://www.wikidata.org/wiki/Q154021","display_name":"Block cipher mode of operation","level":2,"score":0.4167514443397522},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.38758575916290283},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.36594027280807495},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3581603169441223},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.3547768294811249},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3167445957660675},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22435322403907776},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.19709330797195435},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11904701590538025},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11443954706192017},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.1063825786113739},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.09832772612571716},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.06850376725196838},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-030-23696-0_18","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-23696-0_18","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1503689022","https://openalex.org/W1511360501","https://openalex.org/W1548656471","https://openalex.org/W1551131816","https://openalex.org/W1562542037","https://openalex.org/W1567394420","https://openalex.org/W1569151289","https://openalex.org/W1572300106","https://openalex.org/W1613874182","https://openalex.org/W1724890242","https://openalex.org/W1873852107","https://openalex.org/W1966092481","https://openalex.org/W2128197017","https://openalex.org/W2154909745","https://openalex.org/W2159327690","https://openalex.org/W2170478686","https://openalex.org/W2170489924","https://openalex.org/W2466176639","https://openalex.org/W2526639663","https://openalex.org/W2554376114","https://openalex.org/W2586046457","https://openalex.org/W2594349454","https://openalex.org/W2606287281","https://openalex.org/W2806164449","https://openalex.org/W2885083765","https://openalex.org/W2912147118","https://openalex.org/W3030624396","https://openalex.org/W4237882690"],"related_works":["https://openalex.org/W5280335","https://openalex.org/W2989964095","https://openalex.org/W2164725015","https://openalex.org/W2782264121","https://openalex.org/W4323926098","https://openalex.org/W4384807855","https://openalex.org/W2022533428","https://openalex.org/W182679101","https://openalex.org/W4244949874","https://openalex.org/W2029006445"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
