{"id":"https://openalex.org/W2918476742","doi":"https://doi.org/10.1007/978-3-030-23696-0_19","title":"Analysis of Two Countermeasures Against the Signal Leakage Attack","display_name":"Analysis of Two Countermeasures Against the Signal Leakage Attack","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2918476742","doi":"https://doi.org/10.1007/978-3-030-23696-0_19","mag":"2918476742"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-23696-0_19","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-23696-0_19","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025289290","display_name":"Ke Wang","orcid":"https://orcid.org/0000-0001-7189-9293"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ke Wang","raw_affiliation_strings":["TCA Laboratory, State Key Laboratory of Computer Science, Institute of Software Chinese Academy of Sciences, Beijing, China","University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"TCA Laboratory, State Key Laboratory of Computer Science, Institute of Software Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]},{"raw_affiliation_string":"University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":null,"display_name":"Haodong Jiang","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haodong Jiang","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, China","TCA Laboratory, State Key Laboratory of Computer Science, Institute of Software Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, China","institution_ids":[]},{"raw_affiliation_string":"TCA Laboratory, State Key Laboratory of Computer Science, Institute of Software Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5025289290"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210128818","https://openalex.org/I4210165038"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.037222,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2019","issue":null,"first_page":"370","last_page":"388"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9842000007629395,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9842000007629395,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9765999913215637,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9642999768257141,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.7163183689117432},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6319761276245117},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.563627302646637},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.526852011680603},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.05223888158798218}],"concepts":[{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.7163183689117432},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6319761276245117},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.563627302646637},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.526852011680603},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.05223888158798218},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-030-23696-0_19","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-23696-0_19","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"mag:2918476742","is_oa":false,"landing_page_url":"https://dblp.uni-trier.de/db/journals/iacr/iacr2019.html#WangZ19","pdf_url":null,"source":{"id":"https://openalex.org/S2764847869","display_name":"IACR Cryptology ePrint Archive","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":["https://openalex.org/P4322614454"],"host_organization_lineage_names":["Cryptology ePrint Archive"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Cryptology ePrint Archive","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.46000000834465027,"display_name":"Climate action","id":"https://metadata.un.org/sdg/13"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W151792660","https://openalex.org/W580467909","https://openalex.org/W1494049356","https://openalex.org/W1595771334","https://openalex.org/W1994790157","https://openalex.org/W2098290658","https://openalex.org/W2113333997","https://openalex.org/W2142048307","https://openalex.org/W2156186849","https://openalex.org/W2514893051","https://openalex.org/W2592817464","https://openalex.org/W2739993935","https://openalex.org/W2781263269","https://openalex.org/W2790345837","https://openalex.org/W2791001592","https://openalex.org/W2794472443","https://openalex.org/W2794563709","https://openalex.org/W2795139011","https://openalex.org/W2914825969","https://openalex.org/W2915352631","https://openalex.org/W6724049718","https://openalex.org/W6732833615","https://openalex.org/W6750232762"],"related_works":["https://openalex.org/W2946747873","https://openalex.org/W2058413145","https://openalex.org/W1969758748","https://openalex.org/W3158285714","https://openalex.org/W3183400603","https://openalex.org/W1437462824","https://openalex.org/W3107871885","https://openalex.org/W3207192402","https://openalex.org/W3008088605","https://openalex.org/W2348740280","https://openalex.org/W3034651701","https://openalex.org/W2018494166","https://openalex.org/W153933648","https://openalex.org/W2055377709","https://openalex.org/W3009105181","https://openalex.org/W1848248418","https://openalex.org/W2510988858","https://openalex.org/W2019801073","https://openalex.org/W1839956289","https://openalex.org/W2805111206"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2026-03-25T23:56:10.502304","created_date":"2025-10-10T00:00:00"}
