{"id":"https://openalex.org/W3213857549","doi":"https://doi.org/10.1109/access.2021.3126703","title":"Correlation Power Analysis Attack Resisted Cryptographic RISC-V SoC With Random Dynamic Frequency Scaling Countermeasure","display_name":"Correlation Power Analysis Attack Resisted Cryptographic RISC-V SoC With Random Dynamic Frequency Scaling Countermeasure","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3213857549","doi":"https://doi.org/10.1109/access.2021.3126703","mag":"3213857549"},"language":"en","primary_location":{"id":"doi:10.1109/access.2021.3126703","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3126703","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2021.3126703","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061203663","display_name":"Ba-Anh Dao","orcid":"https://orcid.org/0000-0002-8761-6398"},"institutions":[{"id":"https://openalex.org/I4210155035","display_name":"Academy of Cryptography Techniques","ror":"https://ror.org/05nfbnp91","country_code":"VN","type":"education","lineage":["https://openalex.org/I4210155035"]},{"id":"https://openalex.org/I20529979","display_name":"University of Electro-Communications","ror":"https://ror.org/02x73b849","country_code":"JP","type":"education","lineage":["https://openalex.org/I20529979"]}],"countries":["JP","VN"],"is_corresponding":true,"raw_author_name":"Ba-Anh Dao","raw_affiliation_strings":["Department of Information and Network Engineering, University of Electro-Communications (UEC), Tokyo 182-8585, Japan and Academy of Cryptography Techniques (ACT), Hanoi 12511, Vietnam. (e-mail: daobaanhvn1991@gmail.com)","Department of Computer and Network Engineering, The University of Electro-Communications (UEC), Chofu, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Information and Network Engineering, University of Electro-Communications (UEC), Tokyo 182-8585, Japan and Academy of Cryptography Techniques (ACT), Hanoi 12511, Vietnam. (e-mail: daobaanhvn1991@gmail.com)","institution_ids":["https://openalex.org/I4210155035"]},{"raw_affiliation_string":"Department of Computer and Network Engineering, The University of Electro-Communications (UEC), Chofu, Tokyo, Japan","institution_ids":["https://openalex.org/I20529979"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025387024","display_name":"Trong-Thuc Hoang","orcid":"https://orcid.org/0000-0002-4078-0836"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Trong-Thuc Hoang","raw_affiliation_strings":["Department of Information and Network Engineering, University of Electro-Communications (UEC), Tokyo 182-8585, Japan and National Institute of Advanced Industrial Science and Technology (AIST), Tokyo 135-0064, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Information and Network Engineering, University of Electro-Communications (UEC), Tokyo 182-8585, Japan and National Institute of Advanced Industrial Science and Technology (AIST), Tokyo 135-0064, Japan","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079494474","display_name":"Anh-Tien Le","orcid":"https://orcid.org/0000-0001-9052-4796"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Anh-Tien Le","raw_affiliation_strings":["Department of Information and Network Engineering, University of Electro-Communications (UEC), Tokyo 182-8585, Japan and Academy of Cryptography Techniques (ACT), Hanoi 12511, Vietnam"],"affiliations":[{"raw_affiliation_string":"Department of Information and Network Engineering, University of Electro-Communications (UEC), Tokyo 182-8585, Japan and Academy of Cryptography Techniques (ACT), Hanoi 12511, Vietnam","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102897632","display_name":"Akira Tsukamoto","orcid":"https://orcid.org/0000-0002-3339-7177"},"institutions":[{"id":"https://openalex.org/I73613424","display_name":"National Institute of Advanced Industrial Science and Technology","ror":"https://ror.org/01703db54","country_code":"JP","type":"government","lineage":["https://openalex.org/I73613424"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Akira Tsukamoto","raw_affiliation_strings":["National Institute of Advanced Industrial Science and Technology (AIST), Tokyo 135-0064, Japan"],"affiliations":[{"raw_affiliation_string":"National Institute of Advanced Industrial Science and Technology (AIST), Tokyo 135-0064, Japan","institution_ids":["https://openalex.org/I73613424"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067274985","display_name":"Kuniyasu Suzaki","orcid":"https://orcid.org/0000-0003-0912-0087"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kuniyasu Suzaki","raw_affiliation_strings":["Technology Research Association of Secure IoT Edge Application based on RISC-V Open Architecture (TRASIO), Tokyo 101-0022, Japan and National Institute of Advanced Industrial Science and Technology (AIST), Tokyo 135-0064, Japan"],"affiliations":[{"raw_affiliation_string":"Technology Research Association of Secure IoT Edge Application based on RISC-V Open Architecture (TRASIO), Tokyo 101-0022, Japan and National Institute of Advanced Industrial Science and Technology (AIST), Tokyo 135-0064, Japan","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042912660","display_name":"Cong\u2010Kha Pham","orcid":"https://orcid.org/0000-0001-5255-4919"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Cong-Kha Pham","raw_affiliation_strings":["Department of Information and Network Engineering, University of Electro-Communications (UEC), Tokyo 182-8585, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Information and Network Engineering, University of Electro-Communications (UEC), Tokyo 182-8585, Japan","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5061203663"],"corresponding_institution_ids":["https://openalex.org/I20529979","https://openalex.org/I4210155035"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":1.6317,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.86881697,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"9","issue":null,"first_page":"151993","last_page":"152014"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7232956886291504},{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.7204592823982239},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.7189729809761047},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6362330317497253},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5568444132804871},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.5228222608566284},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2843232750892639},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.15977990627288818}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7232956886291504},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.7204592823982239},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.7189729809761047},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6362330317497253},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5568444132804871},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.5228222608566284},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2843232750892639},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.15977990627288818},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2021.3126703","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3126703","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:36ee190b07044c1ba9e2c48d443dc18d","is_oa":true,"landing_page_url":"https://doaj.org/article/36ee190b07044c1ba9e2c48d443dc18d","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 9, Pp 151993-152014 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2021.3126703","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3126703","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5299999713897705,"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy"}],"awards":[{"id":"https://openalex.org/G2280667928","display_name":null,"funder_award_id":"JPNP16007","funder_id":"https://openalex.org/F4320321034","funder_display_name":"New Energy and Industrial Technology Development Organization"}],"funders":[{"id":"https://openalex.org/F4320321034","display_name":"New Energy and Industrial Technology Development Organization","ror":"https://ror.org/0055k7a87"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":66,"referenced_works":["https://openalex.org/W220440441","https://openalex.org/W1536793196","https://openalex.org/W1548656471","https://openalex.org/W1562542037","https://openalex.org/W1564536482","https://openalex.org/W1569151289","https://openalex.org/W1583916291","https://openalex.org/W1587168963","https://openalex.org/W1602420333","https://openalex.org/W1607006990","https://openalex.org/W1897761346","https://openalex.org/W2062989416","https://openalex.org/W2085047356","https://openalex.org/W2096434182","https://openalex.org/W2096490242","https://openalex.org/W2117082663","https://openalex.org/W2134620466","https://openalex.org/W2150892302","https://openalex.org/W2154909745","https://openalex.org/W2169239906","https://openalex.org/W2238524642","https://openalex.org/W2556867355","https://openalex.org/W2592705047","https://openalex.org/W2746796098","https://openalex.org/W2754086343","https://openalex.org/W2783000584","https://openalex.org/W2891024670","https://openalex.org/W2914572864","https://openalex.org/W2921643410","https://openalex.org/W2923594358","https://openalex.org/W2945279851","https://openalex.org/W2945461167","https://openalex.org/W2946037791","https://openalex.org/W2953355178","https://openalex.org/W2954599081","https://openalex.org/W2954759489","https://openalex.org/W2955948031","https://openalex.org/W2997725831","https://openalex.org/W3008474499","https://openalex.org/W3011986163","https://openalex.org/W3016469544","https://openalex.org/W3017176019","https://openalex.org/W3025694286","https://openalex.org/W3030183593","https://openalex.org/W3036199712","https://openalex.org/W3093818042","https://openalex.org/W3095881781","https://openalex.org/W3114532883","https://openalex.org/W3115689981","https://openalex.org/W3118895137","https://openalex.org/W3128773947","https://openalex.org/W3132320626","https://openalex.org/W3147148047","https://openalex.org/W3159444988","https://openalex.org/W3165742426","https://openalex.org/W3168919124","https://openalex.org/W3171450698","https://openalex.org/W3177061203","https://openalex.org/W3185293842","https://openalex.org/W3199667790","https://openalex.org/W4246957851","https://openalex.org/W4251361495","https://openalex.org/W4251742697","https://openalex.org/W6635937959","https://openalex.org/W6682554491","https://openalex.org/W6760511384"],"related_works":["https://openalex.org/W5280335","https://openalex.org/W3010323642","https://openalex.org/W4384807855","https://openalex.org/W2164725015","https://openalex.org/W4323926098","https://openalex.org/W2121017442","https://openalex.org/W182679101","https://openalex.org/W1968560271","https://openalex.org/W2081998479","https://openalex.org/W2043669269"],"abstract_inverted_index":{"Cryptographic":[0],"System-on-Chips":[1],"(SoCs)":[2],"are":[3,14],"becoming":[4],"more":[5,7,84,145],"and":[6,26,79,117,141],"popular.":[8],"In":[9],"these":[10],"systems,":[11],"cryptographic":[12,39,93],"accelerators":[13],"integrated":[15],"with":[16,22,144],"processor":[17],"cores":[18],"to":[19,34,59,157],"provide":[20],"users":[21],"the":[23,36,49,61,71,92,98,130,153,167],"software\u2019s":[24],"flexibility":[25],"hardware\u2019s":[27],"high":[28],"performance.":[29],"First,":[30],"this":[31],"work":[32],"aimed":[33],"confirm":[35],"vulnerability":[37],"of":[38,44,63,97],"SoCs":[40],"against":[41,172],"several":[42],"types":[43],"power":[45,72,149],"analysis":[46,73],"attacks.":[47,174],"Then,":[48],"novel":[50],"Random":[51],"Dynamic":[52],"Frequency":[53],"Scaling":[54],"(RDFS)":[55],"countermeasure":[56,69,101,136,164],"is":[57,102,152],"proposed":[58,67,99,162],"improve":[60],"resistance":[62,74,171],"such":[64],"systems.":[65],"The":[66,95,125,161],"RDFS":[68,100,135,163],"improved":[70],"while":[75],"maintaining":[76],"low-performance":[77],"overhead":[78],"hardware":[80],"costs":[81],"by":[82,104,134],"generating":[83],"than":[85,146],"219,000":[86],"distinct":[87],"frequencies":[88],"for":[89],"driving":[90],"only":[91],"accelerators.":[94],"effectiveness":[96],"demonstrated":[103],"conducting":[105],"realistic":[106],"Correlation":[107],"Power":[108],"Analysis":[109,114],"(CPA)":[110],"attacks,":[111,116],"Deep-Learning-based":[112],"Side-Channel":[113],"(DL-SCA)":[115],"Test":[118],"Vector":[119],"Leakage":[120],"Assessment":[121],"(TVLA)":[122],"testing":[123],"methodology.":[124],"experimental":[126],"results":[127],"show":[128],"that":[129],"RISC-V":[131,169],"SoC":[132],"protected":[133],"can":[137],"withstand":[138],"CPA":[139],"attacks":[140],"TVLA":[142],"test":[143],"five":[147],"million":[148],"traces,":[150],"which":[151],"best":[154],"result":[155],"compared":[156],"other":[158],"related":[159],"works.":[160],"also":[165],"harden":[166],"targeted":[168],"SoC\u2019s":[170],"DL-SCA":[173]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
