{"id":"https://openalex.org/W1971023028","doi":"https://doi.org/10.1109/cicc.2014.6946135","title":"Impact of inductive integrated voltage regulator on the power attack vulnerability of encryption engines: A simulation study","display_name":"Impact of inductive integrated voltage regulator on the power attack vulnerability of encryption engines: A simulation study","publication_year":2014,"publication_date":"2014-09-01","ids":{"openalex":"https://openalex.org/W1971023028","doi":"https://doi.org/10.1109/cicc.2014.6946135","mag":"1971023028"},"language":"en","primary_location":{"id":"doi:10.1109/cicc.2014.6946135","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cicc.2014.6946135","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the IEEE 2014 Custom Integrated Circuits Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061466560","display_name":"Monodeep Kar","orcid":"https://orcid.org/0000-0002-9318-6793"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"M. Kar","raw_affiliation_strings":["Georgia Institute of Technology, Atlanta, GA, US","Georgia Institute of Technology Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology, Atlanta, GA, US","institution_ids":["https://openalex.org/I130701444"]},{"raw_affiliation_string":"Georgia Institute of Technology Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034116231","display_name":"Donald Y.C. Lie","orcid":"https://orcid.org/0000-0002-1788-8910"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"D. Lie","raw_affiliation_strings":["Georgia Institute of Technology, Atlanta, GA, US","Georgia Institute of Technology Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology, Atlanta, GA, US","institution_ids":["https://openalex.org/I130701444"]},{"raw_affiliation_string":"Georgia Institute of Technology Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004682100","display_name":"Marilyn Wolf","orcid":"https://orcid.org/0000-0002-4742-0841"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"M. Wolf","raw_affiliation_strings":["Georgia Institute of Technology, Atlanta, GA, US","Georgia Institute of Technology Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology, Atlanta, GA, US","institution_ids":["https://openalex.org/I130701444"]},{"raw_affiliation_string":"Georgia Institute of Technology Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076642880","display_name":"Vivek De","orcid":"https://orcid.org/0000-0001-5207-1079"},"institutions":[{"id":"https://openalex.org/I1343180700","display_name":"Intel (United States)","ror":"https://ror.org/01ek73717","country_code":"US","type":"company","lineage":["https://openalex.org/I1343180700"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"V. De","raw_affiliation_strings":["Intel Labs, Hillsboro, OR, USA","[Intel Labs, Hillsboro, OR, USA]"],"affiliations":[{"raw_affiliation_string":"Intel Labs, Hillsboro, OR, USA","institution_ids":["https://openalex.org/I1343180700"]},{"raw_affiliation_string":"[Intel Labs, Hillsboro, OR, USA]","institution_ids":["https://openalex.org/I1343180700"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009591041","display_name":"Saibal Mukhopadhyay","orcid":"https://orcid.org/0000-0002-8894-3390"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"S. Mukhopadhyay","raw_affiliation_strings":["Georgia Institute of Technology, Atlanta, GA, US","Georgia Institute of Technology Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology, Atlanta, GA, US","institution_ids":["https://openalex.org/I130701444"]},{"raw_affiliation_string":"Georgia Institute of Technology Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5061466560"],"corresponding_institution_ids":["https://openalex.org/I130701444"],"apc_list":null,"apc_paid":null,"fwci":2.8631,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.916128,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9857000112533569,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6333493590354919},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5714685916900635},{"id":"https://openalex.org/keywords/duty-cycle","display_name":"Duty cycle","score":0.5125210285186768},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.47929590940475464},{"id":"https://openalex.org/keywords/envelope","display_name":"Envelope (radar)","score":0.4723072052001953},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.47169259190559387},{"id":"https://openalex.org/keywords/voltage","display_name":"Voltage","score":0.430117666721344},{"id":"https://openalex.org/keywords/electronic-engineering","display_name":"Electronic engineering","score":0.4099234938621521},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40265244245529175},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.37520915269851685},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.33354437351226807},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.20334592461585999},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.07537680864334106}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6333493590354919},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5714685916900635},{"id":"https://openalex.org/C199822604","wikidata":"https://www.wikidata.org/wiki/Q557120","display_name":"Duty cycle","level":3,"score":0.5125210285186768},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.47929590940475464},{"id":"https://openalex.org/C65155139","wikidata":"https://www.wikidata.org/wiki/Q5380912","display_name":"Envelope (radar)","level":3,"score":0.4723072052001953},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.47169259190559387},{"id":"https://openalex.org/C165801399","wikidata":"https://www.wikidata.org/wiki/Q25428","display_name":"Voltage","level":2,"score":0.430117666721344},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.4099234938621521},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40265244245529175},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.37520915269851685},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.33354437351226807},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.20334592461585999},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.07537680864334106},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C554190296","wikidata":"https://www.wikidata.org/wiki/Q47528","display_name":"Radar","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cicc.2014.6946135","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cicc.2014.6946135","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the IEEE 2014 Custom Integrated Circuits Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","score":0.6800000071525574,"display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1482353292","https://openalex.org/W1562542037","https://openalex.org/W1589364525","https://openalex.org/W1971466600","https://openalex.org/W1971575710","https://openalex.org/W2112073852","https://openalex.org/W2118242534","https://openalex.org/W2144765857","https://openalex.org/W2154909745","https://openalex.org/W2157150548","https://openalex.org/W3149463215","https://openalex.org/W6628812671","https://openalex.org/W6633579635","https://openalex.org/W6682554491","https://openalex.org/W6683276401"],"related_works":["https://openalex.org/W2900105712","https://openalex.org/W4385507351","https://openalex.org/W881306924","https://openalex.org/W2885118911","https://openalex.org/W2808114008","https://openalex.org/W2017269528","https://openalex.org/W4252409419","https://openalex.org/W2367195577","https://openalex.org/W3127012794","https://openalex.org/W2242290487"],"abstract_inverted_index":{"This":[0],"paper":[1],"shows":[2],"that":[3],"inductive":[4],"integrated":[5],"voltage":[6],"regulators":[7],"(IVR)":[8],"provide":[9,51],"significant":[10],"immunity":[11,53],"to":[12,50,54],"traditional":[13],"power":[14,55],"attacks":[15],"on":[16,21],"crypto":[17],"encryption":[18],"engines":[19],"based":[20],"timedomain":[22],"analysis":[23],"of":[24,30,35],"the":[25,36],"chip":[26],"current.":[27],"Frequency-domain":[28],"analyses":[29],"envelope":[31],"and":[32],"duty":[33],"cycle":[34],"current":[37],"are":[38],"identified":[39],"as":[40],"new":[41],"attack":[42],"modes.":[43],"The":[44],"security-aware":[45],"IVR":[46],"design":[47],"is":[48],"discussed":[49],"additional":[52],"attack.":[56]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
