{"id":"https://openalex.org/W3147584606","doi":"https://doi.org/10.1109/date.2010.5456907","title":"Improved countermeasure against Address-bit DPA for ECC scalar multiplication","display_name":"Improved countermeasure against Address-bit DPA for ECC scalar multiplication","publication_year":2010,"publication_date":"2010-03-01","ids":{"openalex":"https://openalex.org/W3147584606","doi":"https://doi.org/10.1109/date.2010.5456907","mag":"3147584606"},"language":"en","primary_location":{"id":"doi:10.1109/date.2010.5456907","is_oa":false,"landing_page_url":"https://doi.org/10.1109/date.2010.5456907","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE 2010)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071428101","display_name":"Masami Izumi","orcid":null},"institutions":[{"id":"https://openalex.org/I20529979","display_name":"University of Electro-Communications","ror":"https://ror.org/02x73b849","country_code":"JP","type":"education","lineage":["https://openalex.org/I20529979"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Masami Izumi","raw_affiliation_strings":["University of Electro-Communications, Chofu, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"University of Electro-Communications, Chofu, Tokyo, Japan","institution_ids":["https://openalex.org/I20529979"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071581989","display_name":"Jun Ikegami","orcid":null},"institutions":[{"id":"https://openalex.org/I20529979","display_name":"University of Electro-Communications","ror":"https://ror.org/02x73b849","country_code":"JP","type":"education","lineage":["https://openalex.org/I20529979"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Jun Ikegami","raw_affiliation_strings":["University of Electro-Communications, Chofu, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"University of Electro-Communications, Chofu, Tokyo, Japan","institution_ids":["https://openalex.org/I20529979"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020285271","display_name":"Kazuo Sakiyama","orcid":"https://orcid.org/0000-0002-4414-815X"},"institutions":[{"id":"https://openalex.org/I20529979","display_name":"University of Electro-Communications","ror":"https://ror.org/02x73b849","country_code":"JP","type":"education","lineage":["https://openalex.org/I20529979"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kazuo Sakiyama","raw_affiliation_strings":["University of Electro-Communications, Chofu, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"University of Electro-Communications, Chofu, Tokyo, Japan","institution_ids":["https://openalex.org/I20529979"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059115535","display_name":"Kazuo Ohta","orcid":"https://orcid.org/0000-0003-3658-0409"},"institutions":[{"id":"https://openalex.org/I20529979","display_name":"University of Electro-Communications","ror":"https://ror.org/02x73b849","country_code":"JP","type":"education","lineage":["https://openalex.org/I20529979"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kazuo Ohta","raw_affiliation_strings":["University of Electro-Communications, Chofu, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"University of Electro-Communications, Chofu, Tokyo, Japan","institution_ids":["https://openalex.org/I20529979"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5071428101"],"corresponding_institution_ids":["https://openalex.org/I20529979"],"apc_list":null,"apc_paid":null,"fwci":1.3572,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.86054309,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"981","last_page":"984"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7331933379173279},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6108387112617493},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.6078202724456787},{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.6071025729179382},{"id":"https://openalex.org/keywords/timing-attack","display_name":"Timing attack","score":0.5911719799041748},{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.5736833214759827},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.4821986258029938},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4156811237335205},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.41150784492492676},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3736041784286499},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.36125296354293823},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.3289564251899719},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.16012102365493774},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09791547060012817},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.07528635859489441}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7331933379173279},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6108387112617493},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.6078202724456787},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.6071025729179382},{"id":"https://openalex.org/C28420585","wikidata":"https://www.wikidata.org/wiki/Q2665075","display_name":"Timing attack","level":4,"score":0.5911719799041748},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.5736833214759827},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.4821986258029938},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4156811237335205},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.41150784492492676},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3736041784286499},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.36125296354293823},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.3289564251899719},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.16012102365493774},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09791547060012817},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.07528635859489441},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/date.2010.5456907","is_oa":false,"landing_page_url":"https://doi.org/10.1109/date.2010.5456907","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE 2010)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy","score":0.4699999988079071}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1510418153","https://openalex.org/W1527460828","https://openalex.org/W1565369953","https://openalex.org/W1971605365","https://openalex.org/W2144952508","https://openalex.org/W2154909745","https://openalex.org/W6630451426","https://openalex.org/W6633902989","https://openalex.org/W6682554491"],"related_works":["https://openalex.org/W1971956962","https://openalex.org/W4384807855","https://openalex.org/W1533979697","https://openalex.org/W2981727040","https://openalex.org/W2170261837","https://openalex.org/W4244949874","https://openalex.org/W2083001766","https://openalex.org/W2127307719","https://openalex.org/W2809979774","https://openalex.org/W2482982817"],"abstract_inverted_index":{"Messerges,":[0],"Dabbish":[1],"and":[2,30,123],"Sloan":[3],"proposed":[4,32,112],"a":[5,60,75,104,128,141],"DPA":[6,21],"attack":[7,16],"which":[8],"analyzes":[9],"the":[10,19,53,65,72,79,85,91,100,107,110,117,120,133,137],"address":[11,36,54],"values":[12],"of":[13,46,87,109,119,135],"registers.":[14],"This":[15,94],"is":[17,62,82],"called":[18],"Address-bit":[20],"(ADPA)":[22],"attack.":[23],"As":[24,103],"countermeasures":[25,48],"against":[26],"ADPA,":[27],"Itoh,":[28],"Izu":[29],"Takenaka":[31],"algorithms":[33],"that":[34,44],"randomizes":[35],"bits.":[37],"In":[38],"this":[39],"paper,":[40],"we":[41,114,139],"point":[42],"out":[43],"one":[45,69],"their":[47],"has":[49],"vulnerability":[50],"even":[51],"if":[52],"bits":[55,122],"are":[56],"uniformly":[57],"randomized.":[58],"When":[59],"register":[61,73],"overwritten":[63,89],"by":[64,90],"same":[66],"data":[67,76],"as":[68],"stored":[70],"in":[71,106],"during":[74],"move":[77],"process,":[78],"power":[80,101],"consumption":[81],"lower":[83],"than":[84],"case":[86,108],"being":[88],"different":[92],"data.":[93],"fact":[95],"enables":[96],"us":[97],"to":[98,126],"separate":[99],"traces.":[102],"result,":[105],"algorithm":[111],"in,":[113],"could":[115],"invalidate":[116],"randomness":[118],"random":[121],"perform":[124],"ADPA":[125],"retrieve":[127],"secret":[129],"key.":[130],"Moreover,":[131],"for":[132],"purpose":[134],"overcoming":[136],"vulnerability,":[138],"propose":[140],"new":[142],"countermeasure":[143],"algorithm.":[144]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
