{"id":"https://openalex.org/W1892437021","doi":"https://doi.org/10.1109/dft.2015.7315146","title":"Scan attack on Elliptic Curve Cryptosystem","display_name":"Scan attack on Elliptic Curve Cryptosystem","publication_year":2015,"publication_date":"2015-10-01","ids":{"openalex":"https://openalex.org/W1892437021","doi":"https://doi.org/10.1109/dft.2015.7315146","mag":"1892437021"},"language":"en","primary_location":{"id":"doi:10.1109/dft.2015.7315146","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dft.2015.7315146","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039350964","display_name":"Sk Subidh Ali","orcid":"https://orcid.org/0000-0001-5942-4455"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]},{"id":"https://openalex.org/I120250893","display_name":"New York University Abu Dhabi","ror":"https://ror.org/00e5k0821","country_code":"AE","type":"education","lineage":["https://openalex.org/I120250893","https://openalex.org/I57206974"]}],"countries":["AE","US"],"is_corresponding":true,"raw_author_name":"Sk Subidh Ali","raw_affiliation_strings":["New York University Abu Dhabi (NYUAD)","New York University Abu Dhabi (NYUAD), USA"],"affiliations":[{"raw_affiliation_string":"New York University Abu Dhabi (NYUAD)","institution_ids":["https://openalex.org/I57206974"]},{"raw_affiliation_string":"New York University Abu Dhabi (NYUAD), USA","institution_ids":["https://openalex.org/I120250893"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059987567","display_name":"Ozgur Sinanoglu","orcid":"https://orcid.org/0000-0003-0782-0397"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]},{"id":"https://openalex.org/I120250893","display_name":"New York University Abu Dhabi","ror":"https://ror.org/00e5k0821","country_code":"AE","type":"education","lineage":["https://openalex.org/I120250893","https://openalex.org/I57206974"]}],"countries":["AE","US"],"is_corresponding":false,"raw_author_name":"Ozgur Sinanoglu","raw_affiliation_strings":["New York University Abu Dhabi (NYUAD)","New York University Abu Dhabi (NYUAD), USA"],"affiliations":[{"raw_affiliation_string":"New York University Abu Dhabi (NYUAD)","institution_ids":["https://openalex.org/I57206974"]},{"raw_affiliation_string":"New York University Abu Dhabi (NYUAD), USA","institution_ids":["https://openalex.org/I120250893"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5039350964"],"corresponding_institution_ids":["https://openalex.org/I120250893","https://openalex.org/I57206974"],"apc_list":null,"apc_paid":null,"fwci":2.3838,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.90630068,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"18","issue":null,"first_page":"115","last_page":"118"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7387029528617859},{"id":"https://openalex.org/keywords/scalar-multiplication","display_name":"Scalar multiplication","score":0.6197140216827393},{"id":"https://openalex.org/keywords/testability","display_name":"Testability","score":0.5359339118003845},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5288694500923157},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5125312805175781},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.5118862390518188},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4913715422153473},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.4776783585548401},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4739023745059967},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.34720051288604736},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3203165829181671},{"id":"https://openalex.org/keywords/elliptic-curve","display_name":"Elliptic curve","score":0.29161956906318665},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.21205127239227295},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.14622312784194946}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7387029528617859},{"id":"https://openalex.org/C171182647","wikidata":"https://www.wikidata.org/wiki/Q126736","display_name":"Scalar multiplication","level":3,"score":0.6197140216827393},{"id":"https://openalex.org/C51234621","wikidata":"https://www.wikidata.org/wiki/Q2149495","display_name":"Testability","level":2,"score":0.5359339118003845},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5288694500923157},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5125312805175781},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.5118862390518188},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4913715422153473},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.4776783585548401},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4739023745059967},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.34720051288604736},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3203165829181671},{"id":"https://openalex.org/C179603306","wikidata":"https://www.wikidata.org/wiki/Q268493","display_name":"Elliptic curve","level":2,"score":0.29161956906318665},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.21205127239227295},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.14622312784194946},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dft.2015.7315146","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dft.2015.7315146","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6399999856948853,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1544260021","https://openalex.org/W1880212920","https://openalex.org/W2025669099","https://openalex.org/W2030474490","https://openalex.org/W2046867211","https://openalex.org/W2062658790","https://openalex.org/W2085362698","https://openalex.org/W2137298573","https://openalex.org/W2141715577","https://openalex.org/W2142537526","https://openalex.org/W2144980381","https://openalex.org/W2542022920","https://openalex.org/W4232599178","https://openalex.org/W6656822978","https://openalex.org/W6658201360","https://openalex.org/W6666443212","https://openalex.org/W6681113282"],"related_works":["https://openalex.org/W2946358183","https://openalex.org/W2070976279","https://openalex.org/W2188111145","https://openalex.org/W3203056599","https://openalex.org/W2952185445","https://openalex.org/W2343736460","https://openalex.org/W1993936776","https://openalex.org/W3000187300","https://openalex.org/W2351744923","https://openalex.org/W2102786134"],"abstract_inverted_index":{"We":[0],"present":[1],"a":[2,14,52,101,123],"new":[3],"scan":[4,21,97,169],"attack":[5,117,142],"on":[6,23,51,100],"hardware":[7,136],"implementation":[8,34],"of":[9,32,91,134,166],"Elliptic":[10],"Curve":[11],"Cryptography":[12],"(ECC),":[13],"representative":[15],"public":[16],"key":[17,49,71],"cipher.":[18],"The":[19,115],"existing":[20,96,168],"attacks":[22,61,98],"ECC":[24],"exploit":[25],"the":[26,33,37,42,47,56,69,73,84,89,92,110,119,131,135,145,149,159,167],"Design":[27],"for":[28],"Testability":[29],"(DfT)":[30],"infrastructure":[31],"to":[35,105,130,148],"identify":[36],"internal":[38,64,79,120],"registers":[39,65,80,121,128,146],"used":[40],"in":[41,55,72,122,158],"scalar":[43,57],"multiplication,":[44],"and":[45,152],"leak":[46],"secret":[48,70,85,150],"based":[50],"bit-flip":[53],"analysis":[54],"multiplication":[58],"registers.":[59,94],"These":[60],"assume":[62],"two":[63],"are":[66,81,138],"affected":[67,82],"by":[68,83,155],"ECC.":[74],"In":[75],"practical":[76],"implementations,":[77],"multiple":[78],"key,":[86,151],"significantly":[87],"complicating":[88],"identification":[90],"targeted":[93],"Furthermore,":[95],"rely":[99],"switch":[102],"from":[103],"normal":[104],"test":[106,160],"mode,":[107,161],"fail":[108],"against":[109],"widely":[111],"utilized":[112],"mode-reset":[113],"countermeasure.":[114],"proposed":[116],"identifies":[118,143],"depth-first":[124],"search":[125],"fashion,":[126],"where":[127],"corresponding":[129],"innermost":[132],"module":[133],"design":[137],"identified":[139],"first.":[140],"This":[141],"all":[144],"related":[147],"does":[153],"so":[154],"remaining":[156],"only":[157],"thus":[162],"overcoming":[163],"both":[164],"limitations":[165],"attacks.":[170]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2017,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
