{"id":"https://openalex.org/W4235346328","doi":"https://doi.org/10.1109/fdtc.2007.4318989","title":"Passive and Active Combined Attacks: Combining Fault Attacks and Side Channel Analysis","display_name":"Passive and Active Combined Attacks: Combining Fault Attacks and Side Channel Analysis","publication_year":2007,"publication_date":"2007-09-01","ids":{"openalex":"https://openalex.org/W4235346328","doi":"https://doi.org/10.1109/fdtc.2007.4318989"},"language":"en","primary_location":{"id":"doi:10.1109/fdtc.2007.4318989","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fdtc.2007.4318989","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2007)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020421043","display_name":"Fr\u00e9d\u00e9ric Amiel","orcid":null},"institutions":[{"id":"https://openalex.org/I4210102433","display_name":"Gemalto (France)","ror":"https://ror.org/012p54t81","country_code":"FR","type":"company","lineage":["https://openalex.org/I4210087377","https://openalex.org/I4210102433","https://openalex.org/I4210140930"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Frederic Amiel","raw_affiliation_strings":["Security Laboratories, Gemalto, La Ciotat, France"],"affiliations":[{"raw_affiliation_string":"Security Laboratories, Gemalto, La Ciotat, France","institution_ids":["https://openalex.org/I4210102433"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013219914","display_name":"Karine Villegas","orcid":null},"institutions":[{"id":"https://openalex.org/I4210102433","display_name":"Gemalto (France)","ror":"https://ror.org/012p54t81","country_code":"FR","type":"company","lineage":["https://openalex.org/I4210087377","https://openalex.org/I4210102433","https://openalex.org/I4210140930"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Karine Villegas","raw_affiliation_strings":["Security Laboratories, Gemalto, La Ciotat, France"],"affiliations":[{"raw_affiliation_string":"Security Laboratories, Gemalto, La Ciotat, France","institution_ids":["https://openalex.org/I4210102433"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054066413","display_name":"Beno\u00eet Feix","orcid":null},"institutions":[{"id":"https://openalex.org/I4210099532","display_name":"Centre Paul Albert-F\u00e9vrier","ror":"https://ror.org/00wcvf151","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I21491767","https://openalex.org/I4210099532","https://openalex.org/I4210150854"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Benoit Feix","raw_affiliation_strings":["Inside Contactless, Aix-en-Provence, France"],"affiliations":[{"raw_affiliation_string":"Inside Contactless, Aix-en-Provence, France","institution_ids":["https://openalex.org/I4210099532"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028760991","display_name":"Louis Marcel","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Louis Marcel","raw_affiliation_strings":["K2CRYPT, Louvain-la-Neuve, France"],"affiliations":[{"raw_affiliation_string":"K2CRYPT, Louvain-la-Neuve, France","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5020421043"],"corresponding_institution_ids":["https://openalex.org/I4210102433"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.42386652,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9868999719619751,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9843000173568726,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.9383420944213867},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7248398065567017},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6033682227134705},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.49035143852233887},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4824960231781006},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.48024681210517883},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.41334325075149536},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4099036753177643},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.390809565782547},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.320421427488327},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.0636354386806488},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.05806189775466919}],"concepts":[{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.9383420944213867},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7248398065567017},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6033682227134705},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.49035143852233887},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4824960231781006},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.48024681210517883},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.41334325075149536},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4099036753177643},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.390809565782547},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.320421427488327},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0636354386806488},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.05806189775466919}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/fdtc.2007.4318989","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fdtc.2007.4318989","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2007)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","score":0.5099999904632568,"display_name":"Climate action"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W3006344745","https://openalex.org/W182679101","https://openalex.org/W2103519941","https://openalex.org/W3180573957","https://openalex.org/W4388857716","https://openalex.org/W2162805750","https://openalex.org/W2043669269","https://openalex.org/W2329175123","https://openalex.org/W1968560271","https://openalex.org/W2081998479"],"abstract_inverted_index":{"Side-channel":[0],"attacks":[1,33,43,60],"have":[2,82],"been":[3,83],"deeply":[4],"studied":[5],"for":[6,50],"years":[7],"to":[8,63,100],"ensure":[9],"the":[10,20,65],"tamper":[11],"resistance":[12],"of":[13,19,41,59,72,80,93,104],"embedded":[14],"implementations.":[15],"Analysis":[16],"are":[17,86,106],"most":[18],"time":[21],"focused":[22],"either":[23],"on":[24,31,76],"passive":[25],"attack":[26],"(side":[27],"channel":[28],"attack)":[29],"or":[30],"active":[32],"(fault":[34],"attack).":[35],"In":[36],"this":[37,102],"article,":[38],"a":[39,77,90],"combination":[40],"both":[42],"is":[44,47,96],"presented.":[45],"It":[46],"named":[48],"PACA":[49],"Passive":[51],"and":[52,85,98],"Active":[53],"Combined":[54],"Attacks.":[55],"This":[56],"new":[57,91],"class":[58],"allows":[61],"us":[62],"recover":[64],"secret":[66],"key":[67],"with":[68],"only":[69],"one":[70],"curve":[71],"leakages.":[73],"Practical":[74],"results":[75],"secure":[78],"implementation":[79],"RSA":[81],"obtained":[84],"presented":[87],"here.":[88],"Finally,":[89],"kind":[92],"infective":[94],"methodology":[95],"defined":[97],"countermeasures":[99],"counteract":[101],"type":[103],"analysis":[105],"introduced.":[107]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
