{"id":"https://openalex.org/W4404030537","doi":"https://doi.org/10.1109/icccnt61001.2024.10725217","title":"Retracted: Effective Side-Channel Attacks for Cryptographic Keys","display_name":"Retracted: Effective Side-Channel Attacks for Cryptographic Keys","publication_year":2024,"publication_date":"2024-06-24","ids":{"openalex":"https://openalex.org/W4404030537","doi":"https://doi.org/10.1109/icccnt61001.2024.10725217"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt61001.2024.10725217","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt61001.2024.10725217","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092246813","display_name":"R Nishanthi","orcid":null},"institutions":[{"id":"https://openalex.org/I15517640","display_name":"Shri Venkateshwara University","ror":"https://ror.org/00xh8va68","country_code":"IN","type":"education","lineage":["https://openalex.org/I15517640"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"R Nishanthi","raw_affiliation_strings":["Prince Shri Venkateshwara Padmavathy Engineering College,Department of Computer Science and Engineering,Chennai,India,127"],"affiliations":[{"raw_affiliation_string":"Prince Shri Venkateshwara Padmavathy Engineering College,Department of Computer Science and Engineering,Chennai,India,127","institution_ids":["https://openalex.org/I15517640"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069115141","display_name":"Shivam Khurana","orcid":null},"institutions":[{"id":"https://openalex.org/I74319210","display_name":"Chitkara University","ror":"https://ror.org/057d6z539","country_code":"IN","type":"education","lineage":["https://openalex.org/I74319210"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Shivam Khurana","raw_affiliation_strings":["Chitkara University,Chitkara Centre for Research and Development,Himachal Pradesh,India,174103"],"affiliations":[{"raw_affiliation_string":"Chitkara University,Chitkara Centre for Research and Development,Himachal Pradesh,India,174103","institution_ids":["https://openalex.org/I74319210"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5104309476","display_name":"S Mithun Kumar","orcid":null},"institutions":[{"id":"https://openalex.org/I106826634","display_name":"Jain University","ror":"https://ror.org/01cnqpt53","country_code":"IN","type":"education","lineage":["https://openalex.org/I106826634"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"S Mithun Kumar","raw_affiliation_strings":["UG Management JAIN (Deemed to be University),School of Mangement,Bangalore,Karnataka,India"],"affiliations":[{"raw_affiliation_string":"UG Management JAIN (Deemed to be University),School of Mangement,Bangalore,Karnataka,India","institution_ids":["https://openalex.org/I106826634"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027943014","display_name":"Leena Deshpande","orcid":"https://orcid.org/0000-0001-7426-2028"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Leena A. Deshpande","raw_affiliation_strings":["Vishwakarma Institute of Technology,Department of Computer Engineering,Pune,India"],"affiliations":[{"raw_affiliation_string":"Vishwakarma Institute of Technology,Department of Computer Engineering,Pune,India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013623220","display_name":"N. Thangarasu","orcid":"https://orcid.org/0000-0001-6638-1262"},"institutions":[{"id":"https://openalex.org/I65220239","display_name":"Karpagam Academy of Higher Education","ror":"https://ror.org/00ssvzv66","country_code":"IN","type":"education","lineage":["https://openalex.org/I65220239"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"N. Thangarasu","raw_affiliation_strings":["Karpagam Academy of Higher Education,Department of Computer Science,Coimbatore,India,641021"],"affiliations":[{"raw_affiliation_string":"Karpagam Academy of Higher Education,Department of Computer Science,Coimbatore,India,641021","institution_ids":["https://openalex.org/I65220239"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5092244765","display_name":"Lalit Khanna","orcid":null},"institutions":[{"id":"https://openalex.org/I74319210","display_name":"Chitkara University","ror":"https://ror.org/057d6z539","country_code":"IN","type":"education","lineage":["https://openalex.org/I74319210"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Lalit Khanna","raw_affiliation_strings":["Chitkara University,Centre of Research Impact and Outcome,Rajpura,Punjab,India,140417"],"affiliations":[{"raw_affiliation_string":"Chitkara University,Centre of Research Impact and Outcome,Rajpura,Punjab,India,140417","institution_ids":["https://openalex.org/I74319210"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5092246813"],"corresponding_institution_ids":["https://openalex.org/I15517640"],"apc_list":null,"apc_paid":null,"fwci":0.3636,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.68682266,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":true,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9865000247955322,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.8064405918121338},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7286854982376099},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7109391689300537},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6914168000221252},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.5027172565460205},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4526410698890686},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4409201145172119}],"concepts":[{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.8064405918121338},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7286854982376099},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7109391689300537},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6914168000221252},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.5027172565460205},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4526410698890686},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4409201145172119}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt61001.2024.10725217","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt61001.2024.10725217","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W3010713844","https://openalex.org/W4380520581","https://openalex.org/W4383646532","https://openalex.org/W4387367773","https://openalex.org/W4389445778","https://openalex.org/W4390700796","https://openalex.org/W4391021138","https://openalex.org/W4391770349","https://openalex.org/W4391923930","https://openalex.org/W4394712519","https://openalex.org/W4395038177"],"related_works":["https://openalex.org/W182679101","https://openalex.org/W3006344745","https://openalex.org/W2904818008","https://openalex.org/W2103519941","https://openalex.org/W1982325601","https://openalex.org/W4240432851","https://openalex.org/W2289378658","https://openalex.org/W1531360494","https://openalex.org/W1988007309","https://openalex.org/W154233216"],"abstract_inverted_index":{"This":[0,84],"technical":[1,85],"summary":[2,86],"examines":[3],"effective":[4],"aspect-channel":[5],"assaults":[6,11,36],"for":[7,119],"cryptographic":[8,14],"keys.":[9],"Facet-channel":[10],"involve":[12],"acquiring":[13],"keys":[15,66],"or":[16,28,40,46,55,70],"other":[17,81],"personal":[18],"statistics":[19,56],"by":[20],"observing":[21],"patterns":[22],"in":[23],"the":[24,29,42,65,91,114,123],"target":[25],"gadget\u2019s":[26],"conduct":[27],"environment":[30],"it":[31],"operates.":[32],"Generally":[33],"speaking,":[34],"side-channel":[35],"awareness":[37],"on":[38,73,113],"measuring":[39],"analyzing":[41],"goal":[43],"device\u2019s":[44],"bodily":[45],"electrical":[47],"traits,":[48],"which":[49],"include":[50],"power":[51],"consumption,":[52],"electromagnetic":[53],"radiation,":[54],"transfers.":[57],"Such":[58],"techniques":[59],"are":[60],"normally":[61],"used":[62,67],"to":[63,68],"acquire":[64],"encrypt":[69],"decrypt":[71],"information":[72],"an":[74,88],"at-ease":[75],"gadget,":[76],"as":[77,79,98,100],"well":[78,99],"many":[80],"sensitive":[82],"secrets.":[83],"affords":[87],"overview":[89],"of":[90,95,126],"most":[92],"commonplace":[93],"types":[94],"facet-channel":[96],"attacks,":[97],"how":[101],"they":[102],"can":[103],"be":[104],"averted":[105],"and":[106,122],"strategically":[107],"mitigated.":[108],"It":[109],"highlights":[110],"recent":[111],"studies":[112],"subject,":[115],"including":[116],"new":[117],"strategies":[118],"attack":[120],"resilience":[121],"growing":[124],"sophistication":[125],"attackers.":[127]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-08T06:56:09.383167","created_date":"2025-10-10T00:00:00"}
