{"id":"https://openalex.org/W2914669669","doi":"https://doi.org/10.1109/icecs.2018.8617849","title":"A Novel Sizing Method Aiming Security Against Differential Power Analysis","display_name":"A Novel Sizing Method Aiming Security Against Differential Power Analysis","publication_year":2018,"publication_date":"2018-12-01","ids":{"openalex":"https://openalex.org/W2914669669","doi":"https://doi.org/10.1109/icecs.2018.8617849","mag":"2914669669"},"language":"en","primary_location":{"id":"doi:10.1109/icecs.2018.8617849","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icecs.2018.8617849","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 25th IEEE International Conference on Electronics, Circuits and Systems (ICECS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048165540","display_name":"Vitor G. Lima","orcid":null},"institutions":[{"id":"https://openalex.org/I169248161","display_name":"Universidade Federal de Pelotas","ror":"https://ror.org/05msy9z54","country_code":"BR","type":"education","lineage":["https://openalex.org/I169248161"]}],"countries":["BR"],"is_corresponding":true,"raw_author_name":"Vitor G. Lima","raw_affiliation_strings":["Group of Architecture and Integrated Circuits \u2013 GACI, Federal University of Pelotas \u2013 UFPel"],"affiliations":[{"raw_affiliation_string":"Group of Architecture and Integrated Circuits \u2013 GACI, Federal University of Pelotas \u2013 UFPel","institution_ids":["https://openalex.org/I169248161"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010478240","display_name":"Pl\u00ednio Finkenauer","orcid":"https://orcid.org/0000-0002-3533-7186"},"institutions":[{"id":"https://openalex.org/I169248161","display_name":"Universidade Federal de Pelotas","ror":"https://ror.org/05msy9z54","country_code":"BR","type":"education","lineage":["https://openalex.org/I169248161"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Plinio Finkenauer","raw_affiliation_strings":["Group of Architecture and Integrated Circuits \u2013 GACI, Federal University of Pelotas \u2013 UFPel"],"affiliations":[{"raw_affiliation_string":"Group of Architecture and Integrated Circuits \u2013 GACI, Federal University of Pelotas \u2013 UFPel","institution_ids":["https://openalex.org/I169248161"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010001207","display_name":"Vin\u00edcius Valduga de Almeida Camargo","orcid":"https://orcid.org/0000-0003-2006-3642"},"institutions":[{"id":"https://openalex.org/I169248161","display_name":"Universidade Federal de Pelotas","ror":"https://ror.org/05msy9z54","country_code":"BR","type":"education","lineage":["https://openalex.org/I169248161"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Vinicius V. Camargo","raw_affiliation_strings":["Group of Architecture and Integrated Circuits \u2013 GACI, Federal University of Pelotas \u2013 UFPel"],"affiliations":[{"raw_affiliation_string":"Group of Architecture and Integrated Circuits \u2013 GACI, Federal University of Pelotas \u2013 UFPel","institution_ids":["https://openalex.org/I169248161"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068796829","display_name":"Felipe Marques","orcid":"https://orcid.org/0000-0003-1318-9992"},"institutions":[{"id":"https://openalex.org/I169248161","display_name":"Universidade Federal de Pelotas","ror":"https://ror.org/05msy9z54","country_code":"BR","type":"education","lineage":["https://openalex.org/I169248161"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Felipe S. Marques","raw_affiliation_strings":["Group of Architecture and Integrated Circuits \u2013 GACI, Federal University of Pelotas \u2013 UFPel"],"affiliations":[{"raw_affiliation_string":"Group of Architecture and Integrated Circuits \u2013 GACI, Federal University of Pelotas \u2013 UFPel","institution_ids":["https://openalex.org/I169248161"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031596075","display_name":"R. Leomar","orcid":null},"institutions":[{"id":"https://openalex.org/I169248161","display_name":"Universidade Federal de Pelotas","ror":"https://ror.org/05msy9z54","country_code":"BR","type":"education","lineage":["https://openalex.org/I169248161"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Leomar R. Junior","raw_affiliation_strings":["Group of Architecture and Integrated Circuits \u2013 GACI, Federal University of Pelotas \u2013 UFPel"],"affiliations":[{"raw_affiliation_string":"Group of Architecture and Integrated Circuits \u2013 GACI, Federal University of Pelotas \u2013 UFPel","institution_ids":["https://openalex.org/I169248161"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030974893","display_name":"Rafael Soares","orcid":"https://orcid.org/0000-0001-9493-7272"},"institutions":[{"id":"https://openalex.org/I169248161","display_name":"Universidade Federal de Pelotas","ror":"https://ror.org/05msy9z54","country_code":"BR","type":"education","lineage":["https://openalex.org/I169248161"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Rafael I. Soares","raw_affiliation_strings":["Group of Architecture and Integrated Circuits \u2013 GACI, Federal University of Pelotas \u2013 UFPel"],"affiliations":[{"raw_affiliation_string":"Group of Architecture and Integrated Circuits \u2013 GACI, Federal University of Pelotas \u2013 UFPel","institution_ids":["https://openalex.org/I169248161"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5048165540"],"corresponding_institution_ids":["https://openalex.org/I169248161"],"apc_list":null,"apc_paid":null,"fwci":0.1629,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.61864345,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":"31","issue":null,"first_page":"429","last_page":"432"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.8297799825668335},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7697961926460266},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.6159278750419617},{"id":"https://openalex.org/keywords/sizing","display_name":"Sizing","score":0.561455249786377},{"id":"https://openalex.org/keywords/logic-gate","display_name":"Logic gate","score":0.4774875342845917},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.4419272541999817},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.4162341356277466},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.39987045526504517},{"id":"https://openalex.org/keywords/electronic-engineering","display_name":"Electronic engineering","score":0.34921321272850037},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.3441721796989441},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3400619328022003},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2780683636665344},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.17230916023254395},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.16624629497528076},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.15840941667556763}],"concepts":[{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.8297799825668335},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7697961926460266},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.6159278750419617},{"id":"https://openalex.org/C2777767291","wikidata":"https://www.wikidata.org/wiki/Q1080291","display_name":"Sizing","level":2,"score":0.561455249786377},{"id":"https://openalex.org/C131017901","wikidata":"https://www.wikidata.org/wiki/Q170451","display_name":"Logic gate","level":2,"score":0.4774875342845917},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.4419272541999817},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.4162341356277466},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.39987045526504517},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.34921321272850037},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3441721796989441},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3400619328022003},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2780683636665344},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.17230916023254395},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.16624629497528076},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.15840941667556763},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icecs.2018.8617849","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icecs.2018.8617849","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 25th IEEE International Conference on Electronics, Circuits and Systems (ICECS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1607006990","https://openalex.org/W1676092125","https://openalex.org/W1865530175","https://openalex.org/W1968197675","https://openalex.org/W1997856497","https://openalex.org/W2042566540","https://openalex.org/W2095438916","https://openalex.org/W2097916567","https://openalex.org/W2099724084","https://openalex.org/W2118162766","https://openalex.org/W2120000030","https://openalex.org/W2133435014","https://openalex.org/W2154909745","https://openalex.org/W2247604716","https://openalex.org/W2488679488","https://openalex.org/W2750218729","https://openalex.org/W2758674407","https://openalex.org/W6639077636","https://openalex.org/W6677862133","https://openalex.org/W6682554491"],"related_works":["https://openalex.org/W5280335","https://openalex.org/W2989964095","https://openalex.org/W2164725015","https://openalex.org/W2782264121","https://openalex.org/W4323926098","https://openalex.org/W4384807855","https://openalex.org/W2022533428","https://openalex.org/W2004522261","https://openalex.org/W182679101","https://openalex.org/W1533979697"],"abstract_inverted_index":{"The":[0,72],"confidential":[1],"information":[2],"provided":[3],"by":[4,9,80],"embedded":[5],"cryptosystems":[6],"are":[7],"threatened":[8],"Side":[10],"Channel":[11],"Attacks":[12],"(SCA).":[13],"Differential":[14],"Power":[15],"Analysis":[16],"(DPA)":[17],"is":[18],"an":[19,77],"SCA":[20],"that":[21,117],"correlates":[22],"the":[23,29,37,47,60,83,103,121],"dependency":[24],"between":[25],"processed":[26],"data":[27],"and":[28,86,106,136],"system's":[30],"power":[31,61],"consumption":[32],"in":[33],"order":[34],"to":[35,97,102,129],"obtain":[36],"secret":[38],"information.":[39],"Circuit-level":[40],"countermeasures":[41,96],"against":[42,69],"DPA":[43,70,98,114],"aim":[44],"at":[45],"achieving":[46],"data-independent":[48],"supply":[49],"current.":[50],"This":[51],"work":[52],"proposes":[53],"a":[54],"sizing":[55,79],"methodology":[56,105],"focused":[57],"on":[58],"equalizing":[59],"dissipation":[62],"of":[63],"logic":[64],"gates":[65],"towards":[66],"increasing":[67],"security":[68,108],"attacks.":[71],"developed":[73],"algorithm":[74],"searches":[75,138],"for":[76,132],"optimal":[78],"iteratively":[81],"expanding":[82],"solution":[84],"scope":[85],"verifying":[87],"its":[88],"consistency":[89],"through":[90],"SPICE":[91],"simulations.":[92],"Topologies":[93],"used":[94],"as":[95],"attacks":[99,115],"were":[100,110],"submitted":[101],"proposed":[104,122],"their":[107,125],"metrics":[109],"evaluated.":[111],"Results":[112],"from":[113],"show":[116],"circuits":[118],"sized":[119],"with":[120],"method":[123],"had":[124],"keys":[126],"less":[127],"likely":[128],"be":[130],"broken":[131],"all":[133],"selection":[134],"functions":[135],"key":[137],"tested.":[139]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
