{"id":"https://openalex.org/W4407690721","doi":"https://doi.org/10.1109/iceic64972.2025.10879693","title":"Operation Shuffling with Multiple S-Boxes Against Power Analysis Attacks","display_name":"Operation Shuffling with Multiple S-Boxes Against Power Analysis Attacks","publication_year":2025,"publication_date":"2025-01-19","ids":{"openalex":"https://openalex.org/W4407690721","doi":"https://doi.org/10.1109/iceic64972.2025.10879693"},"language":"en","primary_location":{"id":"doi:10.1109/iceic64972.2025.10879693","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iceic64972.2025.10879693","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Conference on Electronics, Information, and Communication (ICEIC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064284448","display_name":"Shota Kajiya","orcid":null},"institutions":[{"id":"https://openalex.org/I98285908","display_name":"Osaka University","ror":"https://ror.org/035t8zc32","country_code":"JP","type":"education","lineage":["https://openalex.org/I98285908"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Shota Kajiya","raw_affiliation_strings":["Graduate School of Information Science and Technology, Osaka University,Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Information Science and Technology, Osaka University,Japan","institution_ids":["https://openalex.org/I98285908"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075308907","display_name":"Hiroki Nishikawa","orcid":"https://orcid.org/0000-0002-9626-0944"},"institutions":[{"id":"https://openalex.org/I98285908","display_name":"Osaka University","ror":"https://ror.org/035t8zc32","country_code":"JP","type":"education","lineage":["https://openalex.org/I98285908"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hiroki Nishikawa","raw_affiliation_strings":["Graduate School of Information Science and Technology, Osaka University,Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Information Science and Technology, Osaka University,Japan","institution_ids":["https://openalex.org/I98285908"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063582139","display_name":"Kota Yoshida","orcid":"https://orcid.org/0000-0003-1293-6415"},"institutions":[{"id":"https://openalex.org/I135768898","display_name":"Ritsumeikan University","ror":"https://ror.org/0197nmd03","country_code":"JP","type":"education","lineage":["https://openalex.org/I135768898","https://openalex.org/I4390039241"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kota Yoshida","raw_affiliation_strings":["Graduate School of Science and Engineering, Ritsumeikan University,Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Science and Engineering, Ritsumeikan University,Japan","institution_ids":["https://openalex.org/I135768898"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050838950","display_name":"Ittetsu Taniguchi","orcid":"https://orcid.org/0000-0002-7843-5907"},"institutions":[{"id":"https://openalex.org/I98285908","display_name":"Osaka University","ror":"https://ror.org/035t8zc32","country_code":"JP","type":"education","lineage":["https://openalex.org/I98285908"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Ittetsu Taniguchi","raw_affiliation_strings":["Graduate School of Information Science and Technology, Osaka University,Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Information Science and Technology, Osaka University,Japan","institution_ids":["https://openalex.org/I98285908"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061693379","display_name":"Takao Onoye","orcid":"https://orcid.org/0000-0002-1894-2448"},"institutions":[{"id":"https://openalex.org/I98285908","display_name":"Osaka University","ror":"https://ror.org/035t8zc32","country_code":"JP","type":"education","lineage":["https://openalex.org/I98285908"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Takao Onoye","raw_affiliation_strings":["Graduate School of Information Science and Technology, Osaka University,Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Information Science and Technology, Osaka University,Japan","institution_ids":["https://openalex.org/I98285908"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5064284448"],"corresponding_institution_ids":["https://openalex.org/I98285908"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.01241189,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9656999707221985,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9656999707221985,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/shuffling","display_name":"Shuffling","score":0.9437861442565918},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5916043519973755},{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.5497796535491943},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.5366852283477783},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32167452573776245},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.28800147771835327},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1755322515964508},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.066986083984375}],"concepts":[{"id":"https://openalex.org/C167927819","wikidata":"https://www.wikidata.org/wiki/Q1930567","display_name":"Shuffling","level":2,"score":0.9437861442565918},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5916043519973755},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.5497796535491943},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.5366852283477783},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32167452573776245},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.28800147771835327},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1755322515964508},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.066986083984375},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iceic64972.2025.10879693","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iceic64972.2025.10879693","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Conference on Electronics, Information, and Communication (ICEIC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1562542037","https://openalex.org/W1595155753","https://openalex.org/W1599906532","https://openalex.org/W1622403295","https://openalex.org/W1988037376","https://openalex.org/W2140823840","https://openalex.org/W2154909745","https://openalex.org/W2494396870","https://openalex.org/W2555092654","https://openalex.org/W2734533846","https://openalex.org/W3038933981","https://openalex.org/W4285638137","https://openalex.org/W4364322571"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4213239787","https://openalex.org/W2045745654","https://openalex.org/W2809893299","https://openalex.org/W1537995932","https://openalex.org/W1587991081","https://openalex.org/W4206579032","https://openalex.org/W2013377987"],"abstract_inverted_index":{"With":[0],"the":[1,20,24,51,63,67,72,79,88,101,105,107,122,126,133,137,143,146,150],"proliferation":[2],"of":[3,23,43,65,69,71,109,136,142],"IoT":[4],"devices,":[5],"hardware":[6],"devices":[7],"are":[8,40,56],"exposed":[9],"to":[10,62,118,121],"side-channel":[11],"attacks":[12],"such":[13],"as":[14,33],"power":[15,89],"analysis":[16],"attacks.":[17],"In":[18,91,129],"particular,":[19],"SubBytes":[21,102],"function":[22],"Advanced":[25],"Encryption":[26],"Standard":[27],"(AES)":[28],"has":[29],"been":[30],"pointed":[31],"out":[32],"a":[34],"vulnerability,":[35],"and":[36,78,125],"countermeasures":[37],"against":[38],"it":[39],"required.":[41],"One":[42],"common":[44],"mitigation":[45],"technique":[46],"is":[47,75],"shuffling,":[48],"which":[49,54],"randomizes":[50],"order":[52,74],"in":[53,100],"transformations":[55],"performed":[57],"using":[58],"S-boxes.":[59],"However,":[60],"due":[61],"characteristics":[64],"S-boxes,":[66],"number":[68,108],"combinations":[70],"execution":[73,134,151],"not":[76],"sufficient,":[77],"secret":[80,110],"key":[81],"can":[82],"be":[83],"easily":[84],"revealed":[85,112],"by":[86,113,153],"increasing":[87],"trace.":[90],"this":[92],"study,":[93],"we":[94],"propose":[95],"shuffling":[96],"with":[97,140],"multiple":[98],"S-boxes":[99],"function.":[103],"From":[104],"experiment,":[106],"keys":[111],"CPA":[114],"decreased":[115],"from":[116],"16":[117],"0":[119],"compared":[120],"no-countermeasure":[123,144],"case":[124],"existing":[127],"method.":[128],"addition,":[130],"when":[131],"comparing":[132],"time":[135,152],"proposed":[138,147],"method":[139,148],"that":[141],"case,":[145],"increased":[149],"0.6%.":[154]},"counts_by_year":[],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-10-10T00:00:00"}
