{"id":"https://openalex.org/W2025115302","doi":"https://doi.org/10.1109/icnss.2011.6060012","title":"Channel state information based key generation vs. side-channel analysis key information leakage","display_name":"Channel state information based key generation vs. side-channel analysis key information leakage","publication_year":2011,"publication_date":"2011-09-01","ids":{"openalex":"https://openalex.org/W2025115302","doi":"https://doi.org/10.1109/icnss.2011.6060012","mag":"2025115302"},"language":"en","primary_location":{"id":"doi:10.1109/icnss.2011.6060012","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnss.2011.6060012","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 5th International Conference on Network and System Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100614997","display_name":"Huiyun Li","orcid":"https://orcid.org/0000-0003-0157-1393"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]},{"id":"https://openalex.org/I4210145761","display_name":"Shenzhen Institutes of Advanced Technology","ror":"https://ror.org/04gh4er46","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210145761"]},{"id":"https://openalex.org/I4210116924","display_name":"Chinese University of Hong Kong, Shenzhen","ror":"https://ror.org/02d5ks197","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633","https://openalex.org/I180726961","https://openalex.org/I4210116924"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Huiyun Li","raw_affiliation_strings":["Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, The Chinese University of Hong Kong, Shenzhen, China","Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, The Chinese University of Hong Kong, 518055, China"],"affiliations":[{"raw_affiliation_string":"Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, The Chinese University of Hong Kong, Shenzhen, China","institution_ids":["https://openalex.org/I4210145761","https://openalex.org/I4210116924","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, The Chinese University of Hong Kong, 518055, China","institution_ids":["https://openalex.org/I177725633","https://openalex.org/I4210116924"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064071876","display_name":"Qi Zhang","orcid":"https://orcid.org/0000-0003-4794-3965"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]},{"id":"https://openalex.org/I4210116924","display_name":"Chinese University of Hong Kong, Shenzhen","ror":"https://ror.org/02d5ks197","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633","https://openalex.org/I180726961","https://openalex.org/I4210116924"]},{"id":"https://openalex.org/I4210145761","display_name":"Shenzhen Institutes of Advanced Technology","ror":"https://ror.org/04gh4er46","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210145761"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Zhang","raw_affiliation_strings":["Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, The Chinese University of Hong Kong, Shenzhen, China","Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, The Chinese University of Hong Kong, 518055, China"],"affiliations":[{"raw_affiliation_string":"Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, The Chinese University of Hong Kong, Shenzhen, China","institution_ids":["https://openalex.org/I4210145761","https://openalex.org/I4210116924","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, The Chinese University of Hong Kong, 518055, China","institution_ids":["https://openalex.org/I177725633","https://openalex.org/I4210116924"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102106528","display_name":"Hai Yuan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210145761","display_name":"Shenzhen Institutes of Advanced Technology","ror":"https://ror.org/04gh4er46","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210145761"]},{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210116924","display_name":"Chinese University of Hong Kong, Shenzhen","ror":"https://ror.org/02d5ks197","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633","https://openalex.org/I180726961","https://openalex.org/I4210116924"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hai Yuan","raw_affiliation_strings":["Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, The Chinese University of Hong Kong, Shenzhen, China","Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, The Chinese University of Hong Kong, 518055, China"],"affiliations":[{"raw_affiliation_string":"Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, The Chinese University of Hong Kong, Shenzhen, China","institution_ids":["https://openalex.org/I4210145761","https://openalex.org/I4210116924","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, The Chinese University of Hong Kong, 518055, China","institution_ids":["https://openalex.org/I177725633","https://openalex.org/I4210116924"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100614997"],"corresponding_institution_ids":["https://openalex.org/I177725633","https://openalex.org/I19820366","https://openalex.org/I4210116924","https://openalex.org/I4210145761"],"apc_list":null,"apc_paid":null,"fwci":0.4276,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.71554803,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"264","last_page":"268"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7562434673309326},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.7311034202575684},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.704850435256958},{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.680111825466156},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5977988839149475},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.5934463739395142},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5880089402198792},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5611448287963867},{"id":"https://openalex.org/keywords/channel-state-information","display_name":"Channel state information","score":0.5509299039840698},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4790976345539093},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4390489459037781},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4237057864665985},{"id":"https://openalex.org/keywords/pre-shared-key","display_name":"Pre-shared key","score":0.4118667542934418},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3736153244972229},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3085036873817444},{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.25116419792175293},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2026059627532959}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7562434673309326},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.7311034202575684},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.704850435256958},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.680111825466156},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5977988839149475},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.5934463739395142},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5880089402198792},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5611448287963867},{"id":"https://openalex.org/C148063708","wikidata":"https://www.wikidata.org/wiki/Q5072511","display_name":"Channel state information","level":3,"score":0.5509299039840698},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4790976345539093},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4390489459037781},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4237057864665985},{"id":"https://openalex.org/C50230483","wikidata":"https://www.wikidata.org/wiki/Q2108226","display_name":"Pre-shared key","level":5,"score":0.4118667542934418},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3736153244972229},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3085036873817444},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.25116419792175293},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2026059627532959}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icnss.2011.6060012","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnss.2011.6060012","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 5th International Conference on Network and System Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7900000214576721,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W1511843316","https://openalex.org/W1519539754","https://openalex.org/W1537808739","https://openalex.org/W1552623947","https://openalex.org/W1565369953","https://openalex.org/W1613874182","https://openalex.org/W1724890242","https://openalex.org/W1875021344","https://openalex.org/W2011582944","https://openalex.org/W2054496355","https://openalex.org/W2099086025","https://openalex.org/W2102654676","https://openalex.org/W2108739512","https://openalex.org/W2112615290","https://openalex.org/W2126477936","https://openalex.org/W2128153585","https://openalex.org/W2129587580","https://openalex.org/W2138009247","https://openalex.org/W2140865718","https://openalex.org/W2142795465","https://openalex.org/W2149808502","https://openalex.org/W2154909745","https://openalex.org/W2169422071","https://openalex.org/W2171595831","https://openalex.org/W2532031106","https://openalex.org/W6630620868","https://openalex.org/W6631075134","https://openalex.org/W6633094268","https://openalex.org/W6633902989","https://openalex.org/W6637582669","https://openalex.org/W6676882317","https://openalex.org/W6682554491"],"related_works":["https://openalex.org/W4386561858","https://openalex.org/W2154174517","https://openalex.org/W2281798379","https://openalex.org/W2966050644","https://openalex.org/W2949977080","https://openalex.org/W2063001207","https://openalex.org/W2022533428","https://openalex.org/W2580249689","https://openalex.org/W2969678054","https://openalex.org/W3174519456"],"abstract_inverted_index":{"Numerous":[0],"research":[1],"efforts":[2],"have":[3],"been":[4],"made":[5],"recently":[6],"on":[7,28],"exploiting":[8],"the":[9,32,54,61,82,91],"randomness":[10],"of":[11,56,81,93],"wireless":[12],"channels":[13],"to":[14,44,89],"generate":[15],"secret":[16,46],"keys.":[17],"This":[18],"channel":[19,67],"state":[20],"information":[21,58],"(CSI)":[22],"based":[23],"key":[24,73],"generation":[25],"method":[26],"relies":[27],"spatial":[29],"independence":[30],"between":[31],"legitimate":[33],"and":[34],"eavesdropping":[35],"channels.":[36],"In":[37],"this":[38],"paper,":[39],"we":[40],"propose":[41],"a":[42],"methodology":[43,52],"extract":[45],"keys":[47,76],"through":[48],"side-channel":[49,57,83,96],"information.":[50,84],"Our":[51],"involves":[53],"capture":[55],"leaked":[59],"by":[60],"electronic":[62],"instruments,":[63],"either":[64],"when":[65],"measuring":[66],"characteristics":[68],"or":[69],"during":[70],"encryption/decryption":[71],"for":[72],"confirmation.":[74],"Secret":[75],"are":[77],"extracted":[78],"via":[79],"analysis":[80],"We":[85],"provide":[86],"experiment":[87],"results":[88],"demonstrate":[90],"feasibility":[92],"our":[94],"proposed":[95],"attack":[97],"methodology.":[98]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
