{"id":"https://openalex.org/W2900487718","doi":"https://doi.org/10.1109/ictc.2018.8539703","title":"Single Trace Side Channel Analysis on Quantum Key Distribution","display_name":"Single Trace Side Channel Analysis on Quantum Key Distribution","publication_year":2018,"publication_date":"2018-10-01","ids":{"openalex":"https://openalex.org/W2900487718","doi":"https://doi.org/10.1109/ictc.2018.8539703","mag":"2900487718"},"language":"en","primary_location":{"id":"doi:10.1109/ictc.2018.8539703","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ictc.2018.8539703","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038203494","display_name":"Suhri Kim","orcid":"https://orcid.org/0000-0003-2665-7142"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Suhri Kim","raw_affiliation_strings":["Center for Information Security Technologies (CIST), Korea University, Seoul, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Center for Information Security Technologies (CIST), Korea University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013637689","display_name":"Sunghyun Jin","orcid":"https://orcid.org/0000-0002-9521-0937"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Sunghyun Jin","raw_affiliation_strings":["Center for Information Security Technologies (CIST), Korea University, Seoul, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Center for Information Security Technologies (CIST), Korea University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001702285","display_name":"Yechan Lee","orcid":"https://orcid.org/0000-0002-4744-267X"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Yechan Lee","raw_affiliation_strings":["Center for Information Security Technologies (CIST), Korea University, Seoul, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Center for Information Security Technologies (CIST), Korea University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073432183","display_name":"Byeonggyu Park","orcid":null},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Byeonggyu Park","raw_affiliation_strings":["Center for Information Security Technologies (CIST), Korea University, Seoul, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Center for Information Security Technologies (CIST), Korea University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089988160","display_name":"Hanbit Kim","orcid":null},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Hanbit Kim","raw_affiliation_strings":["Center for Information Security Technologies (CIST), Korea University, Seoul, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Center for Information Security Technologies (CIST), Korea University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078931547","display_name":"Seokhie Hong","orcid":"https://orcid.org/0000-0001-7506-4023"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Seokhie Hong","raw_affiliation_strings":["Center for Information Security Technologies (CIST), Korea University, Seoul, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Center for Information Security Technologies (CIST), Korea University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I197347611"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5038203494"],"corresponding_institution_ids":["https://openalex.org/I197347611"],"apc_list":null,"apc_paid":null,"fwci":0.6515,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.77383083,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"736","last_page":"739"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/quantum-key-distribution","display_name":"Quantum key distribution","score":0.9370937347412109},{"id":"https://openalex.org/keywords/bb84","display_name":"BB84","score":0.6852116584777832},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6516748666763306},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.6460365653038025},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6384408473968506},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.6296133995056152},{"id":"https://openalex.org/keywords/quantum-cryptography","display_name":"Quantum cryptography","score":0.4664765000343323},{"id":"https://openalex.org/keywords/quantum-channel","display_name":"Quantum channel","score":0.4386962056159973},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39771339297294617},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.33329465985298157},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3306256830692291},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3109264373779297},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2959396243095398},{"id":"https://openalex.org/keywords/quantum-information","display_name":"Quantum information","score":0.2340652048587799},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.15443971753120422},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.10340741276741028},{"id":"https://openalex.org/keywords/quantum-mechanics","display_name":"Quantum mechanics","score":0.07384878396987915}],"concepts":[{"id":"https://openalex.org/C95466800","wikidata":"https://www.wikidata.org/wiki/Q1027298","display_name":"Quantum key distribution","level":3,"score":0.9370937347412109},{"id":"https://openalex.org/C78203541","wikidata":"https://www.wikidata.org/wiki/Q2566969","display_name":"BB84","level":5,"score":0.6852116584777832},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6516748666763306},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.6460365653038025},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6384408473968506},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.6296133995056152},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.4664765000343323},{"id":"https://openalex.org/C187486625","wikidata":"https://www.wikidata.org/wiki/Q2122176","display_name":"Quantum channel","level":4,"score":0.4386962056159973},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39771339297294617},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.33329465985298157},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3306256830692291},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3109264373779297},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2959396243095398},{"id":"https://openalex.org/C169699857","wikidata":"https://www.wikidata.org/wiki/Q2122243","display_name":"Quantum information","level":3,"score":0.2340652048587799},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.15443971753120422},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.10340741276741028},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.07384878396987915}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ictc.2018.8539703","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ictc.2018.8539703","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1634148752","https://openalex.org/W2003762972","https://openalex.org/W2015179126","https://openalex.org/W2053824283","https://openalex.org/W2127059139","https://openalex.org/W2154909745","https://openalex.org/W2885289712","https://openalex.org/W2987687226","https://openalex.org/W3122977249","https://openalex.org/W4234664051","https://openalex.org/W6682554491"],"related_works":["https://openalex.org/W1988941773","https://openalex.org/W2098078267","https://openalex.org/W2034912392","https://openalex.org/W4229004744","https://openalex.org/W2122945788","https://openalex.org/W1981044384","https://openalex.org/W1966252956","https://openalex.org/W2151161261","https://openalex.org/W2379299577","https://openalex.org/W2800452287"],"abstract_inverted_index":{"The":[0],"security":[1,102],"of":[2,17,46,69,103,162],"current":[3],"key":[4,10,23,65,82],"exchange":[5,11,24,62],"protocols":[6,25],"such":[7],"as":[8],"Diffie-Hellman":[9],"is":[12,92,107,178],"based":[13],"on":[14,74,129,143],"the":[15,41,44,67,75,89,101,104,117,125,140,151,160,168,174,185],"hardness":[16],"number":[18,31,161],"theoretic":[19],"problems.":[20],"However,":[21,99],"these":[22,55],"are":[26],"threatened":[27],"by":[28,57,109],"weak":[29],"random":[30],"generators,":[32],"advances":[33],"to":[34,61,149,159,180],"CPU":[35],"power,":[36],"a":[37,47,63,80,95,134],"new":[38],"attack":[39,128,182],"from":[40,139],"eavesdropper,":[42],"and":[43,164],"emergence":[45],"quantum":[48,59,110],"computer.":[49],"Quantum":[50],"Key":[51],"Distribution":[52],"(QKD)":[53],"addresses":[54],"challenges":[56],"using":[58],"properties":[60],"secret":[64],"without":[66],"risk":[68],"being":[70],"intercepted.":[71],"Recent":[72],"developments":[73],"QKD":[76,90,105,131,176],"system":[77,91,106,118,177],"resulted":[78],"in":[79,167],"stable":[81],"generation":[83],"with":[84],"fewer":[85],"errors":[86],"so":[87,183],"that":[88,173,184],"rapidly":[93],"becoming":[94],"solid":[96],"commercial":[97],"proposition.":[98],"although":[100],"guaranteed":[108],"physics,":[111],"its":[112],"careless":[113],"implementation":[114],"could":[115],"make":[116],"vulnerable.":[119],"In":[120],"this":[121],"paper,":[122],"we":[123,146],"proposed":[124],"first":[126],"side-channel":[127,181],"plug-and-play":[130,175],"system.":[132],"Through":[133],"single":[135],"electromagnetic":[136,152],"trace":[137,153],"obtained":[138],"phase":[141],"modulator":[142],"Alice's":[144],"side,":[145],"were":[147],"able":[148],"classify":[150],"into":[154],"four":[155],"classes,":[156],"which":[157],"corresponds":[158],"bit":[163],"basis":[165],"combination":[166],"BB84":[169],"protocol.":[170],"We":[171],"concluded":[172],"vulnerable":[179],"countermeasure":[186],"must":[187],"be":[188],"considered.":[189]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
