{"id":"https://openalex.org/W3116881988","doi":"https://doi.org/10.1109/ictc49870.2020.9289209","title":"Single Trace Attack on Key Reconciliation Process for Quantum Key Distribution","display_name":"Single Trace Attack on Key Reconciliation Process for Quantum Key Distribution","publication_year":2020,"publication_date":"2020-10-21","ids":{"openalex":"https://openalex.org/W3116881988","doi":"https://doi.org/10.1109/ictc49870.2020.9289209","mag":"3116881988"},"language":"en","primary_location":{"id":"doi:10.1109/ictc49870.2020.9289209","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ictc49870.2020.9289209","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 International Conference on Information and Communication Technology Convergence (ICTC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032212424","display_name":"Dongjun Park","orcid":"https://orcid.org/0000-0002-4820-389X"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Dongjun Park","raw_affiliation_strings":["Graduate School of Information Security, Korea University Institute of Cyber Security and Privacy (ICSP), Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Graduate School of Information Security, Korea University Institute of Cyber Security and Privacy (ICSP), Seoul, South Korea","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017137785","display_name":"Donghoe Heo","orcid":"https://orcid.org/0000-0001-9300-2985"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Donghoe Heo","raw_affiliation_strings":["Graduate School of Information Security, Korea University Institute of Cyber Security and Privacy (ICSP), Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Graduate School of Information Security, Korea University Institute of Cyber Security and Privacy (ICSP), Seoul, South Korea","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038203494","display_name":"Suhri Kim","orcid":"https://orcid.org/0000-0003-2665-7142"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Suhri Kim","raw_affiliation_strings":["Graduate School of Information Security, Korea University Institute of Cyber Security and Privacy (ICSP), Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Graduate School of Information Security, Korea University Institute of Cyber Security and Privacy (ICSP), Seoul, South Korea","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078931547","display_name":"Seokhie Hong","orcid":"https://orcid.org/0000-0001-7506-4023"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Seokhie Hong","raw_affiliation_strings":["Graduate School of Information Security, Korea University Institute of Cyber Security and Privacy (ICSP), Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Graduate School of Information Security, Korea University Institute of Cyber Security and Privacy (ICSP), Seoul, South Korea","institution_ids":["https://openalex.org/I197347611"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5032212424"],"corresponding_institution_ids":["https://openalex.org/I197347611"],"apc_list":null,"apc_paid":null,"fwci":0.3977,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.70147683,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"7","issue":null,"first_page":"209","last_page":"213"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10020","display_name":"Quantum Information and Cryptography","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10020","display_name":"Quantum Information and Cryptography","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.989799976348877,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/quantum-key-distribution","display_name":"Quantum key distribution","score":0.8173728585243225},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.7518153190612793},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7325460314750671},{"id":"https://openalex.org/keywords/trace","display_name":"TRACE (psycholinguistics)","score":0.6513596177101135},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.642314612865448},{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.6071712374687195},{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.5422649383544922},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.517952561378479},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.5088894367218018},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45442983508110046},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3598822355270386},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.316864937543869},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.28850704431533813},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.21910423040390015},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.11224919557571411}],"concepts":[{"id":"https://openalex.org/C95466800","wikidata":"https://www.wikidata.org/wiki/Q1027298","display_name":"Quantum key distribution","level":3,"score":0.8173728585243225},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.7518153190612793},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7325460314750671},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.6513596177101135},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.642314612865448},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.6071712374687195},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.5422649383544922},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.517952561378479},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.5088894367218018},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45442983508110046},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3598822355270386},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.316864937543869},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.28850704431533813},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.21910423040390015},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.11224919557571411},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ictc49870.2020.9289209","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ictc49870.2020.9289209","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 International Conference on Information and Communication Technology Convergence (ICTC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.47999998927116394,"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1511843316","https://openalex.org/W1613874182","https://openalex.org/W1942932748","https://openalex.org/W2002758003","https://openalex.org/W2100494843","https://openalex.org/W2109394932","https://openalex.org/W2154909745","https://openalex.org/W2156186849","https://openalex.org/W2170489924","https://openalex.org/W2472755367","https://openalex.org/W2593901293","https://openalex.org/W2626289956","https://openalex.org/W2885289712","https://openalex.org/W2887129939","https://openalex.org/W2900487718","https://openalex.org/W2963872935","https://openalex.org/W2987687226","https://openalex.org/W3099819669","https://openalex.org/W3100451417","https://openalex.org/W6630620868","https://openalex.org/W6636388380","https://openalex.org/W6654347880","https://openalex.org/W6754082225","https://openalex.org/W6929625476"],"related_works":["https://openalex.org/W2372183081","https://openalex.org/W3103342782","https://openalex.org/W4388132059","https://openalex.org/W2891673431","https://openalex.org/W2980414499","https://openalex.org/W2969820670","https://openalex.org/W3196822321","https://openalex.org/W4366975047","https://openalex.org/W2996337839","https://openalex.org/W3104637966"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3,43],"propose":[4],"the":[5,12,17,31,35,40,49,53,60,68,72,81,89],"first":[6],"single":[7,25],"trace":[8,28],"side-channel":[9,86],"attack":[10],"on":[11,39,88],"key":[13,19,36,51,58,70,90],"reconciliation":[14,37,91],"process":[15,38,92],"for":[16,93],"quantum":[18],"distribution":[20],"(QKD)":[21],"system.":[22],"Through":[23],"a":[24],"power":[26],"consumption":[27],"measured":[29],"during":[30],"syndrome":[32],"computation":[33],"of":[34,76],"sender's":[41],"side,":[42],"were":[44],"able":[45],"to":[46],"fully":[47],"recover":[48],"sifted":[50,69],"and":[52,71],"syndrome.":[54,73],"The":[55,74],"shared":[56],"secret":[57],"between":[59],"two":[61],"users":[62],"can":[63],"be":[64],"directly":[65],"obtained":[66],"from":[67],"result":[75],"our":[77],"work":[78],"shows":[79],"that":[80],"QKD":[82],"system":[83],"must":[84],"consider":[85],"attacks":[87],"its":[94],"practical":[95],"use.":[96]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
