{"id":"https://openalex.org/W7117448930","doi":"https://doi.org/10.1109/ipccc66453.2025.11304629","title":"DM-SCT: Side-Channel Trace Generation Via Attention-Enhanced Diffusion Model","display_name":"DM-SCT: Side-Channel Trace Generation Via Attention-Enhanced Diffusion Model","publication_year":2025,"publication_date":"2025-11-15","ids":{"openalex":"https://openalex.org/W7117448930","doi":"https://doi.org/10.1109/ipccc66453.2025.11304629"},"language":null,"primary_location":{"id":"doi:10.1109/ipccc66453.2025.11304629","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ipccc66453.2025.11304629","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Performance, Computing, and Communications Conference (IPCCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063949124","display_name":"Ying Meng","orcid":"https://orcid.org/0000-0002-1165-9009"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuxuan Meng","raw_affiliation_strings":["National University of Defense Technology,Changsha,P. R. China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology,Changsha,P. R. China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034065867","display_name":"Baosheng WANG","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Baosheng Wang","raw_affiliation_strings":["National University of Defense Technology,Changsha,P. R. China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology,Changsha,P. R. China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028990225","display_name":"Qianqian Xing","orcid":"https://orcid.org/0000-0002-8602-9175"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qianqian Xing","raw_affiliation_strings":["National University of Defense Technology,Changsha,P. R. China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology,Changsha,P. R. China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100333210","display_name":"Xiaofeng Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaofeng Wang","raw_affiliation_strings":["National University of Defense Technology,Changsha,P. R. China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology,Changsha,P. R. China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5063949124"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.84852885,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9628000259399414,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9628000259399414,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.010999999940395355,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.006800000090152025,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trace","display_name":"TRACE (psycholinguistics)","score":0.7203999757766724},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.6097000241279602},{"id":"https://openalex.org/keywords/replicate","display_name":"Replicate","score":0.5299999713897705},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.48910000920295715},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.4812999963760376},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4544000029563904},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4408000111579895}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7555999755859375},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.7203999757766724},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.6097000241279602},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5483999848365784},{"id":"https://openalex.org/C2781162219","wikidata":"https://www.wikidata.org/wiki/Q26250693","display_name":"Replicate","level":2,"score":0.5299999713897705},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5153999924659729},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.48910000920295715},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.4812999963760376},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4544000029563904},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4408000111579895},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3939000070095062},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.38940000534057617},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3391000032424927},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.32359999418258667},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.29010000824928284},{"id":"https://openalex.org/C69357855","wikidata":"https://www.wikidata.org/wiki/Q163214","display_name":"Diffusion","level":2,"score":0.27790001034736633},{"id":"https://openalex.org/C2779843651","wikidata":"https://www.wikidata.org/wiki/Q7390335","display_name":"SIGNAL (programming language)","level":2,"score":0.2554999887943268},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.2533000111579895}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ipccc66453.2025.11304629","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ipccc66453.2025.11304629","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Performance, Computing, and Communications Conference (IPCCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1562542037","https://openalex.org/W1657240689","https://openalex.org/W2151552725","https://openalex.org/W2154909745","https://openalex.org/W2746796098","https://openalex.org/W2786310868","https://openalex.org/W2914572864","https://openalex.org/W3135423909","https://openalex.org/W4226069231","https://openalex.org/W4245524709","https://openalex.org/W4283761426","https://openalex.org/W4308198585","https://openalex.org/W4323565565","https://openalex.org/W4379384493","https://openalex.org/W4387807254","https://openalex.org/W4391326551","https://openalex.org/W4393870670","https://openalex.org/W4400063089","https://openalex.org/W4407056919"],"related_works":[],"abstract_inverted_index":{"Deep":[0],"Learning-based":[1],"Side-Channel":[2],"Analysis":[3],"(DLSCA)":[4],"has":[5],"demonstrated":[6],"its":[7,128,147],"potent":[8],"attack":[9],"capability":[10],"against":[11],"cryptographic":[12,77],"systems,":[13],"enabling":[14],"the":[15,26,65,100,133,159,173],"extraction":[16],"of":[17,28,49,68,103,136,161,176],"secret":[18],"information":[19],"from":[20],"leaked":[21],"physical":[22],"signal":[23,50],"traces.":[24,139],"Unfortunately,":[25],"availability":[27],"real":[29,69,104,154,177],"traces":[30,105,155,179],"for":[31,93],"classifier":[32],"training":[33,152,178],"is":[34,52],"often":[35,60],"limited":[36],"due":[37],"to":[38,62,74,130,151,168,182],"restricted":[39],"data":[40],"collection":[41],"or":[42],"protective":[43],"countermeasures.":[44],"The":[45],"generation":[46,187],"and":[47,71,111,125],"enhancement":[48],"trace":[51,95,186],"crucial":[53],"in":[54],"practical":[55,148],"DL-SCA":[56],"analysis.":[57],"Existing":[58],"methods":[59],"struggle":[61],"accurately":[63],"model":[64,91],"feature":[66,101],"distribution":[67],"traces,":[70],"their":[72],"applicability":[73],"emerging":[75],"post-quantum":[76],"(PQC)":[78],"algorithms":[79],"remains":[80],"unexplored.":[81],"In":[82],"this":[83],"paper,":[84],"we":[85,145],"propose":[86],"DMSCT,":[87],"an":[88,112],"attention-enhanced":[89],"diffusion":[90],"framework":[92],"side-channel":[94,138],"generation.":[96],"DM-SCT":[97,118,142,157,171],"precisely":[98],"models":[99],"distributions":[102],"through":[106],"a":[107],"conditional":[108],"injection":[109],"mechanism":[110],"enhanced":[113],"attention":[114],"mechanism.":[115],"We":[116],"evaluate":[117],"across":[119],"three":[120],"PQC":[121],"algorithms:":[122],"NTRU,":[123],"Saber,":[124],"Kyber,":[126],"demonstrating":[127],"ability":[129],"faithfully":[131],"replicate":[132],"leakage":[134],"features":[135],"original":[137],"By":[140],"integrating":[141],"into":[143],"DL-SCA,":[144],"validate":[146],"efficacy.":[149],"Compared":[150],"with":[153],"alone,":[156],"improves":[158],"accuracy":[160],"recovering":[162],"individual":[163],"key":[164],"coefficients":[165],"by":[166,180],"0.62%":[167],"1.6%.":[169],"Furthermore,":[170],"reduces":[172],"required":[174],"number":[175],"20%":[181],"25%,":[183],"outperforming":[184],"state-of-the-art":[185],"methods.":[188]},"counts_by_year":[],"updated_date":"2026-02-23T20:09:44.859080","created_date":"2025-12-29T00:00:00"}
