{"id":"https://openalex.org/W2140407027","doi":"https://doi.org/10.1109/iscas.2011.5937998","title":"Leakage Power Analysis attacks: Effectiveness on DPA resistant logic styles under process variations","display_name":"Leakage Power Analysis attacks: Effectiveness on DPA resistant logic styles under process variations","publication_year":2011,"publication_date":"2011-05-01","ids":{"openalex":"https://openalex.org/W2140407027","doi":"https://doi.org/10.1109/iscas.2011.5937998","mag":"2140407027"},"language":"en","primary_location":{"id":"doi:10.1109/iscas.2011.5937998","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscas.2011.5937998","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 IEEE International Symposium of Circuits and Systems (ISCAS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083795304","display_name":"Milena Djukanovi\u0107","orcid":"https://orcid.org/0000-0001-9307-513X"},"institutions":[{"id":"https://openalex.org/I5936373","display_name":"University of Montenegro","ror":"https://ror.org/02drrjp49","country_code":"ME","type":"education","lineage":["https://openalex.org/I5936373"]}],"countries":["ME"],"is_corresponding":true,"raw_author_name":"Milena Djukanovic","raw_affiliation_strings":["Faculty of Electrical Engineering, University of Montenegro, Montenegro"],"affiliations":[{"raw_affiliation_string":"Faculty of Electrical Engineering, University of Montenegro, Montenegro","institution_ids":["https://openalex.org/I5936373"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078031617","display_name":"Luca Giancane","orcid":"https://orcid.org/0000-0002-7473-1055"},"institutions":[{"id":"https://openalex.org/I861853513","display_name":"Sapienza University of Rome","ror":"https://ror.org/02be6w209","country_code":"IT","type":"education","lineage":["https://openalex.org/I861853513"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Luca Giancane","raw_affiliation_strings":["Department of Electronic Engineering, University of Roma La Sapienza, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering, University of Roma La Sapienza, Italy","institution_ids":["https://openalex.org/I861853513"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010336494","display_name":"Giuseppe Scotti","orcid":"https://orcid.org/0000-0002-5650-8212"},"institutions":[{"id":"https://openalex.org/I861853513","display_name":"Sapienza University of Rome","ror":"https://ror.org/02be6w209","country_code":"IT","type":"education","lineage":["https://openalex.org/I861853513"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Giuseppe Scotti","raw_affiliation_strings":["Department of Electronic Engineering, University of Roma La Sapienza, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering, University of Roma La Sapienza, Italy","institution_ids":["https://openalex.org/I861853513"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068452963","display_name":"Alessandro Trifiletti","orcid":"https://orcid.org/0000-0001-6231-4273"},"institutions":[{"id":"https://openalex.org/I861853513","display_name":"Sapienza University of Rome","ror":"https://ror.org/02be6w209","country_code":"IT","type":"education","lineage":["https://openalex.org/I861853513"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Alessandro Trifiletti","raw_affiliation_strings":["Department of Electronic Engineering, University of Roma La Sapienza, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering, University of Roma La Sapienza, Italy","institution_ids":["https://openalex.org/I861853513"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052037141","display_name":"Massimo Alioto","orcid":"https://orcid.org/0000-0002-4127-8258"},"institutions":[{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Massimo Alioto","raw_affiliation_strings":["Berkeley Wireless Research Center, University of California Berkeley, USA","DII, University of Sienna, Italy"],"affiliations":[{"raw_affiliation_string":"Berkeley Wireless Research Center, University of California Berkeley, USA","institution_ids":["https://openalex.org/I95457486"]},{"raw_affiliation_string":"DII, University of Sienna, Italy","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5083795304"],"corresponding_institution_ids":["https://openalex.org/I5936373"],"apc_list":null,"apc_paid":null,"fwci":1.7103,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.87158924,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"2043","last_page":"2046"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9779000282287598,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.8944331407546997},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.7095144987106323},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6647723913192749},{"id":"https://openalex.org/keywords/logic-gate","display_name":"Logic gate","score":0.5950357913970947},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5738390684127808},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.5561719536781311},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4928421974182129},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4036024510860443},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.14896345138549805}],"concepts":[{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.8944331407546997},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.7095144987106323},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6647723913192749},{"id":"https://openalex.org/C131017901","wikidata":"https://www.wikidata.org/wiki/Q170451","display_name":"Logic gate","level":2,"score":0.5950357913970947},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5738390684127808},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.5561719536781311},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4928421974182129},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4036024510860443},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.14896345138549805},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/iscas.2011.5937998","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscas.2011.5937998","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 IEEE International Symposium of Circuits and Systems (ISCAS)","raw_type":"proceedings-article"},{"id":"pmh:oai:iris.uniroma1.it:11573/1615022","is_oa":false,"landing_page_url":"http://hdl.handle.net/11573/1615022","pdf_url":null,"source":{"id":"https://openalex.org/S4377196107","display_name":"IRIS Research product catalog (Sapienza University of Rome)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/conferenceObject"},{"id":"pmh:oai:usiena-air.unisi.it:11365/36171","is_oa":false,"landing_page_url":"http://hdl.handle.net/11365/36171","pdf_url":null,"source":{"id":"https://openalex.org/S4377196319","display_name":"Use Siena air (University of Siena)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I102064193","host_organization_name":"University of Siena","host_organization_lineage":["https://openalex.org/I102064193"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6200000047683716}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W89245623","https://openalex.org/W1537808739","https://openalex.org/W1549320745","https://openalex.org/W1742626251","https://openalex.org/W2105114022","https://openalex.org/W2149099062","https://openalex.org/W2154909745","https://openalex.org/W2154953758","https://openalex.org/W2476901852","https://openalex.org/W4231098049","https://openalex.org/W6603593642","https://openalex.org/W6633002134","https://openalex.org/W6637712639","https://openalex.org/W6682554491"],"related_works":["https://openalex.org/W5280335","https://openalex.org/W2989964095","https://openalex.org/W2164725015","https://openalex.org/W2782264121","https://openalex.org/W4323926098","https://openalex.org/W4384807855","https://openalex.org/W182679101","https://openalex.org/W1968560271","https://openalex.org/W2081998479","https://openalex.org/W2043669269"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"the":[3,6,20,58,65,95],"effectiveness":[4],"of":[5,22,67],"recently":[7],"proposed":[8],"Leakage":[9],"Power":[10,122],"Analysis":[11,53,123],"(LPA)":[12],"attacks":[13,42,83,125,144,168,188],"to":[14,110,139,150,156,162,185],"cryptographic":[15],"circuits":[16,26,106],"is":[17,71,75],"analyzed":[18],"in":[19,33,50,171],"presence":[21],"process":[23,61,92],"variations.":[24,93],"Reference":[25],"(e.g.,":[27],"S-BOX,":[28],"crypto":[29],"core)":[30],"were":[31,126],"designed":[32],"various":[34],"logic":[35,99,105,114,134],"styles,":[36],"and":[37,90],"their":[38],"robustness":[39],"against":[40,119,166],"LPA":[41,68,82,111,140,143,173,187],"was":[43],"comparatively":[44],"evaluated":[45],"through":[46],"Monte":[47],"Carlo":[48],"simulations":[49],"65":[51],"nm.":[52],"allowed":[54],"for":[55],"better":[56],"understanding":[57],"impact":[59],"that":[60,74,81,102,116,132,177,192],"variations":[62],"have":[63],"on":[64],"outcome":[66],"attacks,":[69,174],"which":[70],"an":[72,146],"aspect":[73],"not":[76],"understood":[77],"currently.":[78],"Results":[79],"show":[80],"are":[84,107,117,136,145,169],"rather":[85],"effective":[86],"also":[87,127],"under":[88],"die-to-die":[89],"within-die":[91],"Moreover,":[94,159],"comparison":[96],"between":[97],"different":[98],"styles":[100,115,135],"showed":[101,131],"standard":[103],"CMOS":[104],"extremely":[108],"vulnerable":[109,138],"attacks.":[112,141,158],"Other":[113],"robust":[118],"traditional":[120,160],"Differential":[121],"(DPA)":[124],"compared.":[128],"Interestingly,":[129],"analysis":[130],"these":[133],"still":[137],"Hence,":[142],"even":[147],"greater":[148],"threat":[149],"Smart":[151,164],"Cards":[152,165],"information":[153],"security,":[154],"compared":[155],"DPA":[157,167],"methods":[161],"protect":[163],"ineffective":[170],"counteracting":[172],"thereby":[175],"showing":[176],"a":[178],"significant":[179],"research":[180],"effort":[181],"will":[182],"be":[183],"needed":[184],"counteract":[186],"with":[189],"suitable":[190],"solutions":[191],"ensure":[193],"high":[194],"security":[195],"standards.":[196]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
