{"id":"https://openalex.org/W2133990218","doi":"https://doi.org/10.1109/isqed.2009.4810299","title":"Side channel aware leakage management in nanoscale Cryptosystem-on-Chip (CoC)","display_name":"Side channel aware leakage management in nanoscale Cryptosystem-on-Chip (CoC)","publication_year":2009,"publication_date":"2009-03-01","ids":{"openalex":"https://openalex.org/W2133990218","doi":"https://doi.org/10.1109/isqed.2009.4810299","mag":"2133990218"},"language":"en","primary_location":{"id":"doi:10.1109/isqed.2009.4810299","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isqed.2009.4810299","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 10th International Symposium on Quality of Electronic Design","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033972733","display_name":"Amir Khatib Zadeh","orcid":null},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Amir Khatib Zadeh","raw_affiliation_strings":["Department of Electrical & Computer Engineering, University of Waterloo, Waterloo, Canada","Department of Electrical and Computer Engineering, University of Waterloo, Canada N2L 3G1"],"affiliations":[{"raw_affiliation_string":"Department of Electrical & Computer Engineering, University of Waterloo, Waterloo, Canada","institution_ids":["https://openalex.org/I151746483"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Waterloo, Canada N2L 3G1","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035154433","display_name":"Catherine H. Gebotys","orcid":"https://orcid.org/0000-0002-7835-3741"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Catherine Gebotys","raw_affiliation_strings":["Department of Electrical & Computer Engineering, University of Waterloo, Waterloo, Canada","Department of Electrical and Computer Engineering, University of Waterloo, Canada N2L 3G1"],"affiliations":[{"raw_affiliation_string":"Department of Electrical & Computer Engineering, University of Waterloo, Waterloo, Canada","institution_ids":["https://openalex.org/I151746483"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Waterloo, Canada N2L 3G1","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5033972733"],"corresponding_institution_ids":["https://openalex.org/I151746483"],"apc_list":null,"apc_paid":null,"fwci":1.7447,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.87624395,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"3659","issue":null,"first_page":"230","last_page":"235"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13182","display_name":"Quantum-Dot Cellular Automata","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.8294700384140015},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.7938412427902222},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.6769025921821594},{"id":"https://openalex.org/keywords/chip","display_name":"Chip","score":0.573546826839447},{"id":"https://openalex.org/keywords/transistor","display_name":"Transistor","score":0.554976224899292},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.48929664492607117},{"id":"https://openalex.org/keywords/quantum-tunnelling","display_name":"Quantum tunnelling","score":0.4514528512954712},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.45023924112319946},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4322812855243683},{"id":"https://openalex.org/keywords/voltage","display_name":"Voltage","score":0.375236839056015},{"id":"https://openalex.org/keywords/electronic-engineering","display_name":"Electronic engineering","score":0.35096949338912964},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.33467376232147217},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.2976301908493042},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28027135133743286},{"id":"https://openalex.org/keywords/materials-science","display_name":"Materials science","score":0.2436470091342926},{"id":"https://openalex.org/keywords/optoelectronics","display_name":"Optoelectronics","score":0.24228405952453613}],"concepts":[{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.8294700384140015},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.7938412427902222},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.6769025921821594},{"id":"https://openalex.org/C165005293","wikidata":"https://www.wikidata.org/wiki/Q1074500","display_name":"Chip","level":2,"score":0.573546826839447},{"id":"https://openalex.org/C172385210","wikidata":"https://www.wikidata.org/wiki/Q5339","display_name":"Transistor","level":3,"score":0.554976224899292},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.48929664492607117},{"id":"https://openalex.org/C120398109","wikidata":"https://www.wikidata.org/wiki/Q175751","display_name":"Quantum tunnelling","level":2,"score":0.4514528512954712},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.45023924112319946},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4322812855243683},{"id":"https://openalex.org/C165801399","wikidata":"https://www.wikidata.org/wiki/Q25428","display_name":"Voltage","level":2,"score":0.375236839056015},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.35096949338912964},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.33467376232147217},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2976301908493042},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28027135133743286},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.2436470091342926},{"id":"https://openalex.org/C49040817","wikidata":"https://www.wikidata.org/wiki/Q193091","display_name":"Optoelectronics","level":1,"score":0.24228405952453613},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isqed.2009.4810299","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isqed.2009.4810299","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 10th International Symposium on Quality of Electronic Design","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5,"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1517875064","https://openalex.org/W1522716264","https://openalex.org/W1750716795","https://openalex.org/W1789158442","https://openalex.org/W1986906087","https://openalex.org/W2043669269","https://openalex.org/W2096490242","https://openalex.org/W2103227017","https://openalex.org/W2116406812","https://openalex.org/W2125263803","https://openalex.org/W2126047883","https://openalex.org/W2130733986","https://openalex.org/W2133198962","https://openalex.org/W2144858417","https://openalex.org/W2145405868","https://openalex.org/W2154909745","https://openalex.org/W2526450033","https://openalex.org/W3149711217","https://openalex.org/W4236436671","https://openalex.org/W4243164749","https://openalex.org/W4285719527","https://openalex.org/W6675468258","https://openalex.org/W6679414413","https://openalex.org/W6681560663"],"related_works":["https://openalex.org/W2004522261","https://openalex.org/W1533979697","https://openalex.org/W2117623867","https://openalex.org/W182679101","https://openalex.org/W3006344745","https://openalex.org/W2103519941","https://openalex.org/W3180573957","https://openalex.org/W2029021368","https://openalex.org/W2162805750","https://openalex.org/W4232705780"],"abstract_inverted_index":{"This":[0,54,97],"paper":[1],"investigates":[2],"the":[3,13,59,72,75,106],"potential":[4],"security":[5,102],"threat":[6],"to":[7,25,111],"nanoscale":[8],"cryptosystem-on-chip":[9],"(CoC)":[10],"posed":[11],"by":[12],"leakage":[14,21,60,115],"power":[15,22],"consumption.":[16],"The":[17,34],"increasing":[18,30],"trend":[19],"of":[20,36,58,74,121],"is":[23,52,99],"shown":[24],"be":[26,89],"highly":[27],"correlated":[28],"with":[29],"side":[31,49,93,112],"channel":[32,50,94,113],"vulnerability.":[33],"effect":[35],"high":[37,76],"threshold":[38],"voltage":[39],"(V":[40],"<sub":[41,78],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[42,79],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">th</sub>":[43,80],")":[44],"transistor":[45,81],"assignment":[46,82],"on":[47],"improving":[48],"resistance":[51],"analyzed.":[53],"investigation":[55],"shows":[56],"growth":[57],"mechanisms":[61],"such":[62],"as":[63],"direct-tunneling":[64],"and":[65,105,119],"band-to-band":[66],"tunneling":[67],"(BTBT)":[68],"currents":[69],"may":[70],"reduce":[71],"effectiveness":[73],"V":[77],"technique;":[83],"however,":[84],"this":[85],"technique":[86],"can":[87],"still":[88],"used":[90],"in":[91,117,123],"developing":[92],"resistant":[95],"cryptosystem.":[96],"research":[98],"crucial":[100],"for":[101],"sensitive":[103],"architecture":[104],"results":[107],"are":[108],"obtained":[109],"leading":[110],"aware":[114],"management":[116],"design":[118],"implementation":[120],"CoC":[122],"submicron":[124],"technology.":[125]},"counts_by_year":[{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
