{"id":"https://openalex.org/W1984647788","doi":"https://doi.org/10.1109/isscc.2013.6487632","title":"Processor with side-channel attack resistance","display_name":"Processor with side-channel attack resistance","publication_year":2013,"publication_date":"2013-02-01","ids":{"openalex":"https://openalex.org/W1984647788","doi":"https://doi.org/10.1109/isscc.2013.6487632","mag":"1984647788"},"language":"en","primary_location":{"id":"doi:10.1109/isscc.2013.6487632","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isscc.2013.6487632","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE International Solid-State Circuits Conference Digest of Technical Papers","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083305529","display_name":"Jen-Wei Lee","orcid":null},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Jen-Wei Lee","raw_affiliation_strings":["National Chiao Tung University, Hsinchu, Taiwan","National Chiao\u2013Tung University, Hsinchu, Taiwan"],"affiliations":[{"raw_affiliation_string":"National Chiao Tung University, Hsinchu, Taiwan","institution_ids":["https://openalex.org/I148366613"]},{"raw_affiliation_string":"National Chiao\u2013Tung University, Hsinchu, Taiwan","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084242550","display_name":"Szu-Chi Chung","orcid":"https://orcid.org/0000-0002-3137-6188"},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Szu-Chi Chung","raw_affiliation_strings":["National Chiao Tung University, Hsinchu, Taiwan","National Chiao\u2013Tung University, Hsinchu, Taiwan"],"affiliations":[{"raw_affiliation_string":"National Chiao Tung University, Hsinchu, Taiwan","institution_ids":["https://openalex.org/I148366613"]},{"raw_affiliation_string":"National Chiao\u2013Tung University, Hsinchu, Taiwan","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074752759","display_name":"Hsie-Chia Chang","orcid":"https://orcid.org/0000-0002-0525-8129"},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Hsie-Chia Chang","raw_affiliation_strings":["National Chiao Tung University, Hsinchu, Taiwan","National Chiao\u2013Tung University, Hsinchu, Taiwan"],"affiliations":[{"raw_affiliation_string":"National Chiao Tung University, Hsinchu, Taiwan","institution_ids":["https://openalex.org/I148366613"]},{"raw_affiliation_string":"National Chiao\u2013Tung University, Hsinchu, Taiwan","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101838014","display_name":"Chen\u2010Yi Lee","orcid":"https://orcid.org/0000-0002-6795-0874"},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chen-Yi Lee","raw_affiliation_strings":["National Chiao Tung University, Hsinchu, Taiwan","National Chiao\u2013Tung University, Hsinchu, Taiwan"],"affiliations":[{"raw_affiliation_string":"National Chiao Tung University, Hsinchu, Taiwan","institution_ids":["https://openalex.org/I148366613"]},{"raw_affiliation_string":"National Chiao\u2013Tung University, Hsinchu, Taiwan","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5083305529"],"corresponding_institution_ids":["https://openalex.org/I148366613"],"apc_list":null,"apc_paid":null,"fwci":2.472,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.90776115,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"50","last_page":"51"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9890999794006348,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.7773123979568481},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.7244689464569092},{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.7099834680557251},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.6115312576293945},{"id":"https://openalex.org/keywords/scalar-multiplication","display_name":"Scalar multiplication","score":0.5930317044258118},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5834363102912903},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5616936087608337},{"id":"https://openalex.org/keywords/key-size","display_name":"Key size","score":0.5583403706550598},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.5389718413352966},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5213083624839783},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.5172101259231567},{"id":"https://openalex.org/keywords/elliptic-curve","display_name":"Elliptic curve","score":0.4977112114429474},{"id":"https://openalex.org/keywords/elliptic-curve-digital-signature-algorithm","display_name":"Elliptic Curve Digital Signature Algorithm","score":0.46911385655403137},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.45349040627479553},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.4426548480987549},{"id":"https://openalex.org/keywords/curve25519","display_name":"Curve25519","score":0.4366021156311035},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.41900497674942017},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3598477840423584},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3206474184989929},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2853649854660034}],"concepts":[{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.7773123979568481},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.7244689464569092},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.7099834680557251},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.6115312576293945},{"id":"https://openalex.org/C171182647","wikidata":"https://www.wikidata.org/wiki/Q126736","display_name":"Scalar multiplication","level":3,"score":0.5930317044258118},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5834363102912903},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5616936087608337},{"id":"https://openalex.org/C47750902","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key size","level":4,"score":0.5583403706550598},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.5389718413352966},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5213083624839783},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.5172101259231567},{"id":"https://openalex.org/C179603306","wikidata":"https://www.wikidata.org/wiki/Q268493","display_name":"Elliptic curve","level":2,"score":0.4977112114429474},{"id":"https://openalex.org/C197966572","wikidata":"https://www.wikidata.org/wiki/Q915079","display_name":"Elliptic Curve Digital Signature Algorithm","level":5,"score":0.46911385655403137},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.45349040627479553},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.4426548480987549},{"id":"https://openalex.org/C198690329","wikidata":"https://www.wikidata.org/wiki/Q15702839","display_name":"Curve25519","level":5,"score":0.4366021156311035},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.41900497674942017},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3598477840423584},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3206474184989929},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2853649854660034},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isscc.2013.6487632","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isscc.2013.6487632","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE International Solid-State Circuits Conference Digest of Technical Papers","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.41999998688697815}],"awards":[],"funders":[{"id":"https://openalex.org/F4320332178","display_name":"National Institute of Standards and Technology","ror":"https://ror.org/05xpvk416"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W109039816","https://openalex.org/W1576317854","https://openalex.org/W2048246978","https://openalex.org/W2100220590","https://openalex.org/W2109309427","https://openalex.org/W2128270388","https://openalex.org/W2145280842","https://openalex.org/W6634292782","https://openalex.org/W6675246346"],"related_works":["https://openalex.org/W2782833818","https://openalex.org/W1995438231","https://openalex.org/W2741585127","https://openalex.org/W1911636251","https://openalex.org/W2054949991","https://openalex.org/W3009023388","https://openalex.org/W2025494743","https://openalex.org/W2170258245","https://openalex.org/W2356198393","https://openalex.org/W2104673296"],"abstract_inverted_index":{"Public-key":[0],"cryptosystems":[1],"(Fig.":[2],"3.3.1)":[3],"have":[4],"been":[5],"widely":[6],"developed":[7],"for":[8,55,83],"ensuring":[9],"the":[10,30,39,107,131],"security":[11,41],"of":[12],"information":[13,149],"exchange":[14],"in":[15,50],"network":[16],"communications,":[17],"financial":[18],"markets,":[19],"private":[20,132],"data":[21],"storage,":[22],"and":[23,71,90,134,163],"personal":[24],"identification":[25],"devices.":[26],"In":[27,93,140],"contrast":[28],"to":[29,63,105,147],"well-known":[31],"RSA":[32],"algorithm,":[33],"elliptic":[34,80,110],"curve":[35,111],"cryptography":[36],"(ECC)":[37],"provides":[38],"same":[40],"level":[42],"with":[43],"a":[44,96,99],"shorter":[45],"key":[46,91,101,133],"size.":[47],"As":[48],"specified":[49],"IEEE":[51],"P1363":[52],"(Standard":[53],"Specifications":[54],"Public":[56],"Key":[57],"Cryptography),":[58],"ECC":[59],"arithmetic":[60],"is":[61,103,130,136,145],"required":[62],"provide":[64],"not":[65],"only":[66],"dual-field":[67],"operations":[68],"over":[69],"GF(p)":[70],"GF(2":[72],"<sup":[73],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[74],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">m</sup>":[75],")":[76],"but":[77],"also":[78],"arbitrary":[79],"curves":[81],"(EC)":[82],"different":[84],"requirements,":[85],"such":[86],"as":[87],"encryption,":[88],"signature,":[89],"exchange.":[92],"this":[94],"paper,":[95],"solution":[97],"supporting":[98],"521b":[100],"size":[102],"proposed":[104],"accelerate":[106],"most":[108],"time-critical":[109],"scalar":[112],"multiplication":[113],"(ECSM).":[114],"It":[115],"computes":[116],"multiple":[117],"points":[118],"KP":[119],"=":[120],"P":[121,123,135],"+":[122,124,126],"...":[125],"P,":[127],"where":[128],"K":[129],"an":[137],"EC":[138],"point.":[139],"addition,":[141],"side-channel":[142],"attack":[143],"resistance":[144],"implemented":[146],"prevent":[148],"leakage":[150],"from":[151],"simple":[152],"power-analysis":[153,156],"(SPA),":[154],"differential":[155],"(DPA)":[157],"[1],":[158],"zero-value":[159],"point":[160],"(ZVP)":[161],"[2],":[162],"doubling":[164],"attacks":[165],"[3].":[166]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
