{"id":"https://openalex.org/W1524118270","doi":"https://doi.org/10.1109/isvdat.2015.7208123","title":"Side channel attack resistant architecture for elliptic curve cryptography","display_name":"Side channel attack resistant architecture for elliptic curve cryptography","publication_year":2015,"publication_date":"2015-06-01","ids":{"openalex":"https://openalex.org/W1524118270","doi":"https://doi.org/10.1109/isvdat.2015.7208123","mag":"1524118270"},"language":"en","primary_location":{"id":"doi:10.1109/isvdat.2015.7208123","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isvdat.2015.7208123","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 19th International Symposium on VLSI Design and Test","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004013021","display_name":"Pravin Zode","orcid":"https://orcid.org/0000-0002-0133-290X"},"institutions":[{"id":"https://openalex.org/I167153416","display_name":"Visvesvaraya National Institute of Technology","ror":"https://ror.org/02zrtpp84","country_code":"IN","type":"education","lineage":["https://openalex.org/I167153416"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Pravin Zode","raw_affiliation_strings":["Research Scholar, Center for VLSI and Nano Technology Visvesvaraya National Institute of Technology, Nagpur, India","Center for VLSI & Nano-Technology, Visvesvaraya National Institute of Technology, Nagpur, India"],"affiliations":[{"raw_affiliation_string":"Research Scholar, Center for VLSI and Nano Technology Visvesvaraya National Institute of Technology, Nagpur, India","institution_ids":["https://openalex.org/I167153416"]},{"raw_affiliation_string":"Center for VLSI & Nano-Technology, Visvesvaraya National Institute of Technology, Nagpur, India","institution_ids":["https://openalex.org/I167153416"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075175186","display_name":"Raghavendra Deshmukh","orcid":"https://orcid.org/0000-0002-8620-2951"},"institutions":[{"id":"https://openalex.org/I167153416","display_name":"Visvesvaraya National Institute of Technology","ror":"https://ror.org/02zrtpp84","country_code":"IN","type":"education","lineage":["https://openalex.org/I167153416"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Raghavendra B. Deshmukh","raw_affiliation_strings":["Center for VLSI and Nano Technology Visvesvaraya National Institute of Technology, Nagpur, India","Center for VLSI & Nano-Technology, Visvesvaraya National Institute of Technology, Nagpur, India"],"affiliations":[{"raw_affiliation_string":"Center for VLSI and Nano Technology Visvesvaraya National Institute of Technology, Nagpur, India","institution_ids":["https://openalex.org/I167153416"]},{"raw_affiliation_string":"Center for VLSI & Nano-Technology, Visvesvaraya National Institute of Technology, Nagpur, India","institution_ids":["https://openalex.org/I167153416"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5004013021"],"corresponding_institution_ids":["https://openalex.org/I167153416"],"apc_list":null,"apc_paid":null,"fwci":0.7946,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.79513302,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"1880","issue":null,"first_page":"1","last_page":"2"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9890999794006348,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.765400767326355},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.7375277280807495},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.630547821521759},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6276088953018188},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.6078941226005554},{"id":"https://openalex.org/keywords/key-size","display_name":"Key size","score":0.5143438577651978},{"id":"https://openalex.org/keywords/elliptic-curve-digital-signature-algorithm","display_name":"Elliptic Curve Digital Signature Algorithm","score":0.5009899139404297},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5005850791931152},{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.44525110721588135},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4317152202129364},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4208657145500183},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.38458096981048584}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.765400767326355},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.7375277280807495},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.630547821521759},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6276088953018188},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.6078941226005554},{"id":"https://openalex.org/C47750902","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key size","level":4,"score":0.5143438577651978},{"id":"https://openalex.org/C197966572","wikidata":"https://www.wikidata.org/wiki/Q915079","display_name":"Elliptic Curve Digital Signature Algorithm","level":5,"score":0.5009899139404297},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5005850791931152},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.44525110721588135},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4317152202129364},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4208657145500183},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.38458096981048584}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isvdat.2015.7208123","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isvdat.2015.7208123","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 19th International Symposium on VLSI Design and Test","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W60689211","https://openalex.org/W1935672779","https://openalex.org/W2072402822","https://openalex.org/W2096490242","https://openalex.org/W2099570668","https://openalex.org/W2100220590","https://openalex.org/W2106916437","https://openalex.org/W6674594632"],"related_works":["https://openalex.org/W2782833818","https://openalex.org/W2102786134","https://openalex.org/W2360623194","https://openalex.org/W4226182343","https://openalex.org/W1565266559","https://openalex.org/W3191743943","https://openalex.org/W2037734447","https://openalex.org/W2633581358","https://openalex.org/W2186564849","https://openalex.org/W2111698159"],"abstract_inverted_index":{"With":[0],"the":[1,37,68,79,147,170,186,195,199,203],"widespread":[2],"use":[3,38],"of":[4,19,24,39,70,81,103,120,157,222],"applications":[5],"like":[6,57,105],"internet":[7],"banking,":[8],"secured":[9],"communication,":[10],"emails,":[11],"etc.":[12,108],"information":[13,20,163,179,201],"security":[14,93,118],"is":[15,46,75,85,110,139,206],"important":[16],"concern.":[17],"Security":[18],"depends":[21],"on":[22,78,192,220],"implementation":[23,156],"cryptographic":[25],"algorithm":[26,159],"and":[27,53,135,137,217,228],"its":[28],"complexity":[29],"to":[30,48,99,193],"solve":[31],"in":[32],"reverse":[33],"direction.":[34],"However,":[35,154],"with":[36,94,218],"current":[40],"high":[41],"speed":[42],"computational":[43],"resources":[44],"it":[45,90],"possible":[47],"carry":[49],"out":[50],"brute-force":[51],"attack":[52],"various":[54],"other":[55,100],"techniques":[56,102],"analyzing":[58],"power,":[59],"temperature,":[60],"timing":[61,176],"information.":[62],"Therefore,":[63],"cryptosystems":[64],"are":[65,142],"always":[66],"under":[67],"threat":[69],"attacks.":[71],"Elliptic":[72],"Curve":[73],"Cryptography":[74],"system":[76,171],"based":[77,130],"theory":[80],"elliptic":[82],"curves.":[83],"It":[84,109],"very":[86],"promising":[87],"technique":[88],"as":[89,119,149],"offers":[91,116],"better":[92],"shorter":[95],"key":[96],"length":[97],"compared":[98],"contemporary":[101],"encryption":[104],"AES,":[106],"RSA":[107],"widely":[111],"accepted":[112],"that":[113],"160-bit":[114],"ECC":[115,126],"equivalent":[117],"1024-bit":[121],"RSA.":[122],"This":[123,205],"feature":[124],"makes":[125],"attractive":[127],"for":[128,145],"constrained":[129],"devices":[131],"where":[132],"less":[133],"power":[134,174],"storage":[136],"computing":[138],"required.":[140],"FPGAs":[141],"suitable":[143],"platform":[144],"implementing":[146],"cryptosystem":[148],"they":[150],"provides":[151],"rapid":[152],"prototyping.":[153],"hardware":[155],"crypto":[158],"can":[160,184],"leak":[161],"secret":[162,200],"through":[164],"side":[165],"channel":[166],"attacks":[167],"considerably":[168],"weakens":[169],"security.":[172],"Typically,":[173],"consumption,":[175],"information,":[177],"electromagnetic":[178],"or":[180,212],"inserting":[181,208],"faults":[182],"adversary":[183],"analyze":[185],"system.":[187,204],"The":[188],"proposed":[189],"work":[190],"focuses":[191],"avoid":[194],"attacker":[196],"from":[197,202],"gaining":[198],"done":[207],"noise,":[209],"redundant":[210],"computations":[211],"by":[213],"false":[214],"random":[215],"traces":[216],"focus":[219],"tradeoff":[221],"VLSI":[223],"design":[224],"i.e.":[225],"Power,":[226],"Area":[227],"Delay.":[229]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
