{"id":"https://openalex.org/W4405440670","doi":"https://doi.org/10.1109/pst62714.2024.10788048","title":"Hardware Implementation of a Hybrid Dynamic Gold Code-Based Countermeasure Against Side-Channel Attacks","display_name":"Hardware Implementation of a Hybrid Dynamic Gold Code-Based Countermeasure Against Side-Channel Attacks","publication_year":2024,"publication_date":"2024-08-28","ids":{"openalex":"https://openalex.org/W4405440670","doi":"https://doi.org/10.1109/pst62714.2024.10788048"},"language":"en","primary_location":{"id":"doi:10.1109/pst62714.2024.10788048","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst62714.2024.10788048","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 21st Annual International Conference on Privacy, Security and Trust (PST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022462569","display_name":"Thai-Ha Tran","orcid":"https://orcid.org/0000-0001-8011-5518"},"institutions":[{"id":"https://openalex.org/I20529979","display_name":"University of Electro-Communications","ror":"https://ror.org/02x73b849","country_code":"JP","type":"education","lineage":["https://openalex.org/I20529979"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Thai-Ha Tran","raw_affiliation_strings":["Univ. of Electro-Communications,Dept. of Computer and Network Engr.,Tokyo,Japan"],"affiliations":[{"raw_affiliation_string":"Univ. of Electro-Communications,Dept. of Computer and Network Engr.,Tokyo,Japan","institution_ids":["https://openalex.org/I20529979"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092636076","display_name":"Duc-Thuan Dam","orcid":"https://orcid.org/0000-0001-8998-9721"},"institutions":[{"id":"https://openalex.org/I20529979","display_name":"University of Electro-Communications","ror":"https://ror.org/02x73b849","country_code":"JP","type":"education","lineage":["https://openalex.org/I20529979"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Duc-Thuan Dam","raw_affiliation_strings":["Univ. of Electro-Communications,Dept. of Computer and Network Engr.,Tokyo,Japan"],"affiliations":[{"raw_affiliation_string":"Univ. of Electro-Communications,Dept. of Computer and Network Engr.,Tokyo,Japan","institution_ids":["https://openalex.org/I20529979"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052625146","display_name":"Binh Kieu-Do-Nguyen","orcid":"https://orcid.org/0000-0001-7240-7203"},"institutions":[{"id":"https://openalex.org/I20529979","display_name":"University of Electro-Communications","ror":"https://ror.org/02x73b849","country_code":"JP","type":"education","lineage":["https://openalex.org/I20529979"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Binh Kieu-Do-Nguyen","raw_affiliation_strings":["Univ. of Electro-Communications,Dept. of Computer and Network Engr.,Tokyo,Japan"],"affiliations":[{"raw_affiliation_string":"Univ. of Electro-Communications,Dept. of Computer and Network Engr.,Tokyo,Japan","institution_ids":["https://openalex.org/I20529979"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082516246","display_name":"Van\u2010Phuc Hoang","orcid":"https://orcid.org/0000-0003-0944-8701"},"institutions":[{"id":"https://openalex.org/I131359167","display_name":"Le Quy Don Technical University","ror":"https://ror.org/04wgyjv21","country_code":"VN","type":"education","lineage":["https://openalex.org/I131359167"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Van-Phuc Hoang","raw_affiliation_strings":["Institute of System Integration, Le Quy Don Technical Univ.,Hanoi,Vietnam"],"affiliations":[{"raw_affiliation_string":"Institute of System Integration, Le Quy Don Technical Univ.,Hanoi,Vietnam","institution_ids":["https://openalex.org/I131359167"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025387024","display_name":"Trong-Thuc Hoang","orcid":"https://orcid.org/0000-0002-4078-0836"},"institutions":[{"id":"https://openalex.org/I20529979","display_name":"University of Electro-Communications","ror":"https://ror.org/02x73b849","country_code":"JP","type":"education","lineage":["https://openalex.org/I20529979"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Trong-Thuc Hoang","raw_affiliation_strings":["Univ. of Electro-Communications,Dept. of Computer and Network Engr.,Tokyo,Japan"],"affiliations":[{"raw_affiliation_string":"Univ. of Electro-Communications,Dept. of Computer and Network Engr.,Tokyo,Japan","institution_ids":["https://openalex.org/I20529979"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042912660","display_name":"Cong\u2010Kha Pham","orcid":"https://orcid.org/0000-0001-5255-4919"},"institutions":[{"id":"https://openalex.org/I20529979","display_name":"University of Electro-Communications","ror":"https://ror.org/02x73b849","country_code":"JP","type":"education","lineage":["https://openalex.org/I20529979"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Cong-Kha Pham","raw_affiliation_strings":["Univ. of Electro-Communications,Dept. of Computer and Network Engr.,Tokyo,Japan"],"affiliations":[{"raw_affiliation_string":"Univ. of Electro-Communications,Dept. of Computer and Network Engr.,Tokyo,Japan","institution_ids":["https://openalex.org/I20529979"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5022462569"],"corresponding_institution_ids":["https://openalex.org/I20529979"],"apc_list":null,"apc_paid":null,"fwci":0.3626,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.69928046,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9851999878883362,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9797000288963318,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.8302738666534424},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.7727375626564026},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.696696400642395},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5943422317504883},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5193408727645874},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4976964294910431},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3549043536186218},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32326996326446533},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2835693955421448},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.22842714190483093},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.16863155364990234},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.15191435813903809}],"concepts":[{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.8302738666534424},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.7727375626564026},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.696696400642395},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5943422317504883},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5193408727645874},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4976964294910431},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3549043536186218},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32326996326446533},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2835693955421448},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.22842714190483093},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.16863155364990234},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.15191435813903809},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/pst62714.2024.10788048","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst62714.2024.10788048","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 21st Annual International Conference on Privacy, Security and Trust (PST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1532319909","https://openalex.org/W1562542037","https://openalex.org/W2113688179","https://openalex.org/W2153126169","https://openalex.org/W2362080632","https://openalex.org/W2807669647","https://openalex.org/W2954169045","https://openalex.org/W2997725831","https://openalex.org/W3093818042","https://openalex.org/W3180032954","https://openalex.org/W4294325515","https://openalex.org/W4319997236","https://openalex.org/W4361983685","https://openalex.org/W4378800901","https://openalex.org/W4389609823"],"related_works":["https://openalex.org/W2378749186","https://openalex.org/W2364088131","https://openalex.org/W2362741838","https://openalex.org/W622044715","https://openalex.org/W2378994067","https://openalex.org/W1598708558","https://openalex.org/W2347979151","https://openalex.org/W2366397149","https://openalex.org/W2121017442","https://openalex.org/W1790664656"],"abstract_inverted_index":{"Side-channel":[0],"attacks":[1],"have":[2],"emerged":[3],"as":[4],"the":[5,10,27,59,126,129,144,148],"predominant":[6],"approach":[7,149],"for":[8,96],"exploiting":[9],"weaknesses":[11],"of":[12,30,85,105,115,125],"cryptographic":[13],"equipment.":[14],"Therefore,":[15],"it":[16,93],"is":[17,61,94,109,134,150],"becoming":[18],"increasingly":[19],"necessary":[20],"to":[21,55,75,143,152,166],"prioritize":[22],"countermeasures":[23,46],"that":[24],"can":[25],"improve":[26],"security":[28],"level":[29],"these":[31],"implementations.":[32],"A":[33],"Mixed-Mode":[34],"Clock":[35],"Manager":[36],"(MMCM)":[37],"primitive":[38],"has":[39],"been":[40],"utilized":[41],"in":[42,113],"several":[43],"time-based":[44],"hiding":[45],"against":[47],"side-channel":[48],"attacks.":[49],"However,":[50],"they":[51],"cannot":[52],"be":[53],"applied":[54],"ASIC":[56,100],"implementations":[57],"because":[58],"MMCM":[60],"a":[62,69,83,139],"Xilinx":[63],"primitive.":[64],"Consequently,":[65],"this":[66],"paper":[67],"proposes":[68],"hybrid":[70],"dynamic":[71],"Gold":[72],"code-based":[73],"solution":[74],"generate":[76],"multiple":[77],"different":[78],"frequencies.":[79],"The":[80,102,121],"countermeasure":[81],"combines":[82],"pair":[84],"preferred":[86],"polynomials":[87],"with":[88],"one":[89,167],"ring":[90],"oscillator,":[91],"so":[92],"suitable":[95],"both":[97,153],"FPGA":[98],"and":[99,111,118,155],"designs.":[101],"hardware":[103],"overhead":[104],"our":[106],"suggested":[107],"architecture":[108],"1.007\u00d7":[110],"1.009\u00d7":[112],"terms":[114],"slice":[116],"LUTs":[117],"registers,":[119],"respectively.":[120],"total":[122],"area":[123],"cost":[124],"circuit":[127],"on":[128],"CMOS":[130],"0.18":[131],"um":[132],"process":[133],"398,835":[135],"square":[136],"micrometers,":[137],"representing":[138],"1.004x":[140],"increase":[141],"compared":[142],"unprotected":[145],"case.":[146],"Moreover,":[147],"resistant":[151],"standard":[154],"sliding":[156],"window-based":[157],"Correlation":[158],"Power":[159],"Analysis":[160],"attacks,":[161],"even":[162],"when":[163],"employing":[164],"UP":[165],"million":[168],"power":[169],"traces.":[170]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
