{"id":"https://openalex.org/W3158634281","doi":"https://doi.org/10.1109/tifs.2021.3074884","title":"Finding the Needle in the Haystack: Metrics for Best Trace Selection in Unsupervised Side-Channel Attacks on Blinded RSA","display_name":"Finding the Needle in the Haystack: Metrics for Best Trace Selection in Unsupervised Side-Channel Attacks on Blinded RSA","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3158634281","doi":"https://doi.org/10.1109/tifs.2021.3074884","mag":"3158634281"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2021.3074884","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2021.3074884","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086459915","display_name":"Alexander Kulow","orcid":"https://orcid.org/0000-0002-8696-7065"},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Alexander Kulow","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Chair of Security in Information Technology, Technical University of Munich, Munich, Germany"],"raw_orcid":"https://orcid.org/0000-0002-8696-7065","affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Chair of Security in Information Technology, Technical University of Munich, Munich, Germany","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048580096","display_name":"Thomas Schamberger","orcid":"https://orcid.org/0000-0002-6553-958X"},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Thomas Schamberger","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Chair of Security in Information Technology, Technical University of Munich, Munich, Germany"],"raw_orcid":"https://orcid.org/0000-0002-6553-958X","affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Chair of Security in Information Technology, Technical University of Munich, Munich, Germany","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061923827","display_name":"Lars Tebelmann","orcid":"https://orcid.org/0000-0003-2014-7184"},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Lars Tebelmann","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Chair of Security in Information Technology, Technical University of Munich, Munich, Germany"],"raw_orcid":"https://orcid.org/0000-0003-2014-7184","affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Chair of Security in Information Technology, Technical University of Munich, Munich, Germany","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026512033","display_name":"Georg Sigl","orcid":"https://orcid.org/0000-0003-3152-941X"},"institutions":[{"id":"https://openalex.org/I4210136922","display_name":"Fraunhofer Institute for Applied and Integrated Security","ror":"https://ror.org/03w0bbr97","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210136922","https://openalex.org/I4923324"]},{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Georg Sigl","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Chair of Security in Information Technology, Technical University of Munich, Munich, Germany","Fraunhofer Institute for Applied and Integrated Security (AISEC), Garching, Germany"],"raw_orcid":"https://orcid.org/0000-0003-3152-941X","affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Chair of Security in Information Technology, Technical University of Munich, Munich, Germany","institution_ids":["https://openalex.org/I62916508"]},{"raw_affiliation_string":"Fraunhofer Institute for Applied and Integrated Security (AISEC), Garching, Germany","institution_ids":["https://openalex.org/I4210136922"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5086459915"],"corresponding_institution_ids":["https://openalex.org/I62916508"],"apc_list":null,"apc_paid":null,"fwci":1.3998,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.84692187,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":"16","issue":null,"first_page":"3254","last_page":"3268"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8197113275527954},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.7491195201873779},{"id":"https://openalex.org/keywords/modular-exponentiation","display_name":"Modular exponentiation","score":0.5991246700286865},{"id":"https://openalex.org/keywords/exponentiation","display_name":"Exponentiation","score":0.5467371940612793},{"id":"https://openalex.org/keywords/trace","display_name":"TRACE (psycholinguistics)","score":0.48530906438827515},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4755104184150696},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4132139980792999},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3885194659233093},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.35145193338394165},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18254786729812622},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.16288849711418152},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.13979896903038025}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8197113275527954},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.7491195201873779},{"id":"https://openalex.org/C152763109","wikidata":"https://www.wikidata.org/wiki/Q1228841","display_name":"Modular exponentiation","level":4,"score":0.5991246700286865},{"id":"https://openalex.org/C81539297","wikidata":"https://www.wikidata.org/wiki/Q33456","display_name":"Exponentiation","level":2,"score":0.5467371940612793},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.48530906438827515},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4755104184150696},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4132139980792999},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3885194659233093},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.35145193338394165},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18254786729812622},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.16288849711418152},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.13979896903038025},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/tifs.2021.3074884","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2021.3074884","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:fraunhofer.de:N-637313","is_oa":false,"landing_page_url":"http://publica.fraunhofer.de/documents/N-637313.html","pdf_url":null,"source":{"id":"https://openalex.org/S4306400801","display_name":"Publikationsdatenbank der Fraunhofer-Gesellschaft (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Fraunhofer AISEC","raw_type":"Journal Article"},{"id":"pmh:oai:mediatum.ub.tum.de:node/1613257","is_oa":false,"landing_page_url":"https://mediatum.ub.tum.de/1613257","pdf_url":null,"source":{"id":"https://openalex.org/S4377196330","display_name":"mediaTUM  (Technical University of Munich)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I62916508","host_organization_name":"Technical University of Munich","host_organization_lineage":["https://openalex.org/I62916508"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"},{"id":"pmh:oai:null:publica/269085","is_oa":false,"landing_page_url":"https://publica.fraunhofer.de/handle/publica/269085","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"journal article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.699999988079071,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W127775163","https://openalex.org/W1461760393","https://openalex.org/W1536508214","https://openalex.org/W1570189918","https://openalex.org/W1579766512","https://openalex.org/W1607006990","https://openalex.org/W1607198972","https://openalex.org/W1613874182","https://openalex.org/W1660562555","https://openalex.org/W1995875735","https://openalex.org/W1996360405","https://openalex.org/W2004814164","https://openalex.org/W2096133993","https://openalex.org/W2126904896","https://openalex.org/W2142795379","https://openalex.org/W2151279347","https://openalex.org/W2154909745","https://openalex.org/W2213874144","https://openalex.org/W2295728772","https://openalex.org/W2478708596","https://openalex.org/W2489788264","https://openalex.org/W2766150207","https://openalex.org/W2795238871","https://openalex.org/W2944942867","https://openalex.org/W2949454685","https://openalex.org/W4237773356","https://openalex.org/W4240680163","https://openalex.org/W4244494905","https://openalex.org/W4292023222","https://openalex.org/W4300601563","https://openalex.org/W6605272091","https://openalex.org/W6633897710","https://openalex.org/W6636388380","https://openalex.org/W6674513603","https://openalex.org/W6681065176"],"related_works":["https://openalex.org/W2004447057","https://openalex.org/W1971956962","https://openalex.org/W2095881422","https://openalex.org/W2168636599","https://openalex.org/W2111965281","https://openalex.org/W127775163","https://openalex.org/W3176506582","https://openalex.org/W1489656073","https://openalex.org/W2393958716","https://openalex.org/W1531734358"],"abstract_inverted_index":{"For":[0],"asymmetric":[1,62],"ciphers,":[2],"such":[3],"as":[4,35,141,143],"RSA":[5,210],"and":[6,21,101,215,242],"ECC,":[7],"side-channel":[8,30,59,69],"attacks":[9,60],"on":[10,61,245],"the":[11,40,72,99,110,139,182,205,223,226,236],"underlying":[12],"exponentiation":[13,103],"are":[14,219],"mitigated":[15],"by":[16,86,213],"countermeasures":[17],"like":[18],"constant-time":[19],"implementation":[20,211],"blinding.":[22,217],"This":[23],"restricts":[24],"an":[25,33,53],"attacker":[26],"to":[27,95,108,134,147,173,181,221],"a":[28,36,87,136,188,200,208,246],"single":[29,160],"trace":[31,74,115,137,224],"for":[32,45,58,75,113,138,192],"attack":[34,111,140],"different":[37],"representation":[38],"of":[39,93,98,104,118,190,235],"private":[41],"key":[42,76,119,194,206],"is":[43,132],"used":[44,133],"each":[46,114],"exponentiation.":[47],"In":[48,106],"this":[49,159],"work,":[50],"we":[51,122,167],"propose":[52],"unsupervised":[54],"machine":[55],"learning":[56],"framework":[57],"cryptography":[63],"that":[64,90],"analyzes":[65],"leakage":[66],"in":[67,116],"multiple":[68],"traces,":[70],"identifying":[71],"best":[73],"retrieval.":[77],"We":[78,185,218],"apply":[79],"Principal":[80],"Component":[81],"Analysis":[82],"(PCA)":[83],"preprocessing":[84],"followed":[85],"classification":[88],"step":[89],"assigns":[91],"segments":[92],"traces":[94,196],"elementary":[96],"operations":[97],"Square":[100],"Multiply":[102],"RSA.":[105],"order":[107],"estimate":[109],"complexity":[112,165,230],"terms":[117],"enumeration":[120],"effort,":[121],"introduce":[123,168],"two":[124],"new":[125],"metrics:":[126],"The":[127],"Entropy-based":[128],"Cost":[129],"Function":[130],"(EBCF)":[131],"select":[135,222],"well":[142],"bits":[144,153],"which":[145,177],"have":[146],"be":[148,155],"brute-forced":[149],"if":[150],"not":[151,179],"all":[152],"can":[154],"determined":[156],"correctly":[157],"from":[158,207,231],"trace.":[161],"To":[162],"reduce":[163],"brute-force":[164,175,229],"further,":[166],"Illegal":[169],"Sequence":[170],"Detection":[171],"(ISD)":[172],"remove":[174],"candidates":[176],"do":[178],"fit":[180],"Square-and-Multiply":[183],"scheme.":[184],"first":[186],"provide":[187],"proof":[189],"concept":[191],"320-bit":[193],"length":[195],"and,":[197],"moving":[198],"towards":[199],"more":[201],"realistic":[202],"scenario,":[203],"retrieve":[204],"1024-bit":[209],"protected":[212],"message":[214],"exponent":[216],"able":[220],"with":[225,239],"least":[227],"remaining":[228],"1000":[232],"power":[233],"measurements":[234],"signature":[237],"generation":[238],"randomized":[240],"inputs":[241],"blinding":[243],"values":[244],"32-bit":[247],"ARM":[248],"Cortex-M4":[249],"microcontroller.":[250]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
