{"id":"https://openalex.org/W3172211066","doi":"https://doi.org/10.1109/tifs.2021.3089875","title":"DOMREP\u2013An Orthogonal Countermeasure for Arbitrary Order Side-Channel and Fault Attack Protection","display_name":"DOMREP\u2013An Orthogonal Countermeasure for Arbitrary Order Side-Channel and Fault Attack Protection","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3172211066","doi":"https://doi.org/10.1109/tifs.2021.3089875","mag":"3172211066"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2021.3089875","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2021.3089875","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009745226","display_name":"Michael Gruber","orcid":"https://orcid.org/0000-0003-0450-4372"},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Michael Gruber","raw_affiliation_strings":["TUM Department of Electrical and Computer Engineering, Chair of Security in Information Technology, Technical University of Munich, Munich, Germany"],"raw_orcid":"https://orcid.org/0000-0003-0450-4372","affiliations":[{"raw_affiliation_string":"TUM Department of Electrical and Computer Engineering, Chair of Security in Information Technology, Technical University of Munich, Munich, Germany","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002115587","display_name":"Matthias Probst","orcid":"https://orcid.org/0000-0001-5747-0730"},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Matthias Probst","raw_affiliation_strings":["TUM Department of Electrical and Computer Engineering, Chair of Security in Information Technology, Technical University of Munich, Munich, Germany"],"raw_orcid":"https://orcid.org/0000-0001-5747-0730","affiliations":[{"raw_affiliation_string":"TUM Department of Electrical and Computer Engineering, Chair of Security in Information Technology, Technical University of Munich, Munich, Germany","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037163073","display_name":"Patrick Karl","orcid":"https://orcid.org/0000-0001-9476-9651"},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Patrick Karl","raw_affiliation_strings":["TUM Department of Electrical and Computer Engineering, Chair of Security in Information Technology, Technical University of Munich, Munich, Germany"],"raw_orcid":"https://orcid.org/0000-0001-9476-9651","affiliations":[{"raw_affiliation_string":"TUM Department of Electrical and Computer Engineering, Chair of Security in Information Technology, Technical University of Munich, Munich, Germany","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048580096","display_name":"Thomas Schamberger","orcid":"https://orcid.org/0000-0002-6553-958X"},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Thomas Schamberger","raw_affiliation_strings":["TUM Department of Electrical and Computer Engineering, Chair of Security in Information Technology, Technical University of Munich, Munich, Germany"],"raw_orcid":"https://orcid.org/0000-0002-6553-958X","affiliations":[{"raw_affiliation_string":"TUM Department of Electrical and Computer Engineering, Chair of Security in Information Technology, Technical University of Munich, Munich, Germany","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061923827","display_name":"Lars Tebelmann","orcid":"https://orcid.org/0000-0003-2014-7184"},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Lars Tebelmann","raw_affiliation_strings":["TUM Department of Electrical and Computer Engineering, Chair of Security in Information Technology, Technical University of Munich, Munich, Germany"],"raw_orcid":"https://orcid.org/0000-0003-2014-7184","affiliations":[{"raw_affiliation_string":"TUM Department of Electrical and Computer Engineering, Chair of Security in Information Technology, Technical University of Munich, Munich, Germany","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015273703","display_name":"Michael Tempelmeier","orcid":"https://orcid.org/0000-0003-3422-5630"},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Michael Tempelmeier","raw_affiliation_strings":["TUM Department of Electrical and Computer Engineering, Chair of Security in Information Technology, Technical University of Munich, Munich, Germany"],"raw_orcid":"https://orcid.org/0000-0003-3422-5630","affiliations":[{"raw_affiliation_string":"TUM Department of Electrical and Computer Engineering, Chair of Security in Information Technology, Technical University of Munich, Munich, Germany","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026512033","display_name":"Georg Sigl","orcid":"https://orcid.org/0000-0003-3152-941X"},"institutions":[{"id":"https://openalex.org/I4210136922","display_name":"Fraunhofer Institute for Applied and Integrated Security","ror":"https://ror.org/03w0bbr97","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210136922","https://openalex.org/I4923324"]},{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Georg Sigl","raw_affiliation_strings":["TUM Department of Electrical and Computer Engineering, Chair of Security in Information Technology, Technical University of Munich, Munich, Germany","Fraunhofer Institute for Applied and Integrated Security, Garching, Germany"],"raw_orcid":"https://orcid.org/0000-0003-3152-941X","affiliations":[{"raw_affiliation_string":"TUM Department of Electrical and Computer Engineering, Chair of Security in Information Technology, Technical University of Munich, Munich, Germany","institution_ids":["https://openalex.org/I62916508"]},{"raw_affiliation_string":"Fraunhofer Institute for Applied and Integrated Security, Garching, Germany","institution_ids":["https://openalex.org/I4210136922"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5009745226"],"corresponding_institution_ids":["https://openalex.org/I62916508"],"apc_list":null,"apc_paid":null,"fwci":2.6597,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.9153225,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"16","issue":null,"first_page":"4321","last_page":"4335"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.8937637209892273},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7965075969696045},{"id":"https://openalex.org/keywords/emulation","display_name":"Emulation","score":0.6717416644096375},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.6141707301139832},{"id":"https://openalex.org/keywords/fault-injection","display_name":"Fault injection","score":0.5869626998901367},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5278601050376892},{"id":"https://openalex.org/keywords/fault","display_name":"Fault (geology)","score":0.5066669583320618},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.4985804557800293},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.49291563034057617},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.46764087677001953},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4608592092990875},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3562318682670593},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3492093086242676},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.13429132103919983},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09748098254203796}],"concepts":[{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.8937637209892273},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7965075969696045},{"id":"https://openalex.org/C149810388","wikidata":"https://www.wikidata.org/wiki/Q5374873","display_name":"Emulation","level":2,"score":0.6717416644096375},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.6141707301139832},{"id":"https://openalex.org/C2775928411","wikidata":"https://www.wikidata.org/wiki/Q2041312","display_name":"Fault injection","level":3,"score":0.5869626998901367},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5278601050376892},{"id":"https://openalex.org/C175551986","wikidata":"https://www.wikidata.org/wiki/Q47089","display_name":"Fault (geology)","level":2,"score":0.5066669583320618},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.4985804557800293},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.49291563034057617},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.46764087677001953},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4608592092990875},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3562318682670593},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3492093086242676},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.13429132103919983},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09748098254203796},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C165205528","wikidata":"https://www.wikidata.org/wiki/Q83371","display_name":"Seismology","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/tifs.2021.3089875","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2021.3089875","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:fraunhofer.de:N-642090","is_oa":false,"landing_page_url":"http://publica.fraunhofer.de/documents/N-642090.html","pdf_url":null,"source":{"id":"https://openalex.org/S4306400801","display_name":"Publikationsdatenbank der Fraunhofer-Gesellschaft (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Fraunhofer AISEC","raw_type":"Journal Article"},{"id":"pmh:oai:mediatum.ub.tum.de:node/1615242","is_oa":false,"landing_page_url":"https://mediatum.ub.tum.de/1615242","pdf_url":null,"source":{"id":"https://openalex.org/S4377196330","display_name":"mediaTUM  (Technical University of Munich)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I62916508","host_organization_name":"Technical University of Munich","host_organization_lineage":["https://openalex.org/I62916508"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"},{"id":"pmh:oai:publica.fraunhofer.de:publica/270347","is_oa":false,"landing_page_url":"https://publica.fraunhofer.de/handle/publica/270347","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"journal article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7599999904632568,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W108606907","https://openalex.org/W1493213353","https://openalex.org/W1503638523","https://openalex.org/W1592625985","https://openalex.org/W1663689473","https://openalex.org/W1873852107","https://openalex.org/W1964723977","https://openalex.org/W2066425771","https://openalex.org/W2071722828","https://openalex.org/W2128197017","https://openalex.org/W2154909745","https://openalex.org/W2155441237","https://openalex.org/W2295549364","https://openalex.org/W2474114598","https://openalex.org/W2531641859","https://openalex.org/W2534456676","https://openalex.org/W2560330557","https://openalex.org/W2586046457","https://openalex.org/W2619585171","https://openalex.org/W2740336530","https://openalex.org/W2741289068","https://openalex.org/W2795118714","https://openalex.org/W2889402643","https://openalex.org/W2902207657","https://openalex.org/W2914572864","https://openalex.org/W2944942867","https://openalex.org/W2954479288","https://openalex.org/W2983229499","https://openalex.org/W3005279198","https://openalex.org/W3014026134","https://openalex.org/W3019676640","https://openalex.org/W3114165286","https://openalex.org/W3117281882","https://openalex.org/W4238612353","https://openalex.org/W4240267682","https://openalex.org/W4243016930","https://openalex.org/W4251236654","https://openalex.org/W6769579738","https://openalex.org/W6770758941","https://openalex.org/W6775450940"],"related_works":["https://openalex.org/W2133965417","https://openalex.org/W3196113442","https://openalex.org/W3081831718","https://openalex.org/W4319297152","https://openalex.org/W2255916430","https://openalex.org/W2116502997","https://openalex.org/W2763425418","https://openalex.org/W2113148102","https://openalex.org/W2619585171","https://openalex.org/W25847796"],"abstract_inverted_index":{"Protection":[0],"against":[1,44,71,87,135,144],"physical":[2,30],"attacks":[3,23,48,73,76,139],"is":[4,130,146],"a":[5,37,114,122],"major":[6],"requirement":[7],"for":[8,41,84,178,182],"cryptographic":[9],"implementations":[10],"on":[11,112,121],"devices":[12],"which":[13],"can":[14,77],"be":[15,78,133],"accessed":[16],"by":[17,140,148],"attackers.":[18],"Side-channel":[19],"and":[20,46,57,64,74,91,107],"fault":[21,47,75,151],"injection":[22,93],"are":[24],"the":[25,85,92,101,109,166,179],"most":[26],"common":[27],"types":[28],"of":[29,81,94,104,128,150,153,163,186],"attacks.":[31],"In":[32],"this":[33,66],"work":[34],"we":[35],"present":[36],"novel":[38],"generic":[39,102],"solution":[40],"simultaneous":[42],"protection":[43,86],"side-channel":[45,72,89,138],"with":[49],"arbitrary":[50],"order.":[51],"We":[52,99,174],"combine":[53],"domain":[54],"oriented":[55],"masking":[56],"repetition":[58],"codes":[59],"in":[60],"an":[61],"orthogonal":[62,105],"way":[63],"call":[65],"approach":[67],"DOMREP.":[68],"The":[69,142],"resistance":[70,143],"scaled":[79],"independently":[80],"each":[82],"other,":[83],"higher-order":[88],"analysis":[90],"multiple":[95,158],"faults":[96],"including":[97],"SIFA.":[98],"develop":[100],"concept":[103,111],"protection,":[106],"implement":[108],"DOMREP":[110],"GIMLI,":[113],"round":[115],"two":[116],"NIST":[117],"LWC":[118],"competition":[119],"candidate,":[120],"Xilinx":[123],"Artix-7":[124],"FPGA.":[125],"Our":[126,161],"implementation":[127,162,185],"GIMLI":[129,164],"verified":[131,147],"to":[132,171],"resistant":[134],"univariate":[136],"first-order":[137],"TVLA.":[141],"SIFA":[145],"means":[149],"emulation":[152],"single":[154],"as":[155,157],"well":[156],"bit":[159],"faults.":[160],"achieves":[165],"expected":[167],"security":[168],"level":[169],"according":[170],"these":[172],"measurements.":[173],"also":[175],"provide":[176],"numbers":[177],"area":[180],"overhead":[181],"our":[183],"protected":[184],"GIMLI.":[187]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
