{"id":"https://openalex.org/W4401907708","doi":"https://doi.org/10.1109/tvlsi.2024.3444851","title":"Spread Spectrum-Based Countermeasures for Cryptographic RISC-V SoC","display_name":"Spread Spectrum-Based Countermeasures for Cryptographic RISC-V SoC","publication_year":2024,"publication_date":"2024-08-27","ids":{"openalex":"https://openalex.org/W4401907708","doi":"https://doi.org/10.1109/tvlsi.2024.3444851"},"language":"en","primary_location":{"id":"doi:10.1109/tvlsi.2024.3444851","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tvlsi.2024.3444851","pdf_url":null,"source":{"id":"https://openalex.org/S37538908","display_name":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems","issn_l":"1063-8210","issn":["1063-8210","1557-9999"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022462569","display_name":"Thai-Ha Tran","orcid":"https://orcid.org/0000-0001-8011-5518"},"institutions":[{"id":"https://openalex.org/I20529979","display_name":"University of Electro-Communications","ror":"https://ror.org/02x73b849","country_code":"JP","type":"education","lineage":["https://openalex.org/I20529979"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Thai-Ha Tran","raw_affiliation_strings":["Department of Computer and Network Engineering, The University of Electro-Communications, Tokyo, Japan"],"raw_orcid":"https://orcid.org/0000-0001-8011-5518","affiliations":[{"raw_affiliation_string":"Department of Computer and Network Engineering, The University of Electro-Communications, Tokyo, Japan","institution_ids":["https://openalex.org/I20529979"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061203663","display_name":"Ba-Anh Dao","orcid":"https://orcid.org/0000-0002-8761-6398"},"institutions":[{"id":"https://openalex.org/I4210155035","display_name":"Academy of Cryptography Techniques","ror":"https://ror.org/05nfbnp91","country_code":"VN","type":"education","lineage":["https://openalex.org/I4210155035"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Ba-Anh Dao","raw_affiliation_strings":["Institute of Scientific and Technological Research and Application, Academy of Cryptography Techniques, Hanoi, Vietnam"],"raw_orcid":"https://orcid.org/0000-0002-8761-6398","affiliations":[{"raw_affiliation_string":"Institute of Scientific and Technological Research and Application, Academy of Cryptography Techniques, Hanoi, Vietnam","institution_ids":["https://openalex.org/I4210155035"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026766200","display_name":"Duc-Hung Le","orcid":"https://orcid.org/0000-0003-3227-9117"},"institutions":[{"id":"https://openalex.org/I123565023","display_name":"Vietnam National University Ho Chi Minh City","ror":"https://ror.org/00waaqh38","country_code":"VN","type":"education","lineage":["https://openalex.org/I123565023"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Duc-Hung Le","raw_affiliation_strings":["Faculty of Electronics and Telecommunications, The University of Science, Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam"],"raw_orcid":"https://orcid.org/0000-0003-3227-9117","affiliations":[{"raw_affiliation_string":"Faculty of Electronics and Telecommunications, The University of Science, Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam","institution_ids":["https://openalex.org/I123565023"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082516246","display_name":"Van\u2010Phuc Hoang","orcid":"https://orcid.org/0000-0003-0944-8701"},"institutions":[{"id":"https://openalex.org/I131359167","display_name":"Le Quy Don Technical University","ror":"https://ror.org/04wgyjv21","country_code":"VN","type":"education","lineage":["https://openalex.org/I131359167"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Van-Phuc Hoang","raw_affiliation_strings":["Institute of System Integration, Le Quy Don Technical University, Hanoi, Vietnam"],"raw_orcid":"https://orcid.org/0000-0003-0944-8701","affiliations":[{"raw_affiliation_string":"Institute of System Integration, Le Quy Don Technical University, Hanoi, Vietnam","institution_ids":["https://openalex.org/I131359167"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025387024","display_name":"Trong-Thuc Hoang","orcid":"https://orcid.org/0000-0002-4078-0836"},"institutions":[{"id":"https://openalex.org/I20529979","display_name":"University of Electro-Communications","ror":"https://ror.org/02x73b849","country_code":"JP","type":"education","lineage":["https://openalex.org/I20529979"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Trong-Thuc Hoang","raw_affiliation_strings":["Department of Computer and Network Engineering, The University of Electro-Communications, Tokyo, Japan"],"raw_orcid":"https://orcid.org/0000-0002-4078-0836","affiliations":[{"raw_affiliation_string":"Department of Computer and Network Engineering, The University of Electro-Communications, Tokyo, Japan","institution_ids":["https://openalex.org/I20529979"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042912660","display_name":"Cong\u2010Kha Pham","orcid":"https://orcid.org/0000-0001-5255-4919"},"institutions":[{"id":"https://openalex.org/I20529979","display_name":"University of Electro-Communications","ror":"https://ror.org/02x73b849","country_code":"JP","type":"education","lineage":["https://openalex.org/I20529979"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Cong-Kha Pham","raw_affiliation_strings":["Department of Computer and Network Engineering, The University of Electro-Communications, Tokyo, Japan"],"raw_orcid":"https://orcid.org/0000-0001-5255-4919","affiliations":[{"raw_affiliation_string":"Department of Computer and Network Engineering, The University of Electro-Communications, Tokyo, Japan","institution_ids":["https://openalex.org/I20529979"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5022462569"],"corresponding_institution_ids":["https://openalex.org/I20529979"],"apc_list":null,"apc_paid":null,"fwci":0.9487,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.74063472,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":"32","issue":"12","first_page":"2341","last_page":"2354"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6402814388275146},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5823333263397217},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.5353237986564636},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4192826747894287},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4084387421607971},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.388259619474411}],"concepts":[{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6402814388275146},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5823333263397217},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.5353237986564636},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4192826747894287},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4084387421607971},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.388259619474411}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tvlsi.2024.3444851","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tvlsi.2024.3444851","pdf_url":null,"source":{"id":"https://openalex.org/S37538908","display_name":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems","issn_l":"1063-8210","issn":["1063-8210","1557-9999"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320335839","display_name":"National Institute of Information and Communications Technology","ror":"https://ror.org/016bgq349"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W1532319909","https://openalex.org/W1543721789","https://openalex.org/W1562542037","https://openalex.org/W2146852129","https://openalex.org/W2153126169","https://openalex.org/W2578142399","https://openalex.org/W2592257304","https://openalex.org/W2807669647","https://openalex.org/W2912325400","https://openalex.org/W2923594358","https://openalex.org/W2944942867","https://openalex.org/W2954019744","https://openalex.org/W2955681262","https://openalex.org/W2997725831","https://openalex.org/W3091726562","https://openalex.org/W3093818042","https://openalex.org/W3114532883","https://openalex.org/W3157704946","https://openalex.org/W3157916761","https://openalex.org/W3159032828","https://openalex.org/W3161792922","https://openalex.org/W3169339168","https://openalex.org/W3186830680","https://openalex.org/W3200092406","https://openalex.org/W3213857549","https://openalex.org/W4223504011","https://openalex.org/W4239568572","https://openalex.org/W4240560709","https://openalex.org/W4243494487","https://openalex.org/W4253111648","https://openalex.org/W4285110201","https://openalex.org/W4294325515","https://openalex.org/W4296437373","https://openalex.org/W4312476069","https://openalex.org/W4319997236","https://openalex.org/W4321381226","https://openalex.org/W4364322571","https://openalex.org/W4384519108","https://openalex.org/W4385187377","https://openalex.org/W4385250791","https://openalex.org/W4385486310","https://openalex.org/W4386363014","https://openalex.org/W4386965268","https://openalex.org/W4387934860","https://openalex.org/W4389609823","https://openalex.org/W4389664598"],"related_works":["https://openalex.org/W2904818008","https://openalex.org/W2904314268","https://openalex.org/W57958781","https://openalex.org/W1554274402","https://openalex.org/W87530933","https://openalex.org/W4240432851","https://openalex.org/W2289378658","https://openalex.org/W1531360494","https://openalex.org/W1988007309","https://openalex.org/W154233216"],"abstract_inverted_index":{"Side-channel":[0],"analysis":[1,168],"attacks":[2,123,179],"have":[3],"become":[4],"the":[5,10,21,80,94,99,131,137,153,192,206,219],"primary":[6],"method":[7],"for":[8,64,109],"exploiting":[9],"vulnerabilities":[11],"of":[12,24,96,114],"cryptographic":[13,49],"devices.":[14],"Therefore,":[15],"focusing":[16],"on":[17,46,130],"countermeasures":[18],"to":[19,148,163,222],"enhance":[20],"security":[22],"level":[23],"these":[25],"implementations":[26],"evolves":[27],"even":[28],"more":[29],"urgently.":[30],"This":[31],"article":[32],"proposes":[33],"a":[34,65,164,182],"time-based":[35],"hiding":[36],"countermeasure":[37],"by":[38,53,119],"using":[39],"spread-spectrum":[40],"signals.":[41,57],"In":[42],"our":[43,158],"RISC-V":[44],"system":[45],"chip":[47],"(SoC),":[48],"accelerators":[50],"are":[51],"given":[52],"random":[54],"dynamic":[55],"frequency-hopping":[56],"We":[58],"found":[59],"223":[60],"available":[61],"parameter":[62],"sets":[63],"Xilinx":[66],"Mixed-Mode":[67],"Clock":[68],"Manage":[69],"primitive":[70],"in":[71,79,106,201,218],"spread":[72,100],"spectrum":[73],"mode":[74,87],"and":[75,93,125],"achieved":[76],"better":[77],"effectiveness":[78,113],"occupied":[81],"bandwidth":[82],"(OBW)":[83],"metric.":[84],"The":[85,112],"mixed":[86],"clock":[88],"managers":[89],"(MMCMs)":[90],"output":[91],"signal":[92],"range":[95],"frequencies":[97],"within":[98],"will":[101],"be":[102],"changed":[103],"randomly,":[104],"resulting":[105],"multiple":[107],"clocks":[108],"individual":[110],"encryption.":[111],"this":[115],"proposal":[116],"is":[117],"demonstrated":[118],"conducting":[120],"realistic":[121],"side-channel":[122],"(SCAs)":[124],"state-of-the-art":[126],"leakage":[127,200,209,224],"assessment":[128,210],"methodologies":[129],"well-known":[132],"data":[133],"encryption":[134],"standard,":[135],"i.e.,":[136],"Advanced":[138],"Encryption":[139],"Standard":[140],"(AES)":[141],"accelerator.":[142],"Even":[143],"though":[144],"we":[145],"used":[146],"up":[147,162],"five":[149,202],"million":[150,203,215],"power":[151,167,216],"traces,":[152],"test":[154,221],"results":[155],"show":[156],"that":[157,180],"defense":[159],"can":[160],"stand":[161],"regular":[165],"correlation":[166],"(CPA)":[169],"attack":[170],"as":[171,173],"well":[172],"alignment":[174],"preprocessing":[175],"methods,":[176],"like":[177],"CPA":[178],"use":[181],"sliding":[183],"window":[184],"or":[185],"an":[186],"amplitude":[187],"peak":[188],"location":[189],"algorithm.":[190],"Furthermore,":[191],"t-test":[193],"methodology":[194],"cannot":[195],"detect":[196,223],"any":[197],"first-order":[198],"information":[199],"traces;":[204],"meanwhile,":[205],"deep":[207],"learning":[208],"(DLLA)":[211],"requires":[212],"nearly":[213],"one":[214],"traces":[217],"training":[220],"points.":[225]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-19T19:40:27.379048","created_date":"2025-10-10T00:00:00"}
