{"id":"https://openalex.org/W4400100943","doi":"https://doi.org/10.1111/exsy.13664","title":"<scp>AES</scp> software and hardware system co\u2010design for resisting side channel attacks","display_name":"<scp>AES</scp> software and hardware system co\u2010design for resisting side channel attacks","publication_year":2024,"publication_date":"2024-06-26","ids":{"openalex":"https://openalex.org/W4400100943","doi":"https://doi.org/10.1111/exsy.13664"},"language":"en","primary_location":{"id":"doi:10.1111/exsy.13664","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1111/exsy.13664","pdf_url":null,"source":{"id":"https://openalex.org/S72232612","display_name":"Expert Systems","issn_l":"0266-4720","issn":["0266-4720","1468-0394"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Expert Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109601251","display_name":"Liguo Dong","orcid":null},"institutions":[{"id":"https://openalex.org/I4210106134","display_name":"Guangzhou Vocational College of Science and Technology","ror":"https://ror.org/01dan7p53","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210106134"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liguo Dong","raw_affiliation_strings":["School of Intelligent Manufacturing Guangzhou Vocational College of Technology &amp; Business  Guangzhou China"],"affiliations":[{"raw_affiliation_string":"School of Intelligent Manufacturing Guangzhou Vocational College of Technology &amp; Business  Guangzhou China","institution_ids":["https://openalex.org/I4210106134"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032534562","display_name":"Xinliang Ye","orcid":"https://orcid.org/0000-0003-0181-7250"},"institutions":[{"id":"https://openalex.org/I4210106134","display_name":"Guangzhou Vocational College of Science and Technology","ror":"https://ror.org/01dan7p53","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210106134"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinliang Ye","raw_affiliation_strings":["School of Intelligent Manufacturing Guangzhou Vocational College of Technology &amp; Business  Guangzhou China"],"affiliations":[{"raw_affiliation_string":"School of Intelligent Manufacturing Guangzhou Vocational College of Technology &amp; Business  Guangzhou China","institution_ids":["https://openalex.org/I4210106134"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100316872","display_name":"Libin Zhuang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210106134","display_name":"Guangzhou Vocational College of Science and Technology","ror":"https://ror.org/01dan7p53","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210106134"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Libin Zhuang","raw_affiliation_strings":["School of Intelligent Manufacturing Guangzhou Vocational College of Technology &amp; Business  Guangzhou China"],"affiliations":[{"raw_affiliation_string":"School of Intelligent Manufacturing Guangzhou Vocational College of Technology &amp; Business  Guangzhou China","institution_ids":["https://openalex.org/I4210106134"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080905648","display_name":"Ruidian Zhan","orcid":"https://orcid.org/0000-0002-1918-3375"},"institutions":[{"id":"https://openalex.org/I139024713","display_name":"Guangdong University of Technology","ror":"https://ror.org/04azbjn80","country_code":"CN","type":"education","lineage":["https://openalex.org/I139024713"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruidian Zhan","raw_affiliation_strings":["School of Integrated Circuits Guangdong University of Technology  Guangzhou China"],"affiliations":[{"raw_affiliation_string":"School of Integrated Circuits Guangdong University of Technology  Guangzhou China","institution_ids":["https://openalex.org/I139024713"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037865550","display_name":"M. Shamim Hossain","orcid":"https://orcid.org/0000-0001-5906-9422"},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"M. Shamim Hossain","raw_affiliation_strings":["Department of Software Engineering College of Computer and Information Sciences, King Saud University  Riyadh Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Software Engineering College of Computer and Information Sciences, King Saud University  Riyadh Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5037865550"],"corresponding_institution_ids":["https://openalex.org/I28022161"],"apc_list":{"value":3860,"currency":"USD","value_usd":3860},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07472725,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"41","issue":"10","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8231289386749268},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.7080428600311279},{"id":"https://openalex.org/keywords/advanced-encryption-standard","display_name":"Advanced Encryption Standard","score":0.6759024858474731},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.6117254495620728},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5713334083557129},{"id":"https://openalex.org/keywords/aes-implementations","display_name":"AES implementations","score":0.54352867603302},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5116177201271057},{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.46560221910476685},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42951512336730957},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.42950159311294556},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.4279326796531677},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.34105828404426575},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14373236894607544}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8231289386749268},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.7080428600311279},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.6759024858474731},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.6117254495620728},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5713334083557129},{"id":"https://openalex.org/C46331935","wikidata":"https://www.wikidata.org/wiki/Q4651362","display_name":"AES implementations","level":4,"score":0.54352867603302},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5116177201271057},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.46560221910476685},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42951512336730957},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.42950159311294556},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.4279326796531677},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.34105828404426575},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14373236894607544}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1111/exsy.13664","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1111/exsy.13664","pdf_url":null,"source":{"id":"https://openalex.org/S72232612","display_name":"Expert Systems","issn_l":"0266-4720","issn":["0266-4720","1468-0394"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Expert Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.47999998927116394,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W1781397158","https://openalex.org/W1994591685","https://openalex.org/W2030629796","https://openalex.org/W2053832511","https://openalex.org/W2110162979","https://openalex.org/W2116406812","https://openalex.org/W2146899660","https://openalex.org/W2389269032","https://openalex.org/W2399542024","https://openalex.org/W2561675875","https://openalex.org/W2596796514","https://openalex.org/W2752720983","https://openalex.org/W2799920367","https://openalex.org/W2911687223","https://openalex.org/W2965443102","https://openalex.org/W2971644775","https://openalex.org/W3087902987","https://openalex.org/W3094282401","https://openalex.org/W3096767560","https://openalex.org/W3185597885","https://openalex.org/W3200092406","https://openalex.org/W3201868317","https://openalex.org/W3204166209","https://openalex.org/W3210963392","https://openalex.org/W3212568677","https://openalex.org/W4210485920","https://openalex.org/W4220799736","https://openalex.org/W4236182951","https://openalex.org/W4281386137","https://openalex.org/W4283208007","https://openalex.org/W4284993273","https://openalex.org/W4312731732","https://openalex.org/W4365421002","https://openalex.org/W4366957253","https://openalex.org/W4379615458","https://openalex.org/W4387490584","https://openalex.org/W4390098422","https://openalex.org/W4390970158","https://openalex.org/W7033451867"],"related_works":["https://openalex.org/W2029006445","https://openalex.org/W2022533428","https://openalex.org/W4255075415","https://openalex.org/W2384300182","https://openalex.org/W2100546736","https://openalex.org/W169923757","https://openalex.org/W2769734684","https://openalex.org/W2059218952","https://openalex.org/W1998454494","https://openalex.org/W4253685677"],"abstract_inverted_index":{"Abstract":[0],"The":[1,65],"threat":[2],"of":[3,13,27,68,117],"side\u2010channel":[4],"attacks":[5],"poses":[6],"a":[7],"significant":[8],"risk":[9],"to":[10,58,93],"the":[11,42,45,49,69,86,101],"security":[12],"cryptographic":[14],"algorithms.":[15],"To":[16],"counter":[17],"this":[18],"threat,":[19],"we":[20],"have":[21],"designed":[22],"an":[23],"AES":[24,46,70],"system":[25,87,102],"capable":[26,116],"defending":[28],"against":[29,111],"such":[30],"attacks,":[31,113],"supporting":[32],"AES\u2010128,":[33],"AES\u2010192,":[34],"and":[35,52,114],"AES\u2010256":[36],"encryption":[37],"standards.":[38],"In":[39],"our":[40],"system,":[41],"CPU":[43],"oversees":[44],"hardware":[47,66],"via":[48],"AHB":[50],"bus":[51],"employs":[53],"true":[54],"random":[55,61],"number":[56],"generation":[57],"provide":[59],"secure":[60],"inputs":[62],"for":[63],"computations.":[64],"implementation":[67],"S\u2010box":[71],"utilizes":[72],"complex":[73],"domain":[74],"inversion":[75],"techniques,":[76],"while":[77],"intermediate":[78],"data":[79],"is":[80,115],"shielded":[81],"using":[82],"full\u2010time":[83],"masking.":[84],"Furthermore,":[85],"incorporates":[88],"double\u2010path":[89],"error":[90],"detection":[91],"mechanisms":[92],"thwart":[94],"fault":[95],"propagation.":[96],"Our":[97],"results":[98],"demonstrate":[99],"that":[100],"effectively":[103],"conceals":[104],"key":[105],"power":[106],"information,":[107],"providing":[108],"robust":[109],"resistance":[110],"CPA":[112],"detecting":[118],"injected":[119],"faults,":[120],"thereby":[121],"mitigating":[122],"fault\u2010based":[123],"attacks.":[124]},"counts_by_year":[],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
