{"id":"https://openalex.org/W2793619290","doi":"https://doi.org/10.1142/s0218126618501918","title":"NEMR: A Nonequidistant DPA Attack-Proof of Modular Reduction in a CRT Implementation of RSA","display_name":"NEMR: A Nonequidistant DPA Attack-Proof of Modular Reduction in a CRT Implementation of RSA","publication_year":2018,"publication_date":"2018-02-23","ids":{"openalex":"https://openalex.org/W2793619290","doi":"https://doi.org/10.1142/s0218126618501918","mag":"2793619290"},"language":"en","primary_location":{"id":"doi:10.1142/s0218126618501918","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218126618501918","pdf_url":null,"source":{"id":"https://openalex.org/S167602672","display_name":"Journal of Circuits Systems and Computers","issn_l":"0218-1266","issn":["0218-1266","1793-6454"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Circuits, Systems and Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067605099","display_name":"S. Kaedi","orcid":null},"institutions":[{"id":"https://openalex.org/I119025939","display_name":"Shahed University","ror":"https://ror.org/01e8ff003","country_code":"IR","type":"education","lineage":["https://openalex.org/I119025939"]},{"id":"https://openalex.org/I23946033","display_name":"University of Tehran","ror":"https://ror.org/05vf56z40","country_code":"IR","type":"education","lineage":["https://openalex.org/I23946033"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"S. Kaedi","raw_affiliation_strings":["Department of Electrical Engineering, Institute of Science and New Technologies of Shahed University of Tehran, Shahed University of Tehran, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Institute of Science and New Technologies of Shahed University of Tehran, Shahed University of Tehran, Tehran, Iran","institution_ids":["https://openalex.org/I119025939","https://openalex.org/I23946033"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001008600","display_name":"Mohammad Ali Doostari","orcid":null},"institutions":[{"id":"https://openalex.org/I23946033","display_name":"University of Tehran","ror":"https://ror.org/05vf56z40","country_code":"IR","type":"education","lineage":["https://openalex.org/I23946033"]},{"id":"https://openalex.org/I119025939","display_name":"Shahed University","ror":"https://ror.org/01e8ff003","country_code":"IR","type":"education","lineage":["https://openalex.org/I119025939"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"M. Doostari","raw_affiliation_strings":["Department of Computer Engineering, Institute of Science and New Technologies of Shahed University of Tehran, Shahed University of Tehran, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Institute of Science and New Technologies of Shahed University of Tehran, Shahed University of Tehran, Tehran, Iran","institution_ids":["https://openalex.org/I119025939","https://openalex.org/I23946033"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036799779","display_name":"M. B. Ghaznavi\u2010Ghoushchi","orcid":"https://orcid.org/0000-0001-7026-9476"},"institutions":[{"id":"https://openalex.org/I119025939","display_name":"Shahed University","ror":"https://ror.org/01e8ff003","country_code":"IR","type":"education","lineage":["https://openalex.org/I119025939"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"M. B. Ghaznavi-Ghoushchi","raw_affiliation_strings":["Department of Electrical Engineering, School of Engineering, Shahed University, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, School of Engineering, Shahed University, Tehran, Iran","institution_ids":["https://openalex.org/I119025939"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5067605099"],"corresponding_institution_ids":["https://openalex.org/I119025939","https://openalex.org/I23946033"],"apc_list":null,"apc_paid":null,"fwci":0.6515,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.75700056,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"27","issue":"12","first_page":"1850191","last_page":"1850191"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reduction","display_name":"Reduction (mathematics)","score":0.7052367925643921},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.7009569406509399},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5584452748298645},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.547530472278595},{"id":"https://openalex.org/keywords/equidistant","display_name":"Equidistant","score":0.5391692519187927},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.5228155851364136},{"id":"https://openalex.org/keywords/timing-attack","display_name":"Timing attack","score":0.49712589383125305},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.4937027394771576},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3772733509540558},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.35227489471435547},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.31211012601852417},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3113679885864258},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.26344746351242065},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.24848681688308716},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12711814045906067},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07183539867401123}],"concepts":[{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.7052367925643921},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.7009569406509399},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5584452748298645},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.547530472278595},{"id":"https://openalex.org/C158245278","wikidata":"https://www.wikidata.org/wiki/Q4386982","display_name":"Equidistant","level":2,"score":0.5391692519187927},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.5228155851364136},{"id":"https://openalex.org/C28420585","wikidata":"https://www.wikidata.org/wiki/Q2665075","display_name":"Timing attack","level":4,"score":0.49712589383125305},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.4937027394771576},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3772733509540558},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.35227489471435547},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.31211012601852417},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3113679885864258},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.26344746351242065},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.24848681688308716},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12711814045906067},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07183539867401123},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s0218126618501918","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218126618501918","pdf_url":null,"source":{"id":"https://openalex.org/S167602672","display_name":"Journal of Circuits Systems and Computers","issn_l":"0218-1266","issn":["0218-1266","1793-6454"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Circuits, Systems and Computers","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.47999998927116394,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W2053832511","https://openalex.org/W2096607523","https://openalex.org/W2177101910"],"related_works":["https://openalex.org/W2121017442","https://openalex.org/W1790664656","https://openalex.org/W1971956962","https://openalex.org/W4387031668","https://openalex.org/W2188560665","https://openalex.org/W2887442533","https://openalex.org/W4297042454","https://openalex.org/W3028997697","https://openalex.org/W3192308411","https://openalex.org/W3008088605"],"abstract_inverted_index":{"One":[0],"of":[1,79,88,95,113,215],"the":[2,11,21,34,41,52,72,107,141,180,182,188,196,201,213,216],"most":[3],"common":[4],"algorithms":[5],"in":[6,33,40,62,81,144,174],"a":[7,76,101,110,121,130,156],"digital":[8],"signature":[9],"is":[10,60,98,117,163,185,198,207],"RSA-CRT.":[12,175],"Several":[13],"side":[14],"channel":[15],"attacks":[16,26,48],"have":[17],"been":[18],"presented":[19,202],"on":[20,51,55,140,150,159,171,187,192,204],"RSA-CRT\u2019s":[22],"embedded":[23],"design.":[24],"Such":[25],"are":[27,46],"divided":[28],"into":[29],"two":[30],"categories:":[31],"attack":[32,39,70,139,170,184,206],"modular":[35,53,73,142,151],"reduction":[36,54,74,143,172],"step":[37,173],"and":[38,49,103,115,167,195,209],"recombination":[42],"step.":[43],"The":[44],"former":[45],"plaintext":[47,105,123,132,149],"based":[50],"equidistant":[56,93,104,166],"data":[57,97,169],"attack,":[58,106,161],"which":[59,162],"introduced":[61],"[B.":[63],"den":[64],"Boer,":[65],"et":[66],"al.,":[67],"\u201cA":[68],"DPA":[69],"against":[71,165],"within":[75],"CRT":[77],"implementation":[78,191],"RSA,\u201d":[80],"CHES":[82],"2002].":[83],"In":[84,100,125,176],"these":[85],"attacks,":[86],"instead":[87],"using":[89],"random":[90],"plaintext,":[91],"an":[92],"series":[94],"input":[96],"used.":[99],"chosen":[102,134],"attacker":[108],"needs":[109],"higher":[111],"level":[112],"accessibility,":[114],"it":[116],"more":[118],"difficult":[119],"than":[120],"nonchosen":[122],"attack.":[124],"this":[126],"paper,":[127],"we":[128],"present":[129,155],"nonequidistant":[131,168],"(but":[133],"plaintext)":[135],"differential":[136],"power":[137],"analysis":[138],"RSA-CRT,":[145],"named":[146],"NEMR":[147,160,183,205],"(nonequidistant":[148],"reduction).":[152],"We":[153],"also":[154],"new":[157],"countermeasure":[158,203],"resistant":[164],"order":[177],"to":[178],"prove":[179],"idea,":[181],"applied":[186],"RSA-CRT":[189],"2048-bit":[190],"SAKURA-G":[193],"board,":[194],"result":[197],"evaluated.":[199],"Then,":[200],"tested,":[208],"practical":[210],"results":[211],"demonstrate":[212],"validity":[214],"proposed":[217],"approach.":[218]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
