{"id":"https://openalex.org/W2113415050","doi":"https://doi.org/10.1145/1854099.1854126","title":"Improving first order differential power attacks through digital signal processing","display_name":"Improving first order differential power attacks through digital signal processing","publication_year":2010,"publication_date":"2010-09-07","ids":{"openalex":"https://openalex.org/W2113415050","doi":"https://doi.org/10.1145/1854099.1854126","mag":"2113415050"},"language":"en","primary_location":{"id":"doi:10.1145/1854099.1854126","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1854099.1854126","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd international conference on Security of information and networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061596244","display_name":"Alessandro Barenghi","orcid":"https://orcid.org/0000-0003-0840-6358"},"institutions":[{"id":"https://openalex.org/I93860229","display_name":"Politecnico di Milano","ror":"https://ror.org/01nffqt88","country_code":"IT","type":"education","lineage":["https://openalex.org/I93860229"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Alessandro Barenghi","raw_affiliation_strings":["Politecnico di Milano, Milan, Italy","Politecnico di Milano, Milan (Italy)#TAB#"],"affiliations":[{"raw_affiliation_string":"Politecnico di Milano, Milan, Italy","institution_ids":["https://openalex.org/I93860229"]},{"raw_affiliation_string":"Politecnico di Milano, Milan (Italy)#TAB#","institution_ids":["https://openalex.org/I93860229"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059940813","display_name":"Gerardo Pelosi","orcid":"https://orcid.org/0000-0002-3812-5429"},"institutions":[{"id":"https://openalex.org/I11039511","display_name":"University of Bergamo","ror":"https://ror.org/02mbd5571","country_code":"IT","type":"education","lineage":["https://openalex.org/I11039511"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Gerardo Pelosi","raw_affiliation_strings":["Universit\u00e0 di Bergamo, Bergamo, Italy"],"affiliations":[{"raw_affiliation_string":"Universit\u00e0 di Bergamo, Bergamo, Italy","institution_ids":["https://openalex.org/I11039511"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078246888","display_name":"Yannick Teglia","orcid":null},"institutions":[{"id":"https://openalex.org/I4210104693","display_name":"STMicroelectronics (France)","ror":"https://ror.org/01c74sd89","country_code":"FR","type":"company","lineage":["https://openalex.org/I131827901","https://openalex.org/I4210104693"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Yannick Teglia","raw_affiliation_strings":["STMicroelectronics, Rousset, France"],"affiliations":[{"raw_affiliation_string":"STMicroelectronics, Rousset, France","institution_ids":["https://openalex.org/I4210104693"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5061596244"],"corresponding_institution_ids":["https://openalex.org/I93860229"],"apc_list":null,"apc_paid":null,"fwci":6.3146,"has_fulltext":false,"cited_by_count":33,"citation_normalized_percentile":{"value":0.9641567,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"29","issue":null,"first_page":"124","last_page":"133"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8287945985794067},{"id":"https://openalex.org/keywords/digital-signal-processing","display_name":"Digital signal processing","score":0.73228919506073},{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.7271274328231812},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6865715980529785},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.6551856398582458},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.57012939453125},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5638419389724731},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5365114212036133},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.5342285633087158},{"id":"https://openalex.org/keywords/signal-processing","display_name":"Signal processing","score":0.5150096416473389},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.4922696650028229},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.46516847610473633},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.43731045722961426},{"id":"https://openalex.org/keywords/differential","display_name":"Differential (mechanical device)","score":0.41149604320526123},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.3859386444091797},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.3329455256462097},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.32087475061416626},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2966347634792328},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11054745316505432}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8287945985794067},{"id":"https://openalex.org/C84462506","wikidata":"https://www.wikidata.org/wiki/Q173142","display_name":"Digital signal processing","level":2,"score":0.73228919506073},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.7271274328231812},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6865715980529785},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.6551856398582458},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.57012939453125},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5638419389724731},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5365114212036133},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.5342285633087158},{"id":"https://openalex.org/C104267543","wikidata":"https://www.wikidata.org/wiki/Q208163","display_name":"Signal processing","level":3,"score":0.5150096416473389},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.4922696650028229},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.46516847610473633},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.43731045722961426},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.41149604320526123},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3859386444091797},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3329455256462097},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.32087475061416626},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2966347634792328},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11054745316505432},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/1854099.1854126","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1854099.1854126","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd international conference on Security of information and networks","raw_type":"proceedings-article"},{"id":"pmh:oai:re.public.polimi.it:11311/573852","is_oa":false,"landing_page_url":"http://dl.acm.org/citation.cfm?doid=1854099.1854126","pdf_url":null,"source":{"id":"https://openalex.org/S4306400312","display_name":"Virtual Community of Pathological Anatomy (University of Castilla La Mancha)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79189158","host_organization_name":"University of Castilla-La Mancha","host_organization_lineage":["https://openalex.org/I79189158"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8100000023841858,"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321873","display_name":"Ministero dell\u2019Istruzione, dell\u2019Universit\u00e0 e della Ricerca","ror":"https://ror.org/0166hxq48"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W123426918","https://openalex.org/W200116028","https://openalex.org/W1482353292","https://openalex.org/W1491708407","https://openalex.org/W1493602245","https://openalex.org/W1504927043","https://openalex.org/W1510418153","https://openalex.org/W1519539754","https://openalex.org/W1562542037","https://openalex.org/W1583090871","https://openalex.org/W1589284985","https://openalex.org/W1595155753","https://openalex.org/W1613874182","https://openalex.org/W1622403295","https://openalex.org/W1699782153","https://openalex.org/W1724890242","https://openalex.org/W1766888123","https://openalex.org/W1897761346","https://openalex.org/W1982525829","https://openalex.org/W2049380243","https://openalex.org/W2124785100","https://openalex.org/W2126541236","https://openalex.org/W2129356722","https://openalex.org/W2133707980","https://openalex.org/W2138356423","https://openalex.org/W2148435351","https://openalex.org/W2154909745","https://openalex.org/W2163432699","https://openalex.org/W2166725261","https://openalex.org/W2484860292","https://openalex.org/W2491896407","https://openalex.org/W2496045601","https://openalex.org/W2561675875","https://openalex.org/W2914572864","https://openalex.org/W4297573770"],"related_works":["https://openalex.org/W5280335","https://openalex.org/W2989964095","https://openalex.org/W2164725015","https://openalex.org/W2782264121","https://openalex.org/W4323926098","https://openalex.org/W4384807855","https://openalex.org/W182679101","https://openalex.org/W2022533428","https://openalex.org/W2769734684","https://openalex.org/W2184825947"],"abstract_inverted_index":{"Side-channel":[0],"attacks":[1],"pose":[2],"a":[3,16,29,75,112,121,132],"critical":[4],"threat":[5],"to":[6,55,65,87,98,144],"the":[7,21,34,40,43,46,67,70,82,99],"deployment":[8],"of":[9,24,42,69,84,94,117,127],"secure":[10],"embedded":[11],"systems.":[12],"Differential-power":[13],"analysis":[14],"is":[15,49,130],"technique":[17,77],"relying":[18],"on":[19,79,120],"measuring":[20],"power":[22],"consumption":[23],"device":[25],"while":[26],"it":[27,38,107],"computes":[28],"cryptographic":[30,138],"primitive,":[31],"and":[32,105,140],"extracting":[33],"secret":[35],"information":[36],"from":[37],"exploiting":[39],"knowledge":[41],"operations":[44],"involving":[45],"key.":[47],"There":[48],"no":[50],"open":[51],"literature":[52],"describing":[53],"how":[54],"properly":[56],"employ":[57],"Digital":[58],"Signal":[59],"Processing":[60],"(DSP)":[61],"techniques":[62],"in":[63],"order":[64,93],"improve":[66],"effectiveness":[68],"attacks.":[71],"This":[72],"paper":[73,129],"presents":[74],"pre-processing":[76],"based":[78],"DSP,":[80],"reducing":[81],"number":[83],"traces":[85],"needed":[86],"perform":[88],"an":[89,92,141],"attack":[90],"by":[91],"magnitude":[95],"with":[96,102],"respect":[97],"results":[100],"obtained":[101],"raw":[103],"datasets,":[104],"puts":[106],"into":[108],"practical":[109],"use":[110],"attacking":[111],"commercial":[113],"32-bit":[114],"software":[115,136],"implementation":[116],"AES":[118],"running":[119],"Cortex-M3":[122],"CPU.":[123],"The":[124],"main":[125],"contribution":[126],"this":[128],"proposing":[131],"leakage":[133],"model":[134],"for":[135],"implemented":[137],"primitives":[139],"effective":[142],"framework":[143],"extract":[145],"it.":[146]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":8},{"year":2013,"cited_by_count":10},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
