{"id":"https://openalex.org/W2341538571","doi":"https://doi.org/10.1145/2767132","title":"A Fault-Based Secret Key Retrieval Method for ECDSA","display_name":"A Fault-Based Secret Key Retrieval Method for ECDSA","publication_year":2016,"publication_date":"2016-04-20","ids":{"openalex":"https://openalex.org/W2341538571","doi":"https://doi.org/10.1145/2767132","mag":"2341538571"},"language":"en","primary_location":{"id":"doi:10.1145/2767132","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2767132","pdf_url":null,"source":{"id":"https://openalex.org/S96198239","display_name":"ACM Journal on Emerging Technologies in Computing Systems","issn_l":"1550-4832","issn":["1550-4832","1550-4840"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Journal on Emerging Technologies in Computing Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://hdl.handle.net/11311/943786","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061596244","display_name":"Alessandro Barenghi","orcid":"https://orcid.org/0000-0003-0840-6358"},"institutions":[{"id":"https://openalex.org/I93860229","display_name":"Politecnico di Milano","ror":"https://ror.org/01nffqt88","country_code":"IT","type":"education","lineage":["https://openalex.org/I93860229"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Alessandro Barenghi","raw_affiliation_strings":["Politecnico di Milano, Milano, Italy"],"affiliations":[{"raw_affiliation_string":"Politecnico di Milano, Milano, Italy","institution_ids":["https://openalex.org/I93860229"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021688317","display_name":"Guido Bertoni","orcid":"https://orcid.org/0000-0002-5122-1589"},"institutions":[{"id":"https://openalex.org/I4210154781","display_name":"STMicroelectronics (Italy)","ror":"https://ror.org/053bqv655","country_code":"IT","type":"company","lineage":["https://openalex.org/I131827901","https://openalex.org/I4210154781"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Guido M. Bertoni","raw_affiliation_strings":["STMicroelectronics, Agrate Brianza, Italy"],"affiliations":[{"raw_affiliation_string":"STMicroelectronics, Agrate Brianza, Italy","institution_ids":["https://openalex.org/I4210154781"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006809009","display_name":"Luca Breveglieri","orcid":"https://orcid.org/0000-0001-5294-6840"},"institutions":[{"id":"https://openalex.org/I93860229","display_name":"Politecnico di Milano","ror":"https://ror.org/01nffqt88","country_code":"IT","type":"education","lineage":["https://openalex.org/I93860229"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Luca Breveglieri","raw_affiliation_strings":["Politecnico di Milano, Milano, Italy"],"affiliations":[{"raw_affiliation_string":"Politecnico di Milano, Milano, Italy","institution_ids":["https://openalex.org/I93860229"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059940813","display_name":"Gerardo Pelosi","orcid":"https://orcid.org/0000-0002-3812-5429"},"institutions":[{"id":"https://openalex.org/I93860229","display_name":"Politecnico di Milano","ror":"https://ror.org/01nffqt88","country_code":"IT","type":"education","lineage":["https://openalex.org/I93860229"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Gerardo Pelosi","raw_affiliation_strings":["Politecnico di Milano, Milano, Italy"],"affiliations":[{"raw_affiliation_string":"Politecnico di Milano, Milano, Italy","institution_ids":["https://openalex.org/I93860229"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074834047","display_name":"Stefano Sanfilippo","orcid":null},"institutions":[{"id":"https://openalex.org/I93860229","display_name":"Politecnico di Milano","ror":"https://ror.org/01nffqt88","country_code":"IT","type":"education","lineage":["https://openalex.org/I93860229"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Stefano Sanfilippo","raw_affiliation_strings":["Politecnico di Milano, Milano, Italy"],"affiliations":[{"raw_affiliation_string":"Politecnico di Milano, Milano, Italy","institution_ids":["https://openalex.org/I93860229"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081958048","display_name":"Ruggero Susella","orcid":"https://orcid.org/0000-0002-5700-2811"},"institutions":[{"id":"https://openalex.org/I4210154781","display_name":"STMicroelectronics (Italy)","ror":"https://ror.org/053bqv655","country_code":"IT","type":"company","lineage":["https://openalex.org/I131827901","https://openalex.org/I4210154781"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Ruggero Susella","raw_affiliation_strings":["STMicroelectronics, Agrate Brianza, Italy"],"affiliations":[{"raw_affiliation_string":"STMicroelectronics, Agrate Brianza, Italy","institution_ids":["https://openalex.org/I4210154781"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5061596244"],"corresponding_institution_ids":["https://openalex.org/I93860229"],"apc_list":null,"apc_paid":null,"fwci":3.3174,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.92943824,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"13","issue":"1","first_page":"1","last_page":"26"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9896000027656555,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/elliptic-curve-digital-signature-algorithm","display_name":"Elliptic Curve Digital Signature Algorithm","score":0.8477667570114136},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7011792659759521},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.6932825446128845},{"id":"https://openalex.org/keywords/modular-exponentiation","display_name":"Modular exponentiation","score":0.5701581239700317},{"id":"https://openalex.org/keywords/curve25519","display_name":"Curve25519","score":0.5679618716239929},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.5678282380104065},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5468161106109619},{"id":"https://openalex.org/keywords/modular-arithmetic","display_name":"Modular arithmetic","score":0.527850866317749},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5040918588638306},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.503555953502655},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4705641269683838},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.4563998281955719},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.42481252551078796},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.38412198424339294},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.35700732469558716},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.30555444955825806},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1809343695640564},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.18017905950546265}],"concepts":[{"id":"https://openalex.org/C197966572","wikidata":"https://www.wikidata.org/wiki/Q915079","display_name":"Elliptic Curve Digital Signature Algorithm","level":5,"score":0.8477667570114136},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7011792659759521},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.6932825446128845},{"id":"https://openalex.org/C152763109","wikidata":"https://www.wikidata.org/wiki/Q1228841","display_name":"Modular exponentiation","level":4,"score":0.5701581239700317},{"id":"https://openalex.org/C198690329","wikidata":"https://www.wikidata.org/wiki/Q15702839","display_name":"Curve25519","level":5,"score":0.5679618716239929},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.5678282380104065},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5468161106109619},{"id":"https://openalex.org/C32049820","wikidata":"https://www.wikidata.org/wiki/Q319400","display_name":"Modular arithmetic","level":3,"score":0.527850866317749},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5040918588638306},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.503555953502655},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4705641269683838},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.4563998281955719},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.42481252551078796},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.38412198424339294},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.35700732469558716},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.30555444955825806},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1809343695640564},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.18017905950546265},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/2767132","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2767132","pdf_url":null,"source":{"id":"https://openalex.org/S96198239","display_name":"ACM Journal on Emerging Technologies in Computing Systems","issn_l":"1550-4832","issn":["1550-4832","1550-4840"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Journal on Emerging Technologies in Computing Systems","raw_type":"journal-article"},{"id":"pmh:oai:re.public.polimi.it:11311/943786","is_oa":true,"landing_page_url":"http://hdl.handle.net/11311/943786","pdf_url":null,"source":{"id":"https://openalex.org/S4306400312","display_name":"Virtual Community of Pathological Anatomy (University of Castilla La Mancha)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79189158","host_organization_name":"University of Castilla-La Mancha","host_organization_lineage":["https://openalex.org/I79189158"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"pmh:oai:re.public.polimi.it:11311/943786","is_oa":true,"landing_page_url":"http://hdl.handle.net/11311/943786","pdf_url":null,"source":{"id":"https://openalex.org/S4306400312","display_name":"Virtual Community of Pathological Anatomy (University of Castilla La Mancha)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79189158","host_organization_name":"University of Castilla-La Mancha","host_organization_lineage":["https://openalex.org/I79189158"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W12343306","https://openalex.org/W60689211","https://openalex.org/W154022573","https://openalex.org/W258537497","https://openalex.org/W1483479305","https://openalex.org/W1501265301","https://openalex.org/W1508193711","https://openalex.org/W1535489610","https://openalex.org/W1580599221","https://openalex.org/W1587217691","https://openalex.org/W1613874182","https://openalex.org/W1935672779","https://openalex.org/W1971605365","https://openalex.org/W1981455414","https://openalex.org/W1981663184","https://openalex.org/W1992021280","https://openalex.org/W1994604599","https://openalex.org/W2000325148","https://openalex.org/W2004814164","https://openalex.org/W2006881377","https://openalex.org/W2008272678","https://openalex.org/W2017274704","https://openalex.org/W2031989101","https://openalex.org/W2038233446","https://openalex.org/W2046569422","https://openalex.org/W2052435632","https://openalex.org/W2053832511","https://openalex.org/W2057209427","https://openalex.org/W2058903136","https://openalex.org/W2076597612","https://openalex.org/W2096133993","https://openalex.org/W2111310412","https://openalex.org/W2115915130","https://openalex.org/W2116055158","https://openalex.org/W2120608395","https://openalex.org/W2122982257","https://openalex.org/W2125815652","https://openalex.org/W2140985639","https://openalex.org/W2144952508","https://openalex.org/W2145964906","https://openalex.org/W2183171747","https://openalex.org/W2613956024","https://openalex.org/W3157578321","https://openalex.org/W3175367423","https://openalex.org/W4206595402","https://openalex.org/W4233278418","https://openalex.org/W4301002906"],"related_works":["https://openalex.org/W3182915524","https://openalex.org/W2285294304","https://openalex.org/W1995898468","https://openalex.org/W2393695657","https://openalex.org/W889033279","https://openalex.org/W32238348","https://openalex.org/W2067075572","https://openalex.org/W2044536813","https://openalex.org/W2147776414","https://openalex.org/W2126703276"],"abstract_inverted_index":{"Elliptic":[0,66],"curve":[1,100],"cryptosystems":[2],"proved":[3],"to":[4,38,56,106,126,135],"be":[5],"well":[6],"suited":[7],"for":[8],"securing":[9],"systems":[10],"with":[11],"constrained":[12],"resources":[13],"like":[14],"embedded":[15],"and":[16,33,92,131],"portable":[17],"devices.":[18],"In":[19],"a":[20,30,52,113,132],"fault-based":[21],"attack,":[22,120],"errors":[23],"are":[24,36],"induced":[25,77],"during":[26],"the":[27,34,42,48,58,65,74,80,83,89,97,116,119,128],"computation":[28],"of":[29,64,82,115,118],"cryptographic":[31],"primitive,":[32],"results":[35],"collected":[37],"derive":[39],"information":[40,75],"about":[41],"secret":[43,59],"key":[44,60],"safely":[45],"stored":[46],"in":[47,62,88],"device.":[49],"We":[50,110],"introduce":[51],"novel":[53],"attack":[54,72],"methodology":[55],"recover":[57],"employed":[61],"implementations":[63],"Curve":[67],"Digital":[68],"Signature":[69],"Algorithm.":[70],"Our":[71],"exploits":[73],"leakage":[76],"when":[78],"altering":[79],"execution":[81],"modular":[84],"arithmetic":[85],"operations":[86],"used":[87],"signature":[90],"primitive":[91],"does":[93],"not":[94],"rely":[95],"on":[96],"underlying":[98],"elliptic":[99],"mathematical":[101],"structure,":[102],"thus":[103],"being":[104],"applicable":[105],"all":[107],"standardized":[108],"curves.":[109],"provide":[111],"both":[112],"validation":[114],"feasibility":[117],"even":[121],"employing":[122],"common":[123],"off-the-shelf":[124],"hardware":[125],"perform":[127],"required":[129],"computations,":[130],"low-cost":[133],"countermeasure":[134],"counteract":[136],"it.":[137]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
