{"id":"https://openalex.org/W2398251513","doi":"https://doi.org/10.1145/2897845.2897868","title":"Leakage Fingerprints","display_name":"Leakage Fingerprints","publication_year":2016,"publication_date":"2016-05-27","ids":{"openalex":"https://openalex.org/W2398251513","doi":"https://doi.org/10.1145/2897845.2897868","mag":"2398251513"},"language":"en","primary_location":{"id":"doi:10.1145/2897845.2897868","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2897845.2897868","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081789111","display_name":"Zeyi Liu","orcid":"https://orcid.org/0000-0002-5691-6849"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zeyi Liu","raw_affiliation_strings":["Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072074260","display_name":"Neng Gao","orcid":"https://orcid.org/0000-0002-0870-5692"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Neng Gao","raw_affiliation_strings":["Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086465211","display_name":"Chenyang Tu","orcid":"https://orcid.org/0000-0003-2130-0531"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chenyang Tu","raw_affiliation_strings":["Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101434979","display_name":"Jian Zhou","orcid":"https://orcid.org/0000-0003-1879-4745"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Zhou","raw_affiliation_strings":["Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066513378","display_name":"Yuan Ma","orcid":"https://orcid.org/0000-0002-3828-6054"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan Ma","raw_affiliation_strings":["Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034732187","display_name":"Yuan Zhao","orcid":"https://orcid.org/0000-0002-7573-4936"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan Zhao","raw_affiliation_strings":["Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5081789111"],"corresponding_institution_ids":["https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.02411971,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"807","last_page":"818"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7553149461746216},{"id":"https://openalex.org/keywords/offset","display_name":"Offset (computer science)","score":0.6218087077140808},{"id":"https://openalex.org/keywords/shuffling","display_name":"Shuffling","score":0.6210135817527771},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.6075831055641174},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.5352417230606079},{"id":"https://openalex.org/keywords/masking","display_name":"Masking (illustration)","score":0.46451085805892944},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.46034103631973267},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4450153112411499},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.4215841591358185},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.37568074464797974},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.13473418354988098},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11761781573295593}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7553149461746216},{"id":"https://openalex.org/C175291020","wikidata":"https://www.wikidata.org/wiki/Q1156822","display_name":"Offset (computer science)","level":2,"score":0.6218087077140808},{"id":"https://openalex.org/C167927819","wikidata":"https://www.wikidata.org/wiki/Q1930567","display_name":"Shuffling","level":2,"score":0.6210135817527771},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.6075831055641174},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.5352417230606079},{"id":"https://openalex.org/C2777402240","wikidata":"https://www.wikidata.org/wiki/Q6783436","display_name":"Masking (illustration)","level":2,"score":0.46451085805892944},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.46034103631973267},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4450153112411499},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.4215841591358185},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.37568074464797974},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13473418354988098},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11761781573295593},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2897845.2897868","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2897845.2897868","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W79790421","https://openalex.org/W86628513","https://openalex.org/W97211260","https://openalex.org/W200116028","https://openalex.org/W207867780","https://openalex.org/W1472434837","https://openalex.org/W1494911169","https://openalex.org/W1504927043","https://openalex.org/W1562542037","https://openalex.org/W1595155753","https://openalex.org/W1607006990","https://openalex.org/W1752847028","https://openalex.org/W1883495059","https://openalex.org/W1972718799","https://openalex.org/W2001577466","https://openalex.org/W2140823840","https://openalex.org/W2144630005","https://openalex.org/W2154909745","https://openalex.org/W2161740631","https://openalex.org/W3148004637","https://openalex.org/W4247903245","https://openalex.org/W4285719527","https://openalex.org/W6683624373"],"related_works":["https://openalex.org/W2555092654","https://openalex.org/W4206579032","https://openalex.org/W2809893299","https://openalex.org/W2121017442","https://openalex.org/W2013377987","https://openalex.org/W1537995932","https://openalex.org/W4400375176","https://openalex.org/W3030217762","https://openalex.org/W2734533846","https://openalex.org/W1790664656"],"abstract_inverted_index":{"Low-entropy":[0],"masking":[1,96],"schemes":[2],"and":[3,25,52,78,147,171,173,204],"shuffling":[4],"technique":[5],"are":[6,169,208],"two":[7,150,182],"common":[8],"countermeasures":[9,24],"against":[10],"traditional":[11],"side-channel":[12],"analysis.":[13],"Improved":[14],"Rotating":[15],"S-box":[16],"Masking":[17],"(RSM)":[18],"is":[19,26,110],"a":[20,70,139],"combination":[21],"of":[22,38,81,141,151,181],"both":[23,49,164],"implemented":[27],"by":[28,167],"DPA":[29],"contest":[30],"committee":[31],"to":[32,58,74,83,127,155,192,210],"improve":[33],"the":[34,42,50,60,86,95,99,107,121,129,194,212],"software":[35],"security":[36,56],"level":[37,123],"AES-128.":[39],"Compared":[40],"with":[41,89,176,198],"original":[43],"version,":[44],"improved":[45],"RSM":[46],"mainly":[47],"introduces":[48],"offset":[51,87],"shuffle":[53,108,130],"array":[54,88,109],"as":[55,75,153],"foundations":[57],"counteract":[59],"existing":[61],"attacks.":[62],"In":[63,179],"this":[64],"paper,":[65],"we":[66,103,148],"first":[67,100],"point":[68],"out":[69],"general":[71],"vulnerability":[72],"referred":[73],"\"leakage":[76],"fingerprints\"":[77],"make":[79],"use":[80],"it":[82],"successfully":[84],"crack":[85],"100%":[90],"accuracy,":[91],"which":[92],"breaks":[93],"down":[94],"countermeasure":[97,131],"in":[98,120],"step.":[101],"Then,":[102],"show":[104,162],"that":[105],"cracking":[106],"still":[111],"feasible":[112],"but":[113],"not":[114],"necessary":[115],"since":[116],"several":[117],"other":[118],"vulnerabilities":[119],"implementation":[122],"can":[124,143],"be":[125,144],"exploited":[126],"bypass":[128],"directly.":[132],"By":[133],"selectively":[134],"combining":[135],"all":[136],"these":[137],"vulnerabilities,":[138],"dozen":[140],"attacks":[142,165],"put":[145],"forward,":[146],"perform":[149],"them":[152],"examples":[154],"verify":[156],"their":[157],"effectiveness.":[158],"Official":[159],"evaluation":[160],"results":[161],"that,":[163],"submitted":[166],"us":[168],"practical":[170],"feasible,":[172],"also":[174],"operate":[175],"high":[177],"efficiency.":[178],"terms":[180],"major":[183],"performance":[184],"metrics,":[185],"our":[186],"best":[187],"scheme":[188],"requires":[189],"4":[190],"traces":[191,207],"reveal":[193],"AES":[195],"master":[196],"key":[197],"80%":[199],"Global":[200],"Success":[201],"Rate":[202],"(GSR)":[203],"only":[205],"2":[206],"enough":[209],"reduce":[211],"Maximum":[213],"Partial":[214],"Guessing":[215],"Entropy":[216],"(PGE)":[217],"under":[218],"10.":[219]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
