{"id":"https://openalex.org/W2533043266","doi":"https://doi.org/10.1145/2976749.2978353","title":"ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels","display_name":"ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels","publication_year":2016,"publication_date":"2016-10-24","ids":{"openalex":"https://openalex.org/W2533043266","doi":"https://doi.org/10.1145/2976749.2978353","mag":"2533043266"},"language":"en","primary_location":{"id":"doi:10.1145/2976749.2978353","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2976749.2978353","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2978353&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"http://dl.acm.org/ft_gateway.cfm?id=2978353&type=pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029386182","display_name":"Daniel Genkin","orcid":"https://orcid.org/0000-0003-2720-9288"},"institutions":[{"id":"https://openalex.org/I16391192","display_name":"Tel Aviv University","ror":"https://ror.org/04mhzgx49","country_code":"IL","type":"education","lineage":["https://openalex.org/I16391192"]},{"id":"https://openalex.org/I174306211","display_name":"Technion \u2013 Israel Institute of Technology","ror":"https://ror.org/03qryx823","country_code":"IL","type":"education","lineage":["https://openalex.org/I174306211"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"Daniel Genkin","raw_affiliation_strings":["Technion and Tel Aviv University, Haifa and Tel Aviv, Israel"],"affiliations":[{"raw_affiliation_string":"Technion and Tel Aviv University, Haifa and Tel Aviv, Israel","institution_ids":["https://openalex.org/I174306211","https://openalex.org/I16391192"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062093302","display_name":"Lev Pachmanov","orcid":null},"institutions":[{"id":"https://openalex.org/I16391192","display_name":"Tel Aviv University","ror":"https://ror.org/04mhzgx49","country_code":"IL","type":"education","lineage":["https://openalex.org/I16391192"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Lev Pachmanov","raw_affiliation_strings":["Tel Aviv University, Tel Aviv, Israel"],"affiliations":[{"raw_affiliation_string":"Tel Aviv University, Tel Aviv, Israel","institution_ids":["https://openalex.org/I16391192"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068824455","display_name":"Itamar Pipman","orcid":null},"institutions":[{"id":"https://openalex.org/I16391192","display_name":"Tel Aviv University","ror":"https://ror.org/04mhzgx49","country_code":"IL","type":"education","lineage":["https://openalex.org/I16391192"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Itamar Pipman","raw_affiliation_strings":["Tel Aviv University, Tel Aviv, Israel"],"affiliations":[{"raw_affiliation_string":"Tel Aviv University, Tel Aviv, Israel","institution_ids":["https://openalex.org/I16391192"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049555551","display_name":"Eran Tromer","orcid":"https://orcid.org/0000-0002-8884-9564"},"institutions":[{"id":"https://openalex.org/I16391192","display_name":"Tel Aviv University","ror":"https://ror.org/04mhzgx49","country_code":"IL","type":"education","lineage":["https://openalex.org/I16391192"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Eran Tromer","raw_affiliation_strings":["Tel Aviv University, Tel Aviv, Israel"],"affiliations":[{"raw_affiliation_string":"Tel Aviv University, Tel Aviv, Israel","institution_ids":["https://openalex.org/I16391192"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056484605","display_name":"Yuval Yarom","orcid":"https://orcid.org/0000-0003-0401-4197"},"institutions":[{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I5681781","display_name":"University of Adelaide","ror":"https://ror.org/00892tw58","country_code":"AU","type":"education","lineage":["https://openalex.org/I5681781"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yuval Yarom","raw_affiliation_strings":["The University of Adelaide and Data61, CSIRO, Adelaide, Australia"],"affiliations":[{"raw_affiliation_string":"The University of Adelaide and Data61, CSIRO, Adelaide, Australia","institution_ids":["https://openalex.org/I5681781","https://openalex.org/I42894916"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5029386182"],"corresponding_institution_ids":["https://openalex.org/I16391192","https://openalex.org/I174306211"],"apc_list":null,"apc_paid":null,"fwci":33.5706,"has_fulltext":true,"cited_by_count":177,"citation_normalized_percentile":{"value":0.99682609,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1626","last_page":"1638"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/elliptic-curve-digital-signature-algorithm","display_name":"Elliptic Curve Digital Signature Algorithm","score":0.672946572303772},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6688056588172913},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.645053505897522},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.60552978515625},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.5917199850082397},{"id":"https://openalex.org/keywords/usb","display_name":"USB","score":0.5601826310157776},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5536389350891113},{"id":"https://openalex.org/keywords/subscriber-identity-module","display_name":"Subscriber identity module","score":0.5004043579101562},{"id":"https://openalex.org/keywords/mobile-phone","display_name":"Mobile phone","score":0.45939892530441284},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.44174331426620483},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4395015835762024},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4366436302661896},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3971855640411377},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3245415985584259},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.24828526377677917},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2322831153869629},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.22401896119117737},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.20698261260986328},{"id":"https://openalex.org/keywords/handset","display_name":"Handset","score":0.17719265818595886},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.15768581628799438}],"concepts":[{"id":"https://openalex.org/C197966572","wikidata":"https://www.wikidata.org/wiki/Q915079","display_name":"Elliptic Curve Digital Signature Algorithm","level":5,"score":0.672946572303772},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6688056588172913},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.645053505897522},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.60552978515625},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.5917199850082397},{"id":"https://openalex.org/C507366226","wikidata":"https://www.wikidata.org/wiki/Q42378","display_name":"USB","level":3,"score":0.5601826310157776},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5536389350891113},{"id":"https://openalex.org/C40367706","wikidata":"https://www.wikidata.org/wiki/Q230110","display_name":"Subscriber identity module","level":3,"score":0.5004043579101562},{"id":"https://openalex.org/C2777421447","wikidata":"https://www.wikidata.org/wiki/Q17517","display_name":"Mobile phone","level":2,"score":0.45939892530441284},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.44174331426620483},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4395015835762024},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4366436302661896},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3971855640411377},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3245415985584259},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.24828526377677917},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2322831153869629},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.22401896119117737},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.20698261260986328},{"id":"https://openalex.org/C2779971919","wikidata":"https://www.wikidata.org/wiki/Q1378949","display_name":"Handset","level":2,"score":0.17719265818595886},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15768581628799438},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/2976749.2978353","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2976749.2978353","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2978353&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:digital.library.adelaide.edu.au:2440/108081","is_oa":true,"landing_page_url":"http://hdl.handle.net/2440/108081","pdf_url":null,"source":{"id":"https://openalex.org/S4306401835","display_name":"Adelaide Research & Scholarship (AR&S) (University of Adelaide)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I5681781","host_organization_name":"The University of Adelaide","host_organization_lineage":["https://openalex.org/I5681781"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://dx.doi.org/10.1145/2976749.2978353","raw_type":"Conference paper"}],"best_oa_location":{"id":"doi:10.1145/2976749.2978353","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2976749.2978353","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2978353&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3874180305","display_name":"RCN: DIMACS/Simons Collaboration in Cryptography","funder_award_id":"1523467","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4921111377","display_name":null,"funder_award_id":"CNS-1523467","funder_id":"https://openalex.org/F4320306164","funder_display_name":"Simons Foundation"},{"id":"https://openalex.org/G5067427111","display_name":null,"funder_award_id":"#CNS-1523467","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G5260942991","display_name":null,"funder_award_id":"CNS-1523467","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7426209435","display_name":null,"funder_award_id":"Faculty Research Award (Tromer)","funder_id":"https://openalex.org/F4320309327","funder_display_name":"Google"},{"id":"https://openalex.org/G8297139829","display_name":null,"funder_award_id":"Advanced Communication Technology Project","funder_id":"https://openalex.org/F4320309446","funder_display_name":"Leona M. and Harry B. Helmsley Charitable Trust"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320306164","display_name":"Simons Foundation","ror":"https://ror.org/01cmst727"},{"id":"https://openalex.org/F4320309327","display_name":"Google","ror":"https://ror.org/00njsd438"},{"id":"https://openalex.org/F4320309446","display_name":"Leona M. and Harry B. Helmsley Charitable Trust","ror":"https://ror.org/011x6n313"},{"id":"https://openalex.org/F4320309938","display_name":"Centre of Excellence for Environmental Decisions, Australian Research Council","ror":"https://ror.org/01k8nkc73"},{"id":"https://openalex.org/F4320334164","display_name":"Simons Institute for the Theory of Computing, University of California Berkeley","ror":null},{"id":"https://openalex.org/F4320335016","display_name":"Israeli Centers for Research Excellence","ror":"https://ror.org/03w2v9593"},{"id":"https://openalex.org/F4320337179","display_name":"Check Point Institute for Information Security, Tel Aviv University","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2533043266.pdf","grobid_xml":"https://content.openalex.org/works/W2533043266.grobid-xml"},"referenced_works_count":52,"referenced_works":["https://openalex.org/W20301286","https://openalex.org/W50107694","https://openalex.org/W60689211","https://openalex.org/W154790888","https://openalex.org/W200116028","https://openalex.org/W1416455035","https://openalex.org/W1485287820","https://openalex.org/W1488058190","https://openalex.org/W1505452726","https://openalex.org/W1507823573","https://openalex.org/W1511843316","https://openalex.org/W1519539754","https://openalex.org/W1540529576","https://openalex.org/W1545197359","https://openalex.org/W1554359822","https://openalex.org/W1559498407","https://openalex.org/W1563281071","https://openalex.org/W1565369953","https://openalex.org/W1565378600","https://openalex.org/W1580599221","https://openalex.org/W1607006990","https://openalex.org/W1712428406","https://openalex.org/W1724890242","https://openalex.org/W1824405704","https://openalex.org/W1994429123","https://openalex.org/W2025849355","https://openalex.org/W2053832511","https://openalex.org/W2080698191","https://openalex.org/W2107691219","https://openalex.org/W2136635506","https://openalex.org/W2144717556","https://openalex.org/W2155244510","https://openalex.org/W2159520802","https://openalex.org/W2173153107","https://openalex.org/W2183171747","https://openalex.org/W2208250432","https://openalex.org/W2210258279","https://openalex.org/W2234494597","https://openalex.org/W2241013464","https://openalex.org/W2261914718","https://openalex.org/W2292672296","https://openalex.org/W2294868896","https://openalex.org/W2295683697","https://openalex.org/W2330270191","https://openalex.org/W2404401031","https://openalex.org/W2405148462","https://openalex.org/W2559892799","https://openalex.org/W3120992516","https://openalex.org/W4206595402","https://openalex.org/W4230265636","https://openalex.org/W4297709905","https://openalex.org/W6631075134"],"related_works":["https://openalex.org/W3201596224","https://openalex.org/W1565266559","https://openalex.org/W2806614844","https://openalex.org/W1990743860","https://openalex.org/W3191743943","https://openalex.org/W2332531239","https://openalex.org/W3213981908","https://openalex.org/W2260005205","https://openalex.org/W3013846567","https://openalex.org/W2393578887"],"abstract_inverted_index":{"We":[0,17],"show":[1],"that":[2],"elliptic-curve":[3],"cryptography":[4],"implementations":[5],"on":[6,31,41,65],"mobile":[7],"devices":[8],"are":[9],"vulnerable":[10],"to":[11,58],"electromagnetic":[12],"and":[13,28,34,43,80,89],"power":[14,63],"side-channel":[15],"attacks.":[16],"demonstrate":[18],"full":[19],"extraction":[20],"of":[21,74],"ECDSA":[22],"secret":[23],"signing":[24],"keys":[25],"from":[26,38,44],"OpenSSL":[27,39],"CoreBitcoin":[29],"running":[30,40],"iOS":[32],"devices,":[33],"partial":[35],"key":[36],"leakage":[37],"Android":[42],"iOS's":[45],"CommonCrypto.":[46],"These":[47],"non-intrusive":[48],"attacks":[49],"use":[50,71],"a":[51,62,72,76],"simple":[52],"magnetic":[53,92],"probe":[54,64],"placed":[55],"in":[56],"proximity":[57],"the":[59,66],"device,":[60],"or":[61],"phone's":[67],"USB":[68],"cable.":[69],"They":[70],"bandwidth":[73],"merely":[75],"few":[77],"hundred":[78],"kHz,":[79],"can":[81],"be":[82],"performed":[83],"cheaply":[84],"using":[85],"an":[86,90],"audio":[87],"card":[88],"improvised":[91],"probe.":[93]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":15},{"year":2024,"cited_by_count":13},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":17},{"year":2021,"cited_by_count":23},{"year":2020,"cited_by_count":21},{"year":2019,"cited_by_count":26},{"year":2018,"cited_by_count":23},{"year":2017,"cited_by_count":19},{"year":2016,"cited_by_count":8}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
