{"id":"https://openalex.org/W2533887160","doi":"https://doi.org/10.1145/2996366.2996371","title":"Practical Results of ECC Side Channel Countermeasures on an ARM Cortex M3 Processor","display_name":"Practical Results of ECC Side Channel Countermeasures on an ARM Cortex M3 Processor","publication_year":2016,"publication_date":"2016-10-24","ids":{"openalex":"https://openalex.org/W2533887160","doi":"https://doi.org/10.1145/2996366.2996371","mag":"2533887160"},"language":"en","primary_location":{"id":"doi:10.1145/2996366.2996371","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2996366.2996371","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM Workshop on Theory of Implementation Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075975896","display_name":"Jacek Samotyja","orcid":null},"institutions":[{"id":"https://openalex.org/I155417937","display_name":"Hochschule Bonn-Rhein-Sieg","ror":"https://ror.org/04m2anh63","country_code":"DE","type":"education","lineage":["https://openalex.org/I155417937"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Jacek Samotyja","raw_affiliation_strings":["Bonn-Rhein-Sieg University of Applied Sciences, Sankt Augustin, Germany"],"affiliations":[{"raw_affiliation_string":"Bonn-Rhein-Sieg University of Applied Sciences, Sankt Augustin, Germany","institution_ids":["https://openalex.org/I155417937"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045842179","display_name":"Kerstin Lemke\u2010Rust","orcid":null},"institutions":[{"id":"https://openalex.org/I155417937","display_name":"Hochschule Bonn-Rhein-Sieg","ror":"https://ror.org/04m2anh63","country_code":"DE","type":"education","lineage":["https://openalex.org/I155417937"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Kerstin Lemke-Rust","raw_affiliation_strings":["Bonn-Rhein-Sieg University of Applied Science, Sankt Augustin, Germany"],"affiliations":[{"raw_affiliation_string":"Bonn-Rhein-Sieg University of Applied Science, Sankt Augustin, Germany","institution_ids":["https://openalex.org/I155417937"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5075975896"],"corresponding_institution_ids":["https://openalex.org/I155417937"],"apc_list":null,"apc_paid":null,"fwci":0.6929,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.80700773,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"27","last_page":"35"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scalar-multiplication","display_name":"Scalar multiplication","score":0.9162240028381348},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.7739019393920898},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.7626357674598694},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5477270483970642},{"id":"https://openalex.org/keywords/scalar","display_name":"Scalar (mathematics)","score":0.5332797169685364},{"id":"https://openalex.org/keywords/arm-architecture","display_name":"ARM architecture","score":0.5145527720451355},{"id":"https://openalex.org/keywords/randomization","display_name":"Randomization","score":0.5048366189002991},{"id":"https://openalex.org/keywords/elliptic-curve","display_name":"Elliptic curve","score":0.49322718381881714},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.48147836327552795},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4248661398887634},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3880807161331177},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3391290009021759},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2884831428527832},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2384149432182312},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18841758370399475},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.17009374499320984},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.1637026071548462},{"id":"https://openalex.org/keywords/randomized-controlled-trial","display_name":"Randomized controlled trial","score":0.15238678455352783},{"id":"https://openalex.org/keywords/geometry","display_name":"Geometry","score":0.0866258442401886},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.08618694543838501},{"id":"https://openalex.org/keywords/pure-mathematics","display_name":"Pure mathematics","score":0.07240891456604004}],"concepts":[{"id":"https://openalex.org/C171182647","wikidata":"https://www.wikidata.org/wiki/Q126736","display_name":"Scalar multiplication","level":3,"score":0.9162240028381348},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.7739019393920898},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.7626357674598694},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5477270483970642},{"id":"https://openalex.org/C57691317","wikidata":"https://www.wikidata.org/wiki/Q1289248","display_name":"Scalar (mathematics)","level":2,"score":0.5332797169685364},{"id":"https://openalex.org/C26771161","wikidata":"https://www.wikidata.org/wiki/Q16980","display_name":"ARM architecture","level":2,"score":0.5145527720451355},{"id":"https://openalex.org/C204243189","wikidata":"https://www.wikidata.org/wiki/Q1363085","display_name":"Randomization","level":3,"score":0.5048366189002991},{"id":"https://openalex.org/C179603306","wikidata":"https://www.wikidata.org/wiki/Q268493","display_name":"Elliptic curve","level":2,"score":0.49322718381881714},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.48147836327552795},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4248661398887634},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3880807161331177},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3391290009021759},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2884831428527832},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2384149432182312},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18841758370399475},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.17009374499320984},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.1637026071548462},{"id":"https://openalex.org/C168563851","wikidata":"https://www.wikidata.org/wiki/Q1436668","display_name":"Randomized controlled trial","level":2,"score":0.15238678455352783},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0866258442401886},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.08618694543838501},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.07240891456604004},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C141071460","wikidata":"https://www.wikidata.org/wiki/Q40821","display_name":"Surgery","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/2996366.2996371","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2996366.2996371","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM Workshop on Theory of Implementation Security","raw_type":"proceedings-article"},{"id":"pmh:oai:pub.h-brs.de:2753","is_oa":false,"landing_page_url":"https://pub.h-brs.de/frontdoor/index/index/docId/2753","pdf_url":null,"source":{"id":"https://openalex.org/S4306400385","display_name":"Publication Server of Bonn-Rhein-Sieg University of Applied Sciences (Bonn-Rhein-Sieg University of Applied Sciences)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I135140700","host_organization_name":"University of Bonn","host_organization_lineage":["https://openalex.org/I135140700"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Bilgin, Nikova et al. (Eds.): Proceedings of the 2016 ACM Workshop on Theory of Implementation Security (TIS'16). Vienna, Austria, October 24-28, 2016","raw_type":"doc-type:conferenceobject"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W154022573","https://openalex.org/W189450844","https://openalex.org/W200116028","https://openalex.org/W1521664783","https://openalex.org/W1531102506","https://openalex.org/W1532398039","https://openalex.org/W1548023999","https://openalex.org/W1565369953","https://openalex.org/W1607006990","https://openalex.org/W1613874182","https://openalex.org/W1752434584","https://openalex.org/W1871651397","https://openalex.org/W1880212920","https://openalex.org/W1910751411","https://openalex.org/W1994429123","https://openalex.org/W2104841597","https://openalex.org/W2134258244","https://openalex.org/W2141469508","https://openalex.org/W2142957041","https://openalex.org/W2148862943","https://openalex.org/W2154909745","https://openalex.org/W2168455152","https://openalex.org/W2404632763","https://openalex.org/W2496045601","https://openalex.org/W6637581742","https://openalex.org/W6639053789","https://openalex.org/W6759495720"],"related_works":["https://openalex.org/W2946358183","https://openalex.org/W2070976279","https://openalex.org/W118355721","https://openalex.org/W2188111145","https://openalex.org/W3203056599","https://openalex.org/W2952185445","https://openalex.org/W2343736460","https://openalex.org/W1993936776","https://openalex.org/W2351744923","https://openalex.org/W2102786134"],"abstract_inverted_index":{"This":[0],"paper":[1],"presents":[2],"implementation":[3,37],"results":[4,94],"of":[5,15,100],"several":[6],"side":[7,67,86],"channel":[8,68,87],"countermeasures":[9,49],"for":[10,40,70],"protecting":[11],"the":[12,41,103],"scalar":[13],"multiplication":[14],"ECC":[16,42],"(Elliptic":[17],"Curve":[18],"Cryptography)":[19],"implemented":[20],"on":[21],"an":[22,97],"ARM":[23],"Cortex":[24],"M3":[25],"processor":[26],"that":[27,96],"is":[28],"used":[29],"in":[30],"security":[31],"sensitive":[32],"wireless":[33],"sensor":[34],"nodes.":[35],"Our":[36],"was":[38],"done":[39],"curves":[43],"P-256,":[44],"brainpool256r1,":[45],"and":[46,62,75],"Ed25519.":[47],"Investigated":[48],"include":[50],"Double-And-Add":[51],"Always,":[52],"Montgomery":[53],"Ladder,":[54],"Scalar":[55,58],"Randomization,":[56,61],"Randomized":[57,63],"Splitting,":[59],"Coordinate":[60],"Sliding":[64],"Window.":[65],"Practical":[66],"tests":[69],"SEMA":[71],"(Simple":[72],"Electromagnetic":[73],"Analysis)":[74],"MESD":[76],"(Multiple":[77],"Exponent,":[78],"Single":[79],"Data)":[80],"are":[81,89],"included.":[82],"Though":[83],"more":[84],"advanced":[85],"attacks":[88,106],"not":[90],"evaluated,":[91],"yet,":[92],"our":[93],"show":[95],"appropriate":[98],"level":[99],"resistance":[101],"against":[102],"most":[104],"relevant":[105],"can":[107],"be":[108],"reached.":[109]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
