{"id":"https://openalex.org/W2968183237","doi":"https://doi.org/10.1145/3341729","title":"Side-channel Timing Attack of RSA on a GPU","display_name":"Side-channel Timing Attack of RSA on a GPU","publication_year":2019,"publication_date":"2019-08-13","ids":{"openalex":"https://openalex.org/W2968183237","doi":"https://doi.org/10.1145/3341729","mag":"2968183237"},"language":"en","primary_location":{"id":"doi:10.1145/3341729","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3341729","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3341729","source":{"id":"https://openalex.org/S26056741","display_name":"ACM Transactions on Architecture and Code Optimization","issn_l":"1544-3566","issn":["1544-3566","1544-3973"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Architecture and Code Optimization","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3341729","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001310695","display_name":"Chao Luo","orcid":"https://orcid.org/0000-0002-9647-3675"},"institutions":[{"id":"https://openalex.org/I887054487","display_name":"MathWorks (United States)","ror":"https://ror.org/01n8qtk87","country_code":"US","type":"company","lineage":["https://openalex.org/I887054487"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Chao Luo","raw_affiliation_strings":["MathWorks, Natick, MA, USA"],"raw_orcid":"https://orcid.org/0000-0002-9647-3675","affiliations":[{"raw_affiliation_string":"MathWorks, Natick, MA, USA","institution_ids":["https://openalex.org/I887054487"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083131515","display_name":"Yunsi Fei","orcid":"https://orcid.org/0000-0002-9930-0868"},"institutions":[{"id":"https://openalex.org/I12912129","display_name":"Northeastern University","ror":"https://ror.org/04t5xt781","country_code":"US","type":"education","lineage":["https://openalex.org/I12912129"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yunsi Fei","raw_affiliation_strings":["Northeastern University, Boston, MA, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Northeastern University, Boston, MA, USA","institution_ids":["https://openalex.org/I12912129"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061128237","display_name":"David Kaeli","orcid":"https://orcid.org/0000-0002-5692-0151"},"institutions":[{"id":"https://openalex.org/I12912129","display_name":"Northeastern University","ror":"https://ror.org/04t5xt781","country_code":"US","type":"education","lineage":["https://openalex.org/I12912129"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"David Kaeli","raw_affiliation_strings":["Northeastern University, Boston, MA, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Northeastern University, Boston, MA, USA","institution_ids":["https://openalex.org/I12912129"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5001310695"],"corresponding_institution_ids":["https://openalex.org/I887054487"],"apc_list":null,"apc_paid":null,"fwci":2.1674,"has_fulltext":true,"cited_by_count":33,"citation_normalized_percentile":{"value":0.90723301,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"16","issue":"3","first_page":"1","last_page":"18"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8900845050811768},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.6561336517333984},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.6440143585205078},{"id":"https://openalex.org/keywords/timing-attack","display_name":"Timing attack","score":0.5235592722892761},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.49402672052383423},{"id":"https://openalex.org/keywords/modular-exponentiation","display_name":"Modular exponentiation","score":0.4584382176399231},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.4576602876186371},{"id":"https://openalex.org/keywords/coprocessor","display_name":"Coprocessor","score":0.45578330755233765},{"id":"https://openalex.org/keywords/cuda","display_name":"CUDA","score":0.4530760943889618},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4143451750278473},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.3694506287574768},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13832691311836243},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.13106295466423035}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8900845050811768},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.6561336517333984},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.6440143585205078},{"id":"https://openalex.org/C28420585","wikidata":"https://www.wikidata.org/wiki/Q2665075","display_name":"Timing attack","level":4,"score":0.5235592722892761},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.49402672052383423},{"id":"https://openalex.org/C152763109","wikidata":"https://www.wikidata.org/wiki/Q1228841","display_name":"Modular exponentiation","level":4,"score":0.4584382176399231},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.4576602876186371},{"id":"https://openalex.org/C86111242","wikidata":"https://www.wikidata.org/wiki/Q859595","display_name":"Coprocessor","level":2,"score":0.45578330755233765},{"id":"https://openalex.org/C2778119891","wikidata":"https://www.wikidata.org/wiki/Q477690","display_name":"CUDA","level":2,"score":0.4530760943889618},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4143451750278473},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3694506287574768},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13832691311836243},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.13106295466423035}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3341729","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3341729","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3341729","source":{"id":"https://openalex.org/S26056741","display_name":"ACM Transactions on Architecture and Code Optimization","issn_l":"1544-3566","issn":["1544-3566","1544-3973"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Architecture and Code Optimization","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1145/3341729","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3341729","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3341729","source":{"id":"https://openalex.org/S26056741","display_name":"ACM Transactions on Architecture and Code Optimization","issn_l":"1544-3566","issn":["1544-3566","1544-3973"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Architecture and Code Optimization","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6399999856948853}],"awards":[{"id":"https://openalex.org/G2828735283","display_name":null,"funder_award_id":"STARSS-1618379","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G2900193479","display_name":null,"funder_award_id":"#2687","funder_id":"https://openalex.org/F4320306087","funder_display_name":"Semiconductor Research Corporation"},{"id":"https://openalex.org/G3006316490","display_name":null,"funder_award_id":"STARSS-1618379 and TWC-1563697","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4923221889","display_name":"TWC: Medium: Automating Countermeasures and Security Evaluation Against Software Side-channel Attacks","funder_award_id":"1563697","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320306087","display_name":"Semiconductor Research Corporation","ror":"https://ror.org/047z4n946"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2968183237.pdf","grobid_xml":"https://content.openalex.org/works/W2968183237.grobid-xml"},"referenced_works_count":23,"referenced_works":["https://openalex.org/W50107694","https://openalex.org/W161094530","https://openalex.org/W186989516","https://openalex.org/W900968380","https://openalex.org/W1488058190","https://openalex.org/W1972622169","https://openalex.org/W2004814164","https://openalex.org/W2045682094","https://openalex.org/W2054541204","https://openalex.org/W2066194581","https://openalex.org/W2101040389","https://openalex.org/W2131132330","https://openalex.org/W2138849660","https://openalex.org/W2185989936","https://openalex.org/W2323777873","https://openalex.org/W2398262958","https://openalex.org/W2616160421","https://openalex.org/W2766210752","https://openalex.org/W2794653104","https://openalex.org/W2891810898","https://openalex.org/W2900225834","https://openalex.org/W3161081806","https://openalex.org/W4232836212"],"related_works":["https://openalex.org/W2038457918","https://openalex.org/W2979411227","https://openalex.org/W2739877186","https://openalex.org/W1971956962","https://openalex.org/W2533755316","https://openalex.org/W2117623867","https://openalex.org/W3028621755","https://openalex.org/W142891728","https://openalex.org/W2611202804","https://openalex.org/W1584979203"],"abstract_inverted_index":{"To":[0],"increase":[1],"computation":[2],"throughput,":[3],"general":[4],"purpose":[5],"Graphics":[6],"Processing":[7],"Units":[8],"(GPUs)":[9],"have":[10,19],"been":[11,20,47,60],"leveraged":[12],"to":[13,71,85,89,149,174,238,246],"accelerate":[14],"computationally":[15],"intensive":[16],"workloads.":[17],"GPUs":[18,50,68,83],"used":[21,42],"as":[22],"cryptographic":[23,176],"engines,":[24],"improving":[25],"encryption/decryption":[26],"throughput":[27],"and":[28,45,53,75,171,225],"leveraging":[29],"the":[30,63,112,130,134,151,182,213],"GPU\u2019s":[31],"Single":[32],"Instruction":[33],"Multiple":[34],"Thread":[35],"(SIMT)":[36],"model.":[37],"RSA":[38,66,104,156,207,235],"is":[39,69,76,236],"a":[40,96,118,123,146,161,210],"widely":[41],"public-key":[43,157],"cipher":[44,158],"has":[46,59],"ported":[48],"onto":[49],"for":[51],"signing":[52],"decrypting":[54],"large":[55,97],"files.":[56],"Although":[57],"performance":[58],"significantly":[61],"improved,":[62],"security":[64],"of":[65,99,114,126,136,154,184,216,234,251],"on":[67,106,117,160,197,206,209],"vulnerable":[70,237],"side-channel":[72,90,239],"timing":[73,131,147,179,199,204,240],"attacks":[74,205],"an":[77,155,221],"exposure":[78],"overlooked":[79],"in":[80,109,192],"previous":[81],"studies.":[82],"tend":[84],"be":[86,122],"naturally":[87],"resilient":[88],"attacks,":[91],"given":[92,133],"that":[93,166,188,231],"they":[94],"execute":[95],"number":[98],"concurrent":[100,137],"threads,":[101],"performing":[102],"many":[103],"operations":[105],"different":[107],"data":[108],"parallel.":[110],"Given":[111],"degree":[113],"parallel":[115,152,185],"execution":[116],"GPU,":[119,211],"there":[120],"will":[121],"significant":[124],"amount":[125],"noise":[127],"introduced":[128],"into":[129],"channel":[132],"thousands":[135],"threads":[138],"executing":[139],"concurrently.":[140],"In":[141],"this":[142,249],"work,":[143],"we":[144,201],"build":[145],"model":[148,180],"capture":[150],"characteristics":[153],"implemented":[159],"GPU.":[162],"We":[163,218,242],"consider":[164],"optimizations":[165],"include":[167],"using":[168],"Montgomery":[169],"multiplication":[170],"sliding-window":[172],"exponentiation":[173],"implement":[175],"operations.":[177],"Our":[178,228],"considers":[181],"challenges":[183],"execution,":[186],"complications":[187],"do":[189],"not":[190],"occur":[191],"single-threaded":[193],"computing":[194],"platforms.":[195],"Based":[196],"our":[198],"model,":[200],"launch":[202],"successful":[203],"running":[208],"extracting":[212],"private":[214],"key":[215],"RSA.":[217],"also":[219],"present":[220],"effective":[222],"error":[223],"detection":[224],"correction":[226],"mechanism.":[227],"results":[229],"demonstrate":[230],"GPU":[232],"acceleration":[233],"attacks.":[241,252],"propose":[243],"several":[244],"countermeasures":[245],"defend":[247],"against":[248],"class":[250]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
