{"id":"https://openalex.org/W3095125346","doi":"https://doi.org/10.1145/3411504.3421219","title":"Lightweight Implementation of the LowMC Block Cipher Protected Against Side-Channel Attacks","display_name":"Lightweight Implementation of the LowMC Block Cipher Protected Against Side-Channel Attacks","publication_year":2020,"publication_date":"2020-11-05","ids":{"openalex":"https://openalex.org/W3095125346","doi":"https://doi.org/10.1145/3411504.3421219","mag":"3095125346"},"language":"en","primary_location":{"id":"doi:10.1145/3411504.3421219","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3411504.3421219","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3411504.3421219","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3411504.3421219","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065580841","display_name":"Javad Bahrami","orcid":null},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Javad Bahrami","raw_affiliation_strings":["George Mason University, Fairfax, VA, USA"],"affiliations":[{"raw_affiliation_string":"George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060452384","display_name":"Viet B. Dang","orcid":"https://orcid.org/0000-0002-6666-6337"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Viet B. Dang","raw_affiliation_strings":["George Mason University, Fairfax, VA, USA"],"affiliations":[{"raw_affiliation_string":"George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056522593","display_name":"Abubakr Abdulgadir","orcid":"https://orcid.org/0009-0005-8032-6012"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Abubakr Abdulgadir","raw_affiliation_strings":["George Mason University, Fairfax, VA, USA"],"affiliations":[{"raw_affiliation_string":"George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037831461","display_name":"Khaled N. Khasawneh","orcid":"https://orcid.org/0000-0002-2116-2223"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Khaled N. Khasawneh","raw_affiliation_strings":["George Mason University, Fairfax, VA, USA"],"affiliations":[{"raw_affiliation_string":"George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039598410","display_name":"Jens-Peter Kaps","orcid":"https://orcid.org/0000-0002-7036-6433"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jens-Peter Kaps","raw_affiliation_strings":["George Mason University, Fairfax, VA, USA"],"affiliations":[{"raw_affiliation_string":"George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004924763","display_name":"Kris Gaj","orcid":"https://orcid.org/0000-0002-5050-8748"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kris Gaj","raw_affiliation_strings":["George Mason University, Fairfax, VA, USA"],"affiliations":[{"raw_affiliation_string":"George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5065580841"],"corresponding_institution_ids":["https://openalex.org/I162714631"],"apc_list":null,"apc_paid":null,"fwci":0.4078,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.70545787,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"45","last_page":"56"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8133672475814819},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.64603590965271},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.6254897117614746},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.5935770869255066},{"id":"https://openalex.org/keywords/vhdl","display_name":"VHDL","score":0.592430830001831},{"id":"https://openalex.org/keywords/test-vector","display_name":"Test vector","score":0.48516231775283813},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.4704279899597168},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.4265599846839905},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.42202746868133545},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.42062121629714966},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.38664811849594116},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.36047959327697754},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2517617344856262},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14220687747001648}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8133672475814819},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.64603590965271},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.6254897117614746},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.5935770869255066},{"id":"https://openalex.org/C36941000","wikidata":"https://www.wikidata.org/wiki/Q209455","display_name":"VHDL","level":3,"score":0.592430830001831},{"id":"https://openalex.org/C100767440","wikidata":"https://www.wikidata.org/wiki/Q7705816","display_name":"Test vector","level":3,"score":0.48516231775283813},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.4704279899597168},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.4265599846839905},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.42202746868133545},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.42062121629714966},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.38664811849594116},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.36047959327697754},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2517617344856262},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14220687747001648},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C169903167","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Test set","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3411504.3421219","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3411504.3421219","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3411504.3421219","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3411504.3421219","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3411504.3421219","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3411504.3421219","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4674847732","display_name":null,"funder_award_id":"70NANB18H218","funder_id":"https://openalex.org/F4320306111","funder_display_name":"U.S. Department of Commerce"},{"id":"https://openalex.org/G6322524227","display_name":"SaTC: CORE: Medium: Collaborative: Countermeasures Against Side-Channels Attacks Targeting Hardware and Embedded System Implementations of Post-Quantum Cryptographic Algorithms","funder_award_id":"1801512","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7902259400","display_name":null,"funder_award_id":"70NANB18H218","funder_id":"https://openalex.org/F4320332178","funder_display_name":"National Institute of Standards and Technology"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G998027694","display_name":null,"funder_award_id":"CNS-1801512","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320306111","display_name":"U.S. Department of Commerce","ror":"https://ror.org/04chq2495"},{"id":"https://openalex.org/F4320332178","display_name":"National Institute of Standards and Technology","ror":"https://ror.org/05xpvk416"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3095125346.pdf","grobid_xml":"https://content.openalex.org/works/W3095125346.grobid-xml"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W200116028","https://openalex.org/W632399495","https://openalex.org/W930621015","https://openalex.org/W1511360501","https://openalex.org/W1541098965","https://openalex.org/W1551131816","https://openalex.org/W1575446397","https://openalex.org/W1607006990","https://openalex.org/W1611243483","https://openalex.org/W1873852107","https://openalex.org/W2087928947","https://openalex.org/W2128197017","https://openalex.org/W2164584813","https://openalex.org/W2770809732","https://openalex.org/W2807866490","https://openalex.org/W2893822137","https://openalex.org/W2969210993","https://openalex.org/W2992782544","https://openalex.org/W3005762238","https://openalex.org/W4231098049","https://openalex.org/W4231374564"],"related_works":["https://openalex.org/W141793162","https://openalex.org/W2376652919","https://openalex.org/W2676406993","https://openalex.org/W2158296297","https://openalex.org/W2247006822","https://openalex.org/W2038076063","https://openalex.org/W2072085101","https://openalex.org/W2949420945","https://openalex.org/W2130364905","https://openalex.org/W3180573957"],"abstract_inverted_index":{"LowMC":[0,51,75],"is":[1,140,159],"a":[2,91,242],"parameterizable":[3],"block":[4,217],"cipher":[5],"developed":[6],"for":[7,100,133,142,182,199,206],"use":[8,166],"in":[9,27,167,234],"Multi-Party":[10],"Computation":[11],"(MPC)":[12],"and":[13,53,76,99,124,150,180,185,203],"Fully":[14],"Homomorphic":[15],"Encryption":[16],"(FHE).":[17],"In":[18,43],"these":[19],"applications,":[20],"linear":[21],"operations":[22,36],"are":[23,57,178],"much":[24],"less":[25],"expensive":[26],"terms":[28,235],"of":[29,50,65,74,152,176,218,236,239,244,253],"resource":[30],"utilization":[31],"compared":[32],"to":[33,38,163,213],"the":[34,63,70,77,86,101,103,113,131,143,153,174,183,186,200,207,219,226,237,251],"nonlinear":[35],"due":[37,162],"their":[39],"low":[40],"multiplicative":[41],"complexity.":[42],"this":[44,247],"work,":[45],"we":[46,68,89],"implemented":[47],"two":[48],"versions":[49],"-unrolled":[52],"lightweight.":[54],"Both":[55],"implementations":[56,117],"realized":[58],"using":[59],"RTL":[60],"VHDL.":[61],"To":[62],"best":[64,227],"our":[66,172],"knowledge,":[67],"report":[69],"first":[71,78],"lightweight":[72,184,201],"implementation":[73,79,229],"protected":[80],"against":[81],"side-channel":[82],"analysis":[83],"(SCA).":[84],"For":[85],"SCA":[87],"protection,":[88,126],"used":[90,141],"hybrid":[92],"2/3":[93],"shares":[94],"Threshold":[95],"Implementation":[96],"(TI)":[97],"approach,":[98],"evaluation,":[102],"Test":[104],"Vector":[105],"Leakage":[106],"Assessment":[107],"(TVLA)":[108],"method,":[109],"also":[110],"known":[111],"as":[112],"T-test.":[114],"Our":[115],"unprotected":[116],"show":[118],"information":[119],"leakage":[120],"at":[121,250],"10K":[122],"traces,":[123],"after":[125],"they":[127],"could":[128],"successfully":[129],"pass":[130],"T-test":[132],"1":[134],"million":[135],"traces.":[136],"The":[137,155,221],"Xilinx":[138],"Vivado":[139],"synthesis,":[144],"implementation,":[145],"functional":[146],"verification,":[147],"timing":[148],"analysis,":[149],"programming":[151],"FPGA.":[154],"target":[156],"FPGA":[157],"family":[158],"Artix-7,":[160],"selected":[161],"its":[164],"widespread":[165],"multiple":[168],"applications.":[169],"Based":[170],"on":[171],"results,":[173],"numbers":[175],"LUTs":[177,240],"867":[179],"3,328":[181],"unrolled":[187,208,223],"architecture":[188,202,224],"with":[189,210],"unrolling":[190],"factor":[191,243],"=":[192,211],"16,":[193],"respectively.":[194],"It":[195],"takes":[196],"14.21":[197],"s":[198,205],"1.29":[204],"design":[209],"16":[212],"generate":[214],"one":[215],"128-bit":[216],"ciphertext.":[220],"fully":[222],"beats":[225],"previous":[228],"by":[230,241],"Kales":[231],"et":[232],"al.":[233],"number":[238],"4.5.":[245],"However,":[246],"advantage":[248],"comes":[249],"cost":[252],"having":[254],"2.9":[255],"higher":[256],"latency.":[257]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
