{"id":"https://openalex.org/W4229023058","doi":"https://doi.org/10.1145/3507657.3529652","title":"Post-Quantum Cipher Power Analysis in Lightweight Devices","display_name":"Post-Quantum Cipher Power Analysis in Lightweight Devices","publication_year":2022,"publication_date":"2022-05-07","ids":{"openalex":"https://openalex.org/W4229023058","doi":"https://doi.org/10.1145/3507657.3529652"},"language":"en","primary_location":{"id":"doi:10.1145/3507657.3529652","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3507657.3529652","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016966461","display_name":"Kathryn Hines","orcid":null},"institutions":[{"id":"https://openalex.org/I888729015","display_name":"University of Colorado Colorado Springs","ror":"https://ror.org/054spjc55","country_code":"US","type":"education","lineage":["https://openalex.org/I888729015"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Kathryn Hines","raw_affiliation_strings":["University of Colorado Colorado Springs, Colorado Springs, CO, USA"],"affiliations":[{"raw_affiliation_string":"University of Colorado Colorado Springs, Colorado Springs, CO, USA","institution_ids":["https://openalex.org/I888729015"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017984461","display_name":"Manohar Raavi","orcid":"https://orcid.org/0000-0002-9093-4725"},"institutions":[{"id":"https://openalex.org/I888729015","display_name":"University of Colorado Colorado Springs","ror":"https://ror.org/054spjc55","country_code":"US","type":"education","lineage":["https://openalex.org/I888729015"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Manohar Raavi","raw_affiliation_strings":["University of Colorado Colorado Springs, Colorado Springs, CO, USA"],"affiliations":[{"raw_affiliation_string":"University of Colorado Colorado Springs, Colorado Springs, CO, USA","institution_ids":["https://openalex.org/I888729015"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068274707","display_name":"John-Michael Villeneuve","orcid":null},"institutions":[{"id":"https://openalex.org/I888729015","display_name":"University of Colorado Colorado Springs","ror":"https://ror.org/054spjc55","country_code":"US","type":"education","lineage":["https://openalex.org/I888729015"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"John-Michael Villeneuve","raw_affiliation_strings":["University of Colorado Colorado Springs, Colorado Springs, CO, USA"],"affiliations":[{"raw_affiliation_string":"University of Colorado Colorado Springs, Colorado Springs, CO, USA","institution_ids":["https://openalex.org/I888729015"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080519285","display_name":"Simeon Wuthier","orcid":"https://orcid.org/0000-0003-4088-7518"},"institutions":[{"id":"https://openalex.org/I888729015","display_name":"University of Colorado Colorado Springs","ror":"https://ror.org/054spjc55","country_code":"US","type":"education","lineage":["https://openalex.org/I888729015"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Simeon Wuthier","raw_affiliation_strings":["University of Colorado Colorado Springs, Colorado Springs, CO, USA"],"affiliations":[{"raw_affiliation_string":"University of Colorado Colorado Springs, Colorado Springs, CO, USA","institution_ids":["https://openalex.org/I888729015"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071820952","display_name":"Javier Moreno-Colin","orcid":null},"institutions":[{"id":"https://openalex.org/I4210150356","display_name":"University of Washington Tacoma","ror":"https://ror.org/05n8t2628","country_code":"US","type":"education","lineage":["https://openalex.org/I201448701","https://openalex.org/I4210150356"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Javier Moreno-Colin","raw_affiliation_strings":["University of Washington Tacoma, Tacoma, WA, USA"],"affiliations":[{"raw_affiliation_string":"University of Washington Tacoma, Tacoma, WA, USA","institution_ids":["https://openalex.org/I4210150356"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101795758","display_name":"Yan Bai","orcid":"https://orcid.org/0000-0001-6260-9821"},"institutions":[{"id":"https://openalex.org/I4210150356","display_name":"University of Washington Tacoma","ror":"https://ror.org/05n8t2628","country_code":"US","type":"education","lineage":["https://openalex.org/I201448701","https://openalex.org/I4210150356"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yan Bai","raw_affiliation_strings":["University of Washington Tacoma, Tacoma, WA, USA"],"affiliations":[{"raw_affiliation_string":"University of Washington Tacoma, Tacoma, WA, USA","institution_ids":["https://openalex.org/I4210150356"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025389734","display_name":"Sang\u2010Yoon Chang","orcid":"https://orcid.org/0000-0002-5736-5823"},"institutions":[{"id":"https://openalex.org/I888729015","display_name":"University of Colorado Colorado Springs","ror":"https://ror.org/054spjc55","country_code":"US","type":"education","lineage":["https://openalex.org/I888729015"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sang-Yoon Chang","raw_affiliation_strings":["University of Colorado Colorado Springs, Colorado Springs, CO, USA"],"affiliations":[{"raw_affiliation_string":"University of Colorado Colorado Springs, Colorado Springs, CO, USA","institution_ids":["https://openalex.org/I888729015"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5016966461"],"corresponding_institution_ids":["https://openalex.org/I888729015"],"apc_list":null,"apc_paid":null,"fwci":0.6118,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.66493068,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"282","last_page":"284"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7891592979431152},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.6794134378433228},{"id":"https://openalex.org/keywords/laptop","display_name":"Laptop","score":0.6650811433792114},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.591084897518158},{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.5818514823913574},{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.5434092283248901},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4912561774253845},{"id":"https://openalex.org/keywords/firmware","display_name":"Firmware","score":0.458989679813385},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.41498035192489624},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2636967897415161},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.18505269289016724},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.17532992362976074}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7891592979431152},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.6794134378433228},{"id":"https://openalex.org/C2780008327","wikidata":"https://www.wikidata.org/wiki/Q3962","display_name":"Laptop","level":2,"score":0.6650811433792114},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.591084897518158},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.5818514823913574},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.5434092283248901},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4912561774253845},{"id":"https://openalex.org/C67212190","wikidata":"https://www.wikidata.org/wiki/Q104851","display_name":"Firmware","level":2,"score":0.458989679813385},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.41498035192489624},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2636967897415161},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.18505269289016724},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.17532992362976074},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3507657.3529652","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3507657.3529652","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/8","score":0.41999998688697815,"display_name":"Decent work and economic growth"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1563362697","https://openalex.org/W1999970121","https://openalex.org/W2131089609","https://openalex.org/W2555007564","https://openalex.org/W2560190413","https://openalex.org/W2736085323","https://openalex.org/W2736158790","https://openalex.org/W2912464544","https://openalex.org/W2914255271","https://openalex.org/W3041378054","https://openalex.org/W3091959406","https://openalex.org/W3159054868","https://openalex.org/W3161857862","https://openalex.org/W3172955269","https://openalex.org/W4232836212"],"related_works":["https://openalex.org/W3092130624","https://openalex.org/W3038331837","https://openalex.org/W159410649","https://openalex.org/W222255191","https://openalex.org/W2906526717","https://openalex.org/W3106674947","https://openalex.org/W2390866302","https://openalex.org/W1526471351","https://openalex.org/W2461502237","https://openalex.org/W2369661719"],"abstract_inverted_index":{"Post-quantum":[0],"ciphers":[1,8,91],"(PQC)":[2],"provide":[3],"cryptographic":[4],"algorithms":[5],"for":[6,118,126],"public-key":[7],"which":[9],"are":[10,25],"computationally":[11],"secure":[12],"against":[13],"the":[14,20,33,39,69,73,81,96,113,127],"threats":[15],"from":[16],"quantum-computing":[17],"adversaries.":[18],"Because":[19],"devices":[21,98],"in":[22,27,95,104],"mobile":[23],"computing":[24],"limited":[26],"hardware":[28],"and":[29,63,79,120],"power,":[30],"we":[31],"analyze":[32],"PQC":[34,90],"power":[35,70,111,125],"overheads.":[36],"We":[37,67],"implement":[38],"new":[40],"NIST":[41],"PQCs":[42,82,108],"across":[43],"a":[44,61,64],"range":[45],"of":[46,116],"device":[47],"platforms":[48],"to":[49],"simulate":[50],"varying":[51,101],"resource":[52],"capabilities,":[53],"including":[54],"multiple":[55],"Raspberry":[56,102,128],"Pis":[57,103],"with":[58,72,100],"different":[59],"memories,":[60],"laptop,":[62],"desktop":[65],"computer.":[66],"compare":[68],"measurements":[71],"idle":[74],"cases":[75],"as":[76],"our":[77,105],"baseline":[78],"show":[80,88],"consume":[83,109,123],"considerable":[84],"power.":[85],"Our":[86],"results":[87],"that":[89],"can":[92],"be":[93],"feasible":[94],"resource-constrained":[97],"(simulated":[99],"case);":[106],"while":[107],"greater":[110],"than":[112],"classical":[114],"cipher":[115],"RSA":[117],"laptop":[119],"desktop,":[121],"they":[122],"comparable":[124],"Pis.":[129]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
