{"id":"https://openalex.org/W2954805925","doi":"https://doi.org/10.13154/tches.v2019.i3.202-232","title":"Static Power SCA of Sub-100 nm CMOS ASICs and the Insecurity of Masking Schemes in Low-Noise Environments","display_name":"Static Power SCA of Sub-100 nm CMOS ASICs and the Insecurity of Masking Schemes in Low-Noise Environments","publication_year":2019,"publication_date":"2019-05-09","ids":{"openalex":"https://openalex.org/W2954805925","doi":"https://doi.org/10.13154/tches.v2019.i3.202-232","mag":"2954805925"},"language":"en","primary_location":{"id":"pmh:oai:doaj.org/article:b32946aad93946ab849feaf33dda432a","is_oa":true,"landing_page_url":"https://doaj.org/article/b32946aad93946ab849feaf33dda432a","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Transactions on Cryptographic Hardware and Embedded Systems, Vol 2019, Iss 3 (2019)","raw_type":"article"},"type":"article","indexed_in":["datacite","doaj"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doaj.org/article/b32946aad93946ab849feaf33dda432a","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014843693","display_name":"Thorben Moos","orcid":"https://orcid.org/0000-0003-3809-9803"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Moos, Thorben","raw_affiliation_strings":["Ruhr University Bochum, Horst G\u00f6rtz Institute for IT Security"],"affiliations":[{"raw_affiliation_string":"Ruhr University Bochum, Horst G\u00f6rtz Institute for IT Security","institution_ids":["https://openalex.org/I904495901"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5014843693"],"corresponding_institution_ids":["https://openalex.org/I904495901"],"apc_list":null,"apc_paid":null,"fwci":1.4446,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.80707018,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cmos","display_name":"CMOS","score":0.6995417475700378},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.6831643581390381},{"id":"https://openalex.org/keywords/application-specific-integrated-circuit","display_name":"Application-specific integrated circuit","score":0.5651993751525879},{"id":"https://openalex.org/keywords/transistor","display_name":"Transistor","score":0.5322515964508057},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5174930095672607},{"id":"https://openalex.org/keywords/electronic-engineering","display_name":"Electronic engineering","score":0.4790176749229431},{"id":"https://openalex.org/keywords/chip","display_name":"Chip","score":0.4699209928512573},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.468097448348999},{"id":"https://openalex.org/keywords/dissipation","display_name":"Dissipation","score":0.46605759859085083},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.4286598563194275},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.3863520920276642},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3352930545806885},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.3046746850013733},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2686823606491089},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.194743812084198},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.17452603578567505},{"id":"https://openalex.org/keywords/voltage","display_name":"Voltage","score":0.11635759472846985}],"concepts":[{"id":"https://openalex.org/C46362747","wikidata":"https://www.wikidata.org/wiki/Q173431","display_name":"CMOS","level":2,"score":0.6995417475700378},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.6831643581390381},{"id":"https://openalex.org/C77390884","wikidata":"https://www.wikidata.org/wiki/Q217302","display_name":"Application-specific integrated circuit","level":2,"score":0.5651993751525879},{"id":"https://openalex.org/C172385210","wikidata":"https://www.wikidata.org/wiki/Q5339","display_name":"Transistor","level":3,"score":0.5322515964508057},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5174930095672607},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.4790176749229431},{"id":"https://openalex.org/C165005293","wikidata":"https://www.wikidata.org/wiki/Q1074500","display_name":"Chip","level":2,"score":0.4699209928512573},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.468097448348999},{"id":"https://openalex.org/C135402231","wikidata":"https://www.wikidata.org/wiki/Q898440","display_name":"Dissipation","level":2,"score":0.46605759859085083},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.4286598563194275},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.3863520920276642},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3352930545806885},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.3046746850013733},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2686823606491089},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.194743812084198},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.17452603578567505},{"id":"https://openalex.org/C165801399","wikidata":"https://www.wikidata.org/wiki/Q25428","display_name":"Voltage","level":2,"score":0.11635759472846985},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:doaj.org/article:b32946aad93946ab849feaf33dda432a","is_oa":true,"landing_page_url":"https://doaj.org/article/b32946aad93946ab849feaf33dda432a","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Transactions on Cryptographic Hardware and Embedded Systems, Vol 2019, Iss 3 (2019)","raw_type":"article"},{"id":"doi:10.13154/tches.v2019.i3.202-232","is_oa":true,"landing_page_url":"https://doi.org/10.13154/tches.v2019.i3.202-232","pdf_url":null,"source":{"id":"https://openalex.org/S7407052971","display_name":"UB Bochum","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"pmh:oai:doaj.org/article:b32946aad93946ab849feaf33dda432a","is_oa":true,"landing_page_url":"https://doaj.org/article/b32946aad93946ab849feaf33dda432a","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Transactions on Cryptographic Hardware and Embedded Systems, Vol 2019, Iss 3 (2019)","raw_type":"article"},"sustainable_development_goals":[{"display_name":"Affordable and clean energy","score":0.6600000262260437,"id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2471505626","https://openalex.org/W1892134458","https://openalex.org/W114126547","https://openalex.org/W1530471618","https://openalex.org/W4283781617","https://openalex.org/W2181802537","https://openalex.org/W2183629464","https://openalex.org/W2170816916","https://openalex.org/W2104179876","https://openalex.org/W2153292994"],"abstract_inverted_index":{"Semiconductor":[0],"technology":[1,82,149,194],"scaling":[2],"faced":[3],"tough":[4],"engineering":[5],"challenges":[6],"while":[7],"moving":[8],"towards":[9],"and":[10,94,125,354],"beyond":[11,191],"the":[12,18,23,27,31,35,69,79,97,102,132,147,151,168,184,199,208,228,232,243,258,261,269,288,305,315,339,343],"deep":[13],"sub-micron":[14],"range.":[15],"One":[16],"of":[17,49,56,71,99,104,131,165,186,202,231,245,260,278,314,338],"most":[19],"demanding":[20],"issues,":[21],"limiting":[22],"shrinkage":[24],"process":[25],"until":[26],"present":[28,78,207],"day,":[29],"is":[30,108,293,318],"difficulty":[32],"to":[33,67,86,198,214,238,248,330,349,356],"control":[34,226],"leakage":[36,266,300,316,340],"currents":[37],"in":[38,54,117,264,322,352],"nanometer-scaled":[39],"field-effect":[40],"transistors.":[41],"Previous":[42],"articles":[43],"have":[44,176],"shown":[45],"that":[46,96,146,212,287,298,332],"this":[47,75,105,111,187,279],"source":[48],"energy":[50],"dissipation,":[51],"at":[52,140],"least":[53],"case":[55],"digital":[57],"CMOS":[58,119],"logic,":[59],"can":[60],"successfully":[61],"be":[62,350],"exploited":[63],"as":[64,235,304],"a":[65,192,216,236,253,276,334],"side-channel":[66,89,219],"recover":[68],"secrets":[70],"cryptographic":[72],"implementations.":[73,274],"In":[74,325],"work,":[76],"we":[77,113,138,206,251,281,327],"first":[80,209],"fair":[81],"comparison":[83],"with":[84,150,309],"respect":[85,197],"static":[87,203,217,249,265],"power":[88,204,218],"measurements":[90,267],"on":[91,101,256],"real":[92],"silicon":[93],"demonstrate":[95],"effect":[98],"down-scaling":[100],"potency":[103],"security":[106,270],"threat":[107,289],"huge.":[109],"To":[110],"end,":[112],"designed":[114],"two":[115],"ASICs":[116],"sub-100nm":[118],"nodes":[120],"(90":[121],"nm,":[122],"65":[123],"nm)":[124,157],"got":[126],"them":[127],"fabricated":[128],"by":[129,272],"one":[130],"leading":[133],"foundries.":[134],"Our":[135],"experiments,":[136],"which":[137],"performed":[139],"different":[141],"operating":[142],"conditions,":[143],"show":[144,331],"consistently":[145],"ASIC":[148],"smaller":[152],"minimum":[153],"feature":[154],"size":[155],"(65":[156],"indeed":[158,294],"exhibits":[159],"substantially":[160],"more":[161],"informative":[162],"leakages":[163],"(factor":[164],"~10)":[166],"than":[167],"90nm":[169],"one,":[170],"even":[171],"though":[172],"all":[173],"targeted":[174],"instances":[175],"been":[177],"derived":[178],"from":[179],"identical":[180],"RTL":[181],"code.":[182],"However,":[183],"contribution":[185],"work":[188,241],"extends":[189],"well":[190],"mere":[193],"comparison.":[195],"With":[196],"real-world":[200],"impact":[201],"attacks,":[205],"realistic":[210],"scenarios":[211],"allow":[213],"perform":[215,252],"analysis":[220,313],"(including":[221],"noise":[222,262],"reduction)":[223],"without":[224],"requiring":[225],"over":[227],"clock":[229],"signal":[230],"target.":[233],"Furthermore,":[234],"follow-up":[237],"some":[239],"proof-of-concept":[240],"indicating":[242],"vulnerability":[244],"masking":[246,291],"schemes":[247,292],"powerattacks,":[250],"detailed":[254],"study":[255],"how":[257],"reduction":[259],"level":[263],"affects":[268],"provided":[271],"masked":[273],"As":[275],"result":[277],"study,":[280],"do":[282],"not":[283,320],"only":[284],"find":[285],"out":[286],"for":[290],"real,":[295],"but":[296],"also":[297],"common":[299],"assessment":[301,353],"techniques,":[302],"such":[303],"Welch\u2019s":[306],"t-test,":[307],"together":[308],"essentially":[310],"any":[311],"moment-based":[312],"traces,":[317],"simply":[319],"sufficient":[321],"low-noise":[323],"contexts.":[324],"fact,":[326],"are":[328],"able":[329],"either":[333],"conversion":[335],"(resp.":[336],"compression)":[337],"order":[341],"or":[342],"recently":[344],"proposed":[345],"X2":[346],"test":[347],"need":[348],"considered":[351],"attack":[355],"avoid":[357],"false":[358],"negatives.":[359]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
