{"id":"https://openalex.org/W4285205313","doi":"https://doi.org/10.1587/elex.19.20220212","title":"A side-channel-attack countermeasure for elliptic curve point multiplication based on dynamic power compensation","display_name":"A side-channel-attack countermeasure for elliptic curve point multiplication based on dynamic power compensation","publication_year":2022,"publication_date":"2022-05-29","ids":{"openalex":"https://openalex.org/W4285205313","doi":"https://doi.org/10.1587/elex.19.20220212"},"language":"en","primary_location":{"id":"doi:10.1587/elex.19.20220212","is_oa":true,"landing_page_url":"https://doi.org/10.1587/elex.19.20220212","pdf_url":"https://www.jstage.jst.go.jp/article/elex/advpub/0/advpub_19.20220212/_pdf","source":{"id":"https://openalex.org/S207433681","display_name":"IEICE Electronics Express","issn_l":"1349-2543","issn":["1349-2543","1349-9467"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Electronics Express","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://www.jstage.jst.go.jp/article/elex/advpub/0/advpub_19.20220212/_pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101556571","display_name":"Wei Li","orcid":"https://orcid.org/0000-0002-6597-0142"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wei Li","raw_affiliation_strings":["Information Engineering University"],"affiliations":[{"raw_affiliation_string":"Information Engineering University","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100887813","display_name":"Han Zeng","orcid":"https://orcid.org/0000-0001-8989-6162"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Han Zeng","raw_affiliation_strings":["Information Engineering University"],"affiliations":[{"raw_affiliation_string":"Information Engineering University","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100357748","display_name":"Tao Chen","orcid":"https://orcid.org/0000-0002-3941-1603"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Chen","raw_affiliation_strings":["Information Engineering University"],"affiliations":[{"raw_affiliation_string":"Information Engineering University","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100367530","display_name":"Longmei Nan","orcid":"https://orcid.org/0000-0002-1572-6088"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Longmei Nan","raw_affiliation_strings":["Information Engineering University"],"affiliations":[{"raw_affiliation_string":"Information Engineering University","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019906827","display_name":"Chenguang Yang","orcid":"https://orcid.org/0000-0001-5255-5559"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chenguang Yang","raw_affiliation_strings":["Information Engineering University"],"affiliations":[{"raw_affiliation_string":"Information Engineering University","institution_ids":["https://openalex.org/I169689159"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101556571"],"corresponding_institution_ids":["https://openalex.org/I169689159"],"apc_list":null,"apc_paid":null,"fwci":0.6374,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.73521983,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":"19","issue":"12","first_page":"20220212","last_page":"20220212"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9833999872207642,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9584000110626221,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.7922337055206299},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.7834780216217041},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.7384622693061829},{"id":"https://openalex.org/keywords/multiplication","display_name":"Multiplication (music)","score":0.6139623522758484},{"id":"https://openalex.org/keywords/compensation","display_name":"Compensation (psychology)","score":0.6086926460266113},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.604088544845581},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5315380692481995},{"id":"https://openalex.org/keywords/elliptic-curve-point-multiplication","display_name":"Elliptic curve point multiplication","score":0.5098670721054077},{"id":"https://openalex.org/keywords/elliptic-curve","display_name":"Elliptic curve","score":0.49953389167785645},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4409017860889435},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.4241585433483124},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.41780006885528564},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4071340560913086},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.30032479763031006},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2635394334793091},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.20184734463691711},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.17501503229141235},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.1566377878189087},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.11272597312927246},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.09408387541770935}],"concepts":[{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.7922337055206299},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.7834780216217041},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.7384622693061829},{"id":"https://openalex.org/C2780595030","wikidata":"https://www.wikidata.org/wiki/Q3860309","display_name":"Multiplication (music)","level":2,"score":0.6139623522758484},{"id":"https://openalex.org/C2780023022","wikidata":"https://www.wikidata.org/wiki/Q1338171","display_name":"Compensation (psychology)","level":2,"score":0.6086926460266113},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.604088544845581},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5315380692481995},{"id":"https://openalex.org/C117121985","wikidata":"https://www.wikidata.org/wiki/Q78380999","display_name":"Elliptic curve point multiplication","level":3,"score":0.5098670721054077},{"id":"https://openalex.org/C179603306","wikidata":"https://www.wikidata.org/wiki/Q268493","display_name":"Elliptic curve","level":2,"score":0.49953389167785645},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4409017860889435},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.4241585433483124},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.41780006885528564},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4071340560913086},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.30032479763031006},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2635394334793091},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.20184734463691711},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.17501503229141235},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1566377878189087},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.11272597312927246},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.09408387541770935},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C11171543","wikidata":"https://www.wikidata.org/wiki/Q41630","display_name":"Psychoanalysis","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1587/elex.19.20220212","is_oa":true,"landing_page_url":"https://doi.org/10.1587/elex.19.20220212","pdf_url":"https://www.jstage.jst.go.jp/article/elex/advpub/0/advpub_19.20220212/_pdf","source":{"id":"https://openalex.org/S207433681","display_name":"IEICE Electronics Express","issn_l":"1349-2543","issn":["1349-2543","1349-9467"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Electronics Express","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1587/elex.19.20220212","is_oa":true,"landing_page_url":"https://doi.org/10.1587/elex.19.20220212","pdf_url":"https://www.jstage.jst.go.jp/article/elex/advpub/0/advpub_19.20220212/_pdf","source":{"id":"https://openalex.org/S207433681","display_name":"IEICE Electronics Express","issn_l":"1349-2543","issn":["1349-2543","1349-9467"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Electronics Express","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Affordable and clean energy","score":0.6899999976158142,"id":"https://metadata.un.org/sdg/7"}],"awards":[{"id":"https://openalex.org/G6483749660","display_name":null,"funder_award_id":"61404175","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4285205313.pdf","grobid_xml":"https://content.openalex.org/works/W4285205313.grobid-xml"},"referenced_works_count":24,"referenced_works":["https://openalex.org/W1521664783","https://openalex.org/W1565369953","https://openalex.org/W2004814164","https://openalex.org/W2073835664","https://openalex.org/W2080546540","https://openalex.org/W2096014416","https://openalex.org/W2160037268","https://openalex.org/W2547988034","https://openalex.org/W2592705047","https://openalex.org/W2609894447","https://openalex.org/W2619532043","https://openalex.org/W2620706677","https://openalex.org/W2790926577","https://openalex.org/W2791516576","https://openalex.org/W2794952452","https://openalex.org/W2900771846","https://openalex.org/W2921643410","https://openalex.org/W2943126371","https://openalex.org/W2993973109","https://openalex.org/W3008474499","https://openalex.org/W3046142497","https://openalex.org/W3048109573","https://openalex.org/W3118185480","https://openalex.org/W3126560502"],"related_works":["https://openalex.org/W2102786134","https://openalex.org/W2392460858","https://openalex.org/W3203056599","https://openalex.org/W2132341963","https://openalex.org/W2947864046","https://openalex.org/W2584223401","https://openalex.org/W2031177322","https://openalex.org/W2517682547","https://openalex.org/W4226476440","https://openalex.org/W2890638870"],"abstract_inverted_index":{"Elliptic":[0],"curve":[1,12],"point":[2],"multiplication":[3],"(ECPM)":[4],"is":[5,16],"the":[6,43,62,70],"most":[7],"crucial":[8],"operation":[9],"in":[10],"elliptic":[11],"cryptography":[13],"(ECC)":[14],"and":[15,47,84,89],"vulnerable":[17],"to":[18,72],"side-channel":[19],"attack":[20],"(SCA).":[21],"Based":[22],"on":[23],"power":[24,35,57],"hiding":[25],"technology,":[26],"this":[27,67],"paper":[28],"proposes":[29],"an":[30],"SCA":[31],"countermeasure":[32,68],"for":[33,61],"mutual":[34],"compensation":[36],"of":[37,86],"ECC":[38],"logic":[39],"units,":[40],"which":[41],"eliminates":[42],"difference":[44],"between":[45],"correct":[46],"incorrect":[48],"keys":[49],"by":[50,75],"constructing":[51],"a":[52],"power-mapping":[53],"model.":[54],"The":[55],"correlation":[56],"analysis":[58],"(CPA)":[59],"experiment":[60],"second-highest":[63],"key":[64],"shows":[65],"that":[66],"increases":[69],"measurement":[71],"disclosure":[73],"(MTD)":[74],"more":[76],"than":[77],"1064":[78],"times":[79],"with":[80],"no":[81],"performance":[82],"overhead":[83],"loss":[85],"19.9%":[87],"energy":[88],"6.0%":[90],"LUT,":[91],"2.1%":[92],"FF.":[93]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
