{"id":"https://openalex.org/W3200650290","doi":"https://doi.org/10.3390/cryptography5030024","title":"Improved Filtering Techniques for Single- and Multi-Trace Side-Channel Analysis","display_name":"Improved Filtering Techniques for Single- and Multi-Trace Side-Channel Analysis","publication_year":2021,"publication_date":"2021-09-13","ids":{"openalex":"https://openalex.org/W3200650290","doi":"https://doi.org/10.3390/cryptography5030024","mag":"3200650290"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography5030024","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography5030024","pdf_url":"https://www.mdpi.com/2410-387X/5/3/24/pdf?version=1631609586","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/5/3/24/pdf?version=1631609586","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010059848","display_name":"Dor Salomon","orcid":"https://orcid.org/0000-0002-2009-9453"},"institutions":[{"id":"https://openalex.org/I13955877","display_name":"Bar-Ilan University","ror":"https://ror.org/03kgsv495","country_code":"IL","type":"education","lineage":["https://openalex.org/I13955877"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"Dor Salomon","raw_affiliation_strings":["Faculty of Engineering, Bar-Ilan University (BIU), Ramat-Gan 5290002, Israel"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, Bar-Ilan University (BIU), Ramat-Gan 5290002, Israel","institution_ids":["https://openalex.org/I13955877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081331925","display_name":"Amir Weiss","orcid":"https://orcid.org/0000-0002-3104-6939"},"institutions":[{"id":"https://openalex.org/I63966007","display_name":"Massachusetts Institute of Technology","ror":"https://ror.org/042nb2s44","country_code":"US","type":"education","lineage":["https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Amir Weiss","raw_affiliation_strings":["Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology (MIT), 77 Massachusetts Avenue, Cambridge, MA 02139, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology (MIT), 77 Massachusetts Avenue, Cambridge, MA 02139, USA","institution_ids":["https://openalex.org/I63966007"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032341525","display_name":"Itamar Levi","orcid":"https://orcid.org/0000-0002-5591-5799"},"institutions":[{"id":"https://openalex.org/I13955877","display_name":"Bar-Ilan University","ror":"https://ror.org/03kgsv495","country_code":"IL","type":"education","lineage":["https://openalex.org/I13955877"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Itamar Levi","raw_affiliation_strings":["Faculty of Engineering, Bar-Ilan University (BIU), Ramat-Gan 5290002, Israel"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, Bar-Ilan University (BIU), Ramat-Gan 5290002, Israel","institution_ids":["https://openalex.org/I13955877"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5010059848"],"corresponding_institution_ids":["https://openalex.org/I13955877"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.5599,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.73610436,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"5","issue":"3","first_page":"24","last_page":"24"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9714999794960022,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9714999794960022,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12300","display_name":"Advanced Electrical Measurement Techniques","score":0.9520000219345093,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9369999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7772780656814575},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5448427796363831},{"id":"https://openalex.org/keywords/trace","display_name":"TRACE (psycholinguistics)","score":0.5362460017204285},{"id":"https://openalex.org/keywords/filter","display_name":"Filter (signal processing)","score":0.4869876801967621},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.4434869587421417},{"id":"https://openalex.org/keywords/noise-reduction","display_name":"Noise reduction","score":0.4431939423084259},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.44097700715065},{"id":"https://openalex.org/keywords/thresholding","display_name":"Thresholding","score":0.4375545382499695},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3919283449649811},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.377501904964447},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3234953284263611},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2652822434902191},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.10451379418373108}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7772780656814575},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5448427796363831},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.5362460017204285},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.4869876801967621},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.4434869587421417},{"id":"https://openalex.org/C163294075","wikidata":"https://www.wikidata.org/wiki/Q581861","display_name":"Noise reduction","level":2,"score":0.4431939423084259},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.44097700715065},{"id":"https://openalex.org/C191178318","wikidata":"https://www.wikidata.org/wiki/Q2256906","display_name":"Thresholding","level":3,"score":0.4375545382499695},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3919283449649811},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.377501904964447},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3234953284263611},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2652822434902191},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.10451379418373108},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.3390/cryptography5030024","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography5030024","pdf_url":"https://www.mdpi.com/2410-387X/5/3/24/pdf?version=1631609586","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:49c15f4d5bce43a3bdb20b66250325a3","is_oa":true,"landing_page_url":"https://doaj.org/article/49c15f4d5bce43a3bdb20b66250325a3","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 5, Iss 3, p 24 (2021)","raw_type":"article"},{"id":"pmh:oai:dspace.mit.edu:1721.1/133176","is_oa":true,"landing_page_url":"https://hdl.handle.net/1721.1/133176","pdf_url":null,"source":{"id":"https://openalex.org/S4306400425","display_name":"DSpace@MIT (Massachusetts Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I63966007","host_organization_name":"Massachusetts Institute of Technology","host_organization_lineage":["https://openalex.org/I63966007"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Multidisciplinary Digital Publishing Institute","raw_type":"http://purl.org/eprint/type/JournalArticle"},{"id":"pmh:oai:dspace.mit.edu:1721.1/133176.2","is_oa":true,"landing_page_url":"https://hdl.handle.net/1721.1/133176.2","pdf_url":null,"source":{"id":"https://openalex.org/S4306400425","display_name":"DSpace@MIT (Massachusetts Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I63966007","host_organization_name":"Massachusetts Institute of Technology","host_organization_lineage":["https://openalex.org/I63966007"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Multidisciplinary Digital Publishing Institute","raw_type":"http://purl.org/eprint/type/JournalArticle"}],"best_oa_location":{"id":"doi:10.3390/cryptography5030024","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography5030024","pdf_url":"https://www.mdpi.com/2410-387X/5/3/24/pdf?version=1631609586","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3200650290.pdf","grobid_xml":"https://content.openalex.org/works/W3200650290.grobid-xml"},"referenced_works_count":44,"referenced_works":["https://openalex.org/W108606907","https://openalex.org/W304661806","https://openalex.org/W1580550895","https://openalex.org/W1752847028","https://openalex.org/W1862426464","https://openalex.org/W1986741241","https://openalex.org/W2008071701","https://openalex.org/W2019198141","https://openalex.org/W2025727209","https://openalex.org/W2047342556","https://openalex.org/W2052084315","https://openalex.org/W2058186508","https://openalex.org/W2165343841","https://openalex.org/W2241013464","https://openalex.org/W2269870567","https://openalex.org/W2479727864","https://openalex.org/W2610964475","https://openalex.org/W2634225494","https://openalex.org/W2734509410","https://openalex.org/W2794898833","https://openalex.org/W2796409115","https://openalex.org/W2798781612","https://openalex.org/W2891841929","https://openalex.org/W2892198639","https://openalex.org/W2892344663","https://openalex.org/W2911479569","https://openalex.org/W2917383172","https://openalex.org/W2921643410","https://openalex.org/W2963780177","https://openalex.org/W2967228420","https://openalex.org/W2972518368","https://openalex.org/W3006414909","https://openalex.org/W3037774646","https://openalex.org/W3085353452","https://openalex.org/W3090401323","https://openalex.org/W3093938463","https://openalex.org/W3119326853","https://openalex.org/W3127626522","https://openalex.org/W4232129301","https://openalex.org/W4296980820","https://openalex.org/W6604430918","https://openalex.org/W6759495720","https://openalex.org/W6830986754","https://openalex.org/W7035815908"],"related_works":["https://openalex.org/W4379141644","https://openalex.org/W2000183774","https://openalex.org/W2781572853","https://openalex.org/W2001178067","https://openalex.org/W1941911145","https://openalex.org/W2997859314","https://openalex.org/W4301731622","https://openalex.org/W2951213624","https://openalex.org/W2184272971","https://openalex.org/W2116308011"],"abstract_inverted_index":{"Side-channel":[0],"analysis":[1],"(SCA)":[2],"attacks":[3,96,99],"constantly":[4],"improve":[5,43,116],"and":[6,44,47,50,77,97,109,141,163,204,245,254],"evolve.":[7],"Implementations":[8],"are":[9,100,106],"therefore":[10],"designed":[11],"to":[12,42,52,184,199,249],"withstand":[13],"strong":[14],"SCA":[15,62,88],"adversaries.":[16],"Different":[17],"side":[18],"channels":[19],"exhibit":[20,231],"varying":[21,250],"statistical":[22,255],"characteristics":[23],"of":[24,35,107,159,170,237],"the":[25,33,54,86,112,135,144,156,160,171,176],"sensed":[26],"or":[27],"exfiltrated":[28],"leakage,":[29],"as":[30,32],"well":[31],"embedding":[34],"different":[36],"countermeasures.":[37,208],"This":[38],"makes":[39],"it":[40],"crucial":[41],"adapt":[45],"pre-processing":[46],"denoising":[48],"techniques,":[49],"abilities":[51],"evaluate":[53],"adversarial":[55],"best-case":[56],"scenario.":[57],"We":[58],"address":[59],"two":[60],"popular":[61],"scenarios:":[63],"(1)":[64],"a":[65,79,149,164,179,186,192,211,223,235],"single-trace":[66,113],"context,":[67,114,178],"modeling":[68],"an":[69],"adversary":[70],"that":[71,84,91,132,221],"captures":[72],"only":[73],"one":[74],"leakage":[75,256],"trace,":[76],"(2)":[78],"multi-trace":[80,177],"(or":[81],"statistical)":[82],"scenario,":[83],"models":[85],"classical":[87],"context.":[89],"Given":[90],"horizontal":[92],"attacks,":[93],"localized":[94],"electromagnetic":[95],"remote-SCA":[98],"becoming":[101],"evermore":[102],"powerful,":[103],"both":[104],"scenarios":[105],"interest":[108],"importance.":[110],"In":[111,175,209],"we":[115,147],"on":[117,191],"existing":[118],"Singular":[119],"Spectral":[120],"Analysis":[121],"(SSA)":[122],"based":[123,190],"techniques":[124],"by":[125],"utilizing":[126],"spectral":[127],"property":[128],"variations":[129],"over":[130,143,234],"time":[131],"stem":[133],"from":[134],"cryptographic":[136],"implementation.":[137],"By":[138],"adapting":[139],"overlapped-SSA":[140],"optimizing":[142],"method":[145],"parameters,":[146],"achieve":[148],"significantly":[150],"shorter":[151],"computation":[152],"time,":[153],"which":[154,196],"is":[155,182,197,219],"main":[157],"challenge":[158],"SSA-based":[161],"technique,":[162],"higher":[165],"information":[166],"gain":[167],"(in":[168],"terms":[169],"Signal-to-Noise":[172],"Ratio":[173],"(SNR)).":[174],"profiling":[180],"strategy":[181],"proposed":[183],"optimize":[185],"Band-Pass":[187],"Filter":[188],"(BPF)":[189],"low-computational":[193],"cost":[194],"criterion,":[195],"shown":[198],"be":[200],"efficient":[201],"for":[202],"unprotected":[203],"low":[205],"protection":[206],"level":[207],"addition,":[210],"slightly":[212],"more":[213],"computationally":[214],"intensive":[215],"optimized":[216],"\u2018shaped\u2019":[217],"filter":[218],"presented":[220],"utilizes":[222],"frequency-domain":[224],"SNR-based":[225],"coefficient":[226],"thresholding.":[227],"Our":[228],"experimental":[229],"results":[230],"significant":[232],"improvements":[233],"set":[236],"various":[238],"implementations":[239],"embedded":[240],"with":[241],"countermeasures":[242],"in":[243],"hardware":[244],"software":[246],"platforms,":[247],"corresponding":[248],"baseline":[251],"SNR":[252],"levels":[253],"characteristics.":[257]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2021-09-27T00:00:00"}
