{"id":"https://openalex.org/W2054699539","doi":"https://doi.org/10.4304/jcp.5.12.1878-1884","title":"Retrieving Lost Efficiency of Scalar Multiplications for Resisting against Side-Channel Attacks","display_name":"Retrieving Lost Efficiency of Scalar Multiplications for Resisting against Side-Channel Attacks","publication_year":2010,"publication_date":"2010-12-01","ids":{"openalex":"https://openalex.org/W2054699539","doi":"https://doi.org/10.4304/jcp.5.12.1878-1884","mag":"2054699539"},"language":"en","primary_location":{"id":"doi:10.4304/jcp.5.12.1878-1884","is_oa":false,"landing_page_url":"https://doi.org/10.4304/jcp.5.12.1878-1884","pdf_url":null,"source":{"id":"https://openalex.org/S77894049","display_name":"Journal of Computers","issn_l":"1796-203X","issn":["1796-203X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068296887","display_name":"Keke Wu","orcid":"https://orcid.org/0000-0002-4117-1370"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Keke Wu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100614997","display_name":"Huiyun Li","orcid":"https://orcid.org/0000-0003-0157-1393"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Huiyun Li","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5028095399","display_name":"Fengqi Yu","orcid":"https://orcid.org/0000-0003-3710-6856"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fengqi Yu","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5068296887"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1483103,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"5","issue":"12","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.9387403130531311},{"id":"https://openalex.org/keywords/scalar-multiplication","display_name":"Scalar multiplication","score":0.5970635414123535},{"id":"https://openalex.org/keywords/scalar","display_name":"Scalar (mathematics)","score":0.5869552493095398},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5313746333122253},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.44657179713249207},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.4124513566493988},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3812958598136902},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3532525897026062},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2194555699825287},{"id":"https://openalex.org/keywords/geometry","display_name":"Geometry","score":0.1111903190612793},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.08783707022666931}],"concepts":[{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.9387403130531311},{"id":"https://openalex.org/C171182647","wikidata":"https://www.wikidata.org/wiki/Q126736","display_name":"Scalar multiplication","level":3,"score":0.5970635414123535},{"id":"https://openalex.org/C57691317","wikidata":"https://www.wikidata.org/wiki/Q1289248","display_name":"Scalar (mathematics)","level":2,"score":0.5869552493095398},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5313746333122253},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.44657179713249207},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.4124513566493988},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3812958598136902},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3532525897026062},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2194555699825287},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.1111903190612793},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.08783707022666931}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.4304/jcp.5.12.1878-1884","is_oa":false,"landing_page_url":"https://doi.org/10.4304/jcp.5.12.1878-1884","pdf_url":null,"source":{"id":"https://openalex.org/S77894049","display_name":"Journal of Computers","issn_l":"1796-203X","issn":["1796-203X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computers","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Decent work and economic growth","score":0.44999998807907104,"id":"https://metadata.un.org/sdg/8"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W144501919","https://openalex.org/W1482495993","https://openalex.org/W1509468219","https://openalex.org/W1531102506","https://openalex.org/W1565369953","https://openalex.org/W1613874182","https://openalex.org/W1838435525","https://openalex.org/W1880212920","https://openalex.org/W1971605365","https://openalex.org/W1981663184","https://openalex.org/W2003736153","https://openalex.org/W2035242876","https://openalex.org/W2036378739","https://openalex.org/W2148164698","https://openalex.org/W2151279347","https://openalex.org/W2154909745"],"related_works":["https://openalex.org/W2188111145","https://openalex.org/W2034604290","https://openalex.org/W2952185445","https://openalex.org/W2572945594","https://openalex.org/W2867317277","https://openalex.org/W1991639997","https://openalex.org/W2078886092","https://openalex.org/W1533515601","https://openalex.org/W2102786134","https://openalex.org/W2362283711"],"abstract_inverted_index":{"At":[0],"the":[1,39,66,75,90,103,116,120,130,134,146,153,160,177,191,205],"elliptic":[4],"curve":[5],"cryptosystems":[6],"(ECC)":[7],"implementation":[8],"stage,":[9],"a":[10,94],"ma":[11],"jor":[13],"concern":[16],"is":[17,194],"securing":[20],"scalar":[21,96,121],"multiplications":[22],"against":[25,196,212],"so-called":[26],"side-channel":[27,187],"attacks":[28],"(SCA).":[29],"Existing":[32],"s":[33],"olutions":[35],"reach":[38],"goal":[40],"by":[43],"inserting":[44],"dummy":[45],"operations":[46],"(typically":[47],"increase":[48],"33%":[49],"computational":[50,69,104,179],"costs)":[51],"based":[52,137],"on":[53,138],"commonly-used":[54],"binary":[55,108,182],"method":[56,98,172,193,211],",":[58],"which":[59],"largely":[64],"increases":[65],"costs":[70],"and":[73,124],"prohibits":[74],"deployment":[76],"of":[77,119,148,159],"ECC":[78],"in":[79,122],"computation":[80,156],"resource-restricted":[81],"devices":[82],".":[84,199],"In":[85],"this":[86],"paper,":[87],"we":[88,203],"for":[89,152],"first":[91],"time":[92],"propose":[93],"secure":[95,195,209],"multiplication":[97],"that":[99,190],"does":[100],"not":[101],"penalise":[102],"cost":[105,180],"compared":[106],"to":[107,144,208],"method.":[109,183],"We":[112],"partition":[115],"bit":[117],"string":[118],"half":[123],"extract":[125],"ing":[127],"common":[131,161],"substring":[132],"from":[133],"two":[135],"parts":[136],"bit-wise":[139],"logical":[140],"operations,":[141],"so":[142],"as":[143,181],"save":[145],"number":[147],"point":[149],"additions":[150],"required":[151],"substring.":[162],"Computational":[165],"results":[166],"demonstrate":[167],"th":[168],"e":[170],"proposed":[171,192],"remains":[175],"approximately":[176],"same":[178],"The":[186],"experiments":[188],"prove":[189],"SSCA":[197],"Also,":[202],"use":[204],"randomization":[206],"technique":[207],"our":[210],"differential":[213],"SCA":[214],"(DSCA).":[215]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
