{"id":"https://openalex.org/W3179787543","doi":"https://doi.org/10.46586/tches.v2021.i3.780-805","title":"Countermeasures against Static Power Attacks","display_name":"Countermeasures against Static Power Attacks","publication_year":2021,"publication_date":"2021-07-09","ids":{"openalex":"https://openalex.org/W3179787543","doi":"https://doi.org/10.46586/tches.v2021.i3.780-805","mag":"3179787543"},"language":"en","primary_location":{"id":"doi:10.46586/tches.v2021.i3.780-805","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2021.i3.780-805","pdf_url":null,"source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.46586/tches.v2021.i3.780-805","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014843693","display_name":"Thorben Moos","orcid":"https://orcid.org/0000-0003-3809-9803"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Thorben Moos","raw_affiliation_strings":["Ruhr University Bochum, Horst G\u00f6rtz Institute for IT Security, Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Ruhr University Bochum, Horst G\u00f6rtz Institute for IT Security, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012815811","display_name":"Amir Moradi","orcid":"https://orcid.org/0000-0002-4032-7433"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Amir Moradi","raw_affiliation_strings":["Ruhr University Bochum, Horst G\u00f6rtz Institute for IT Security, Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Ruhr University Bochum, Horst G\u00f6rtz Institute for IT Security, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5014843693"],"corresponding_institution_ids":["https://openalex.org/I904495901"],"apc_list":null,"apc_paid":null,"fwci":1.3817,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.79867466,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"780","last_page":"805"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7636038064956665},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.6052468419075012},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.5937629342079163},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5758438110351562},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5134740471839905},{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.48489266633987427},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.44944053888320923},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.4250495135784149},{"id":"https://openalex.org/keywords/standard-cell","display_name":"Standard cell","score":0.42280182242393494},{"id":"https://openalex.org/keywords/masking","display_name":"Masking (illustration)","score":0.42208144068717957},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.41939738392829895},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37490200996398926},{"id":"https://openalex.org/keywords/integrated-circuit","display_name":"Integrated circuit","score":0.25320982933044434},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.13217312097549438}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7636038064956665},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.6052468419075012},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.5937629342079163},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5758438110351562},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5134740471839905},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.48489266633987427},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.44944053888320923},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.4250495135784149},{"id":"https://openalex.org/C78401558","wikidata":"https://www.wikidata.org/wiki/Q464496","display_name":"Standard cell","level":3,"score":0.42280182242393494},{"id":"https://openalex.org/C2777402240","wikidata":"https://www.wikidata.org/wiki/Q6783436","display_name":"Masking (illustration)","level":2,"score":0.42208144068717957},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.41939738392829895},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37490200996398926},{"id":"https://openalex.org/C530198007","wikidata":"https://www.wikidata.org/wiki/Q80831","display_name":"Integrated circuit","level":2,"score":0.25320982933044434},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13217312097549438},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.46586/tches.v2021.i3.780-805","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2021.i3.780-805","pdf_url":null,"source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:86f7c53e89454594b1a6a596bab289ea","is_oa":true,"landing_page_url":"https://doaj.org/article/86f7c53e89454594b1a6a596bab289ea","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Transactions on Cryptographic Hardware and Embedded Systems, Vol 2021, Iss 3 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.46586/tches.v2021.i3.780-805","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2021.i3.780-805","pdf_url":null,"source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W5280335","https://openalex.org/W2164725015","https://openalex.org/W2782264121","https://openalex.org/W4323926098","https://openalex.org/W4384807855","https://openalex.org/W2022533428","https://openalex.org/W182679101","https://openalex.org/W2125219685","https://openalex.org/W2425598453","https://openalex.org/W2354319712"],"abstract_inverted_index":{"In":[0,63,108],"recent":[1],"years":[2],"it":[3,212],"has":[4,42],"been":[5],"demonstrated":[6],"convincingly":[7],"that":[8,85,101,284],"the":[9,19,39,54,131,142,159,164,204,216,223,242,270],"standby":[10],"power":[11,41],"of":[12,57,116,155,163,179,207,241,265,269],"a":[13,114,147,200,237,252,266,273,277,290,298],"CMOS":[14,254],"chip":[15],"reveals":[16],"information":[17,77],"about":[18],"internally":[20],"stored":[21],"and":[22,96,112,125,145,161,183,231,246,303],"processed":[23],"data.":[24],"Thus,":[25],"for":[26,293,305],"adversaries":[27],"who":[28],"seek":[29],"to":[30,47,70,140,199,222,236,296],"extract":[31],"secrets":[32],"from":[33,73],"cryptographic":[34,249],"devices":[35],"via":[36],"side-channel":[37],"analysis,":[38],"static":[40],"become":[43],"an":[44],"attractive":[45],"quantity":[46],"obtain.":[48],"Most":[49],"works":[50],"have":[51],"focused":[52],"on":[53,83,174,251],"destructive":[55],"side":[56],"this":[58,64,196],"subject":[59],"by":[60],"demonstrating":[61],"attacks.":[62,151],"work,":[65],"we":[66,110],"examine":[67],"potential":[68],"solutions":[69,100],"protect":[71],"circuits":[72],"silently":[74],"leaking":[75],"sensitive":[76],"during":[78],"idle":[79],"times.":[80],"We":[81,128,186,282],"focus":[82],"countermeasures":[84,133,230],"can":[86],"be":[87,215],"implemented":[88],"using":[89,276],"any":[90,307],"common":[91],"digital":[92],"standard":[93],"cell":[94],"library":[95],"do":[97],"not":[98,214],"consider":[99],"require":[102],"full-custom":[103],"or":[104],"analog":[105],"design":[106],"flow.":[107],"particular,":[109],"evaluate":[111],"compare":[113],"set":[115],"five":[117],"distinct":[118],"standard-cell-based":[119,167],"hiding":[120,132],"countermeasures,":[121],"including":[122],"both,":[123],"randomization":[124],"equalization":[126],"techniques.":[127],"then":[129],"combine":[130],"with":[134],"state-of-the-art":[135],"hardware":[136,239,294],"masking":[137],"in":[138,177,209,272],"order":[139],"amplify":[141],"noise":[143],"level":[144,206],"achieve":[146],"high":[148],"resistance":[149,208],"against":[150],"An":[152],"important":[153],"part":[154],"our":[156,188,210,285],"contribution":[157],"is":[158],"proposal":[160],"evaluation":[162],"first":[165],"ever":[166],"balancing":[168],"scheme":[169],"which":[170],"achieves":[171],"perfect":[172],"data-independence":[173],"paper,":[175],"i.e.,":[176],"absence":[178],"intra-die":[180],"process":[181],"variations":[182],"aging":[184],"effects.":[185],"call":[187],"new":[189],"countermeasure":[190],"Exhaustive":[191],"Logic":[192],"Balancing":[193],"(ELB).":[194],"While":[195],"scheme,":[197],"applied":[198,235],"threshold":[201],"implementation,":[202],"provides":[203],"highest":[205],"experiments,":[211],"may":[213],"most":[217],"cost":[218,304],"effective":[219],"option":[220],"due":[221],"significant":[224],"resource":[225],"overhead":[226],"associated.":[227],"All":[228],"evaluated":[229],"combinations":[232],"thereof":[233],"are":[234,260],"serialized":[238],"implementation":[240],"PRESENT":[243],"block":[244],"cipher":[245],"realized":[247],"as":[248,289],"co-processors":[250],"28nm":[253],"ASIC":[255,271],"prototype.":[256],"Our":[257],"experimental":[258],"results":[259],"obtained":[261],"through":[262],"real-silicon":[263],"measurements":[264],"fabricated":[267],"die":[268],"temperature-controlled":[274],"environment":[275],"source":[278],"measure":[279],"unit":[280],"(SMU).":[281],"believe":[283],"elaborate":[286],"comparison":[287],"serves":[288],"useful":[291],"guideline":[292],"designers":[295],"find":[297],"proper":[299],"tradeoff":[300],"between":[301],"security":[302],"almost":[306],"application.":[308]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
