{"id":"https://openalex.org/W4411156846","doi":"https://doi.org/10.46586/tches.v2025.i3.717-744","title":"Primitive-Level vs. Implementation-Level DPA Security: a Certified Case Study","display_name":"Primitive-Level vs. Implementation-Level DPA Security: a Certified Case Study","publication_year":2025,"publication_date":"2025-06-05","ids":{"openalex":"https://openalex.org/W4411156846","doi":"https://doi.org/10.46586/tches.v2025.i3.717-744"},"language":"en","primary_location":{"id":"doi:10.46586/tches.v2025.i3.717-744","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2025.i3.717-744","pdf_url":"https://ojs.ub.rub.de/index.php/TCHES/article/download/12234/12045","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://ojs.ub.rub.de/index.php/TCHES/article/download/12234/12045","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039780407","display_name":"Charles Momin","orcid":null},"institutions":[{"id":"https://openalex.org/I95674353","display_name":"UCLouvain","ror":"https://ror.org/02495e989","country_code":"BE","type":"education","lineage":["https://openalex.org/I95674353"]}],"countries":["BE"],"is_corresponding":true,"raw_author_name":"Charles Momin","raw_affiliation_strings":["Crypto Group, ICTEAM Institute, UCLouvain, Louvain-la-Neuve, Belgium"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Crypto Group, ICTEAM Institute, UCLouvain, Louvain-la-Neuve, Belgium","institution_ids":["https://openalex.org/I95674353"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070542865","display_name":"Fran\u00e7ois\u2010Xavier Standaert","orcid":"https://orcid.org/0000-0001-7444-0285"},"institutions":[{"id":"https://openalex.org/I95674353","display_name":"UCLouvain","ror":"https://ror.org/02495e989","country_code":"BE","type":"education","lineage":["https://openalex.org/I95674353"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Fran\u00e7ois-Xavier Standaert","raw_affiliation_strings":["Crypto Group, ICTEAM Institute, UCLouvain, Louvain-la-Neuve, Belgium"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Crypto Group, ICTEAM Institute, UCLouvain, Louvain-la-Neuve, Belgium","institution_ids":["https://openalex.org/I95674353"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035326281","display_name":"Corentin Verhamme","orcid":null},"institutions":[{"id":"https://openalex.org/I95674353","display_name":"UCLouvain","ror":"https://ror.org/02495e989","country_code":"BE","type":"education","lineage":["https://openalex.org/I95674353"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Corentin Verhamme","raw_affiliation_strings":["Crypto Group, ICTEAM Institute, UCLouvain, Louvain-la-Neuve, Belgium"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Crypto Group, ICTEAM Institute, UCLouvain, Louvain-la-Neuve, Belgium","institution_ids":["https://openalex.org/I95674353"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5039780407"],"corresponding_institution_ids":["https://openalex.org/I95674353"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.05952322,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2025","issue":"3","first_page":"717","last_page":"744"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9865999817848206,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9857000112533569,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/certification","display_name":"Certification","score":0.5622511506080627},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.43974804878234863},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33706778287887573},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.14103642106056213}],"concepts":[{"id":"https://openalex.org/C46304622","wikidata":"https://www.wikidata.org/wiki/Q374814","display_name":"Certification","level":2,"score":0.5622511506080627},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.43974804878234863},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33706778287887573},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.14103642106056213},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.46586/tches.v2025.i3.717-744","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2025.i3.717-744","pdf_url":"https://ojs.ub.rub.de/index.php/TCHES/article/download/12234/12045","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},{"id":"pmh:oai:dial.uclouvain.be:boreal:311628","is_oa":true,"landing_page_url":"http://hdl.handle.net/2078.1/311628","pdf_url":null,"source":{"id":"https://openalex.org/S4306400166","display_name":"Digital Access to Libraries","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2800384882","host_organization_name":"Harris County Public Library","host_organization_lineage":["https://openalex.org/I2800384882"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2025, no.3, p. 717-744 (2025)","raw_type":"info:eu-repo/semantics/article"},{"id":"pmh:oai:doaj.org/article:1084c0bbea7446d4b8c2895e14da62db","is_oa":true,"landing_page_url":"https://doaj.org/article/1084c0bbea7446d4b8c2895e14da62db","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Transactions on Cryptographic Hardware and Embedded Systems, Vol 2025, Iss 3 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.46586/tches.v2025.i3.717-744","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2025.i3.717-744","pdf_url":"https://ojs.ub.rub.de/index.php/TCHES/article/download/12234/12045","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5641042146","display_name":"Connecting Symmetric and Asymmetric  Cryptography for Leakage and Faults","funder_award_id":"101096871","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320321390","display_name":"Fonds De La Recherche Scientifique - FNRS","ror":"https://ror.org/03q83t159"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4411156846.pdf","grobid_xml":"https://content.openalex.org/works/W4411156846.grobid-xml"},"referenced_works_count":50,"referenced_works":["https://openalex.org/W4186701","https://openalex.org/W57300150","https://openalex.org/W130128522","https://openalex.org/W149343646","https://openalex.org/W191000419","https://openalex.org/W333638916","https://openalex.org/W802019357","https://openalex.org/W1548656471","https://openalex.org/W1572251059","https://openalex.org/W1575446397","https://openalex.org/W1592625985","https://openalex.org/W1599906532","https://openalex.org/W1602503772","https://openalex.org/W1658234468","https://openalex.org/W1752847028","https://openalex.org/W1753795543","https://openalex.org/W1796231437","https://openalex.org/W1897761346","https://openalex.org/W1902160629","https://openalex.org/W1943109301","https://openalex.org/W2015691375","https://openalex.org/W2099724084","https://openalex.org/W2114286085","https://openalex.org/W2125025555","https://openalex.org/W2140823840","https://openalex.org/W2150892302","https://openalex.org/W2164584813","https://openalex.org/W2418954816","https://openalex.org/W2461125394","https://openalex.org/W2484680112","https://openalex.org/W2495498226","https://openalex.org/W2555917385","https://openalex.org/W2759450573","https://openalex.org/W2954655849","https://openalex.org/W2967098993","https://openalex.org/W3013677143","https://openalex.org/W3107729397","https://openalex.org/W3133865019","https://openalex.org/W3179013011","https://openalex.org/W3203012334","https://openalex.org/W3208740725","https://openalex.org/W4205428673","https://openalex.org/W4226363871","https://openalex.org/W4308391452","https://openalex.org/W4308642032","https://openalex.org/W4379056537","https://openalex.org/W4380085683","https://openalex.org/W4385654153","https://openalex.org/W4389395091","https://openalex.org/W4400836568"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2066052364","https://openalex.org/W4243365217","https://openalex.org/W2224296908","https://openalex.org/W2023743128","https://openalex.org/W3109981693","https://openalex.org/W2381980429","https://openalex.org/W2384206113"],"abstract_inverted_index":{"Implementation-level":[0],"countermeasures":[1],"like":[2],"masking":[3,194],"can":[4,94,238],"be":[5,95,104,127],"applied":[6],"to":[7,13,66,69,103,145,158,227],"any":[8],"cryptographic":[9],"algorithm":[10],"in":[11,170],"order":[12],"mitigate":[14],"Differential":[15],"Power":[16],"Analysis":[17],"(DPA).":[18],"Leveraging":[19],"re-keying":[20],"with":[21,115],"a":[22,32,86,107,111],"Leakage-Resilient":[23],"PRF":[24,168],"(LR-PRF)":[25],"is":[26,195,223],"an":[27,76,99,136],"alternative":[28],"countermeasure":[29],"that":[30,93,152,165,199,204,218,235],"requires":[31],"change":[33],"of":[34,62,139,180,183,193,211,221],"primitive.":[35],"Both":[36,118],"options":[37],"rely":[38],"on":[39,121],"different":[40,149],"security":[41,92,163],"mechanisms:":[42],"signal-to-noise":[43],"ratio":[44],"amplification":[45],"for":[46,50,129],"masking,":[47],"signal":[48],"reduction":[49],"LRPRFs.":[51],"This":[52],"makes":[53],"their":[54,228],"general":[55],"comparison":[56],"difficult":[57],"and":[58,89,110,125,155,178,215],"suggests":[59],"the":[60,73,91,148,156,166,176,190,209,212,219,224],"investigation":[61],"relevant":[63],"case":[64,87],"studies":[65],"identify":[67],"when":[68],"use":[70],"one":[71],"or":[72],"other":[74],"as":[75],"interesting":[77],"research":[78],"direction.":[79],"In":[80],"this":[81],"paper,":[82],"we":[83,197,232],"provide":[84],"such":[85,240],"study":[88],"compare":[90],"obtained":[96],"by":[97],"using":[98],"unprotected":[100],"hardware":[101],"coprocessor,":[102],"integrated":[105],"into":[106],"leakage-resilient":[108,167],"PRF,":[109],"certified":[112],"one,":[113],"protected":[114],"implementation-level":[116],"countermeasures.":[117,184],"are":[119,187,201],"available":[120],"\u201ccommercial":[122],"off-the-shelf\u201d":[123],"devices":[124],"could":[126],"used":[128],"lightweight":[130],"IoT":[131],"applications.":[132],"We":[133,173],"first":[134],"perform":[135],"in-depth":[137],"analysis":[138],"these":[140],"targets.":[141],"It":[142],"allows":[143],"us":[144],"put":[146],"forward":[147],"evaluation":[150],"challenges":[151],"they":[153],"raise,":[154],"similar":[157],"slightly":[159],"better":[160],"cost":[161],"vs.":[162],"tradeoff":[164],"offers":[169],"our":[171,236],"experiments.":[172],"then":[174],"discuss":[175],"advantages":[177],"limitations":[179],"both":[181],"types":[182],"While":[185],"there":[186,200],"contexts":[188],"where":[189],"higher":[191],"flexibility":[192],"needed,":[196],"conclude":[198],"also":[202],"applications":[203],"would":[205],"strongly":[206],"benefit":[207],"from":[208],"simplicity":[210],"LR-PRF\u2019s":[213],"design":[214],"evaluation.":[216],"Positing":[217],"lack":[220],"standards":[222],"main":[225],"impediment":[226],"more":[229],"widespread":[230],"deployment,":[231],"therefore":[233],"hope":[234],"results":[237],"motivate":[239],"standardization":[241],"efforts.":[242]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
