{"id":"https:\/\/openalex.org\/W2398218726","doi":"https:\/\/doi.org\/10.1007\/978-3-319-43283-0_6","title":"Dismantling Real-World ECC with Horizontal and Vertical Template Attacks","display_name":"Dismantling Real-World ECC with Horizontal and Vertical Template Attacks","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https:\/\/openalex.org\/W2398218726","doi":"https:\/\/doi.org\/10.1007\/978-3-319-43283-0_6","mag":"2398218726"},"language":"en","primary_location":{"id":"doi:10.1007\/978-3-319-43283-0_6","is_oa":false,"landing_page_url":"https:\/\/doi.org\/10.1007\/978-3-319-43283-0_6","pdf_url":null,"source":{"id":"https:\/\/openalex.org\/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https:\/\/openalex.org\/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https:\/\/openalex.org\/P4310319900","https:\/\/openalex.org\/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https:\/\/openalex.org\/A5083725298","display_name":"Margaux Dugardin","orcid":null},"institutions":[{"id":"https:\/\/openalex.org\/I12356871","display_name":"T\u00e9l\u00e9com Paris","ror":"https:\/\/ror.org\/01naq7912","country_code":"FR","type":"education","lineage":["https:\/\/openalex.org\/I12356871","https:\/\/openalex.org\/I205703379","https:\/\/openalex.org\/I4210145102"]},{"id":"https:\/\/openalex.org\/I1283236314","display_name":"Thales (Portugal)","ror":"https:\/\/ror.org\/051w1mx35","country_code":"PT","type":"company","lineage":["https:\/\/openalex.org\/I1283236314","https:\/\/openalex.org\/I4210140930"]}],"countries":["FR","PT"],"is_corresponding":true,"raw_author_name":"Margaux Dugardin","raw_affiliation_strings":["COMELEC, TELECOM ParisTech, 46 rue Barrault, 75014, Paris, France","Thales Communications & Security, CESTI, 3 avenue de l\u2019Europe, 31000, Toulouse, France"],"affiliations":[{"raw_affiliation_string":"COMELEC, TELECOM ParisTech, 46 rue Barrault, 75014, Paris, France","institution_ids":["https:\/\/openalex.org\/I12356871"]},{"raw_affiliation_string":"Thales Communications & Security, CESTI, 3 avenue de l\u2019Europe, 31000, Toulouse, France","institution_ids":["https:\/\/openalex.org\/I1283236314"]}]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5028204202","display_name":"Louiza Papachristodoulou","orcid":null},"institutions":[{"id":"https:\/\/openalex.org\/I145872427","display_name":"Radboud University Nijmegen","ror":"https:\/\/ror.org\/016xsfp80","country_code":"NL","type":"education","lineage":["https:\/\/openalex.org\/I145872427"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Louiza Papachristodoulou","raw_affiliation_strings":["Digital Security Group, Radboud University Nijmegen, P.O. Box 9010, 6500 GL, Nijmegen, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Digital Security Group, Radboud University Nijmegen, P.O. Box 9010, 6500 GL, Nijmegen, The Netherlands","institution_ids":["https:\/\/openalex.org\/I145872427"]}]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5078667203","display_name":"Zakaria Najm","orcid":null},"institutions":[{"id":"https:\/\/openalex.org\/I12356871","display_name":"T\u00e9l\u00e9com Paris","ror":"https:\/\/ror.org\/01naq7912","country_code":"FR","type":"education","lineage":["https:\/\/openalex.org\/I12356871","https:\/\/openalex.org\/I205703379","https:\/\/openalex.org\/I4210145102"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Zakaria Najm","raw_affiliation_strings":["COMELEC, TELECOM ParisTech, 46 rue Barrault, 75014, Paris, France"],"affiliations":[{"raw_affiliation_string":"COMELEC, TELECOM ParisTech, 46 rue Barrault, 75014, Paris, France","institution_ids":["https:\/\/openalex.org\/I12356871"]}]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5051408740","display_name":"Lejla Batina","orcid":"https:\/\/orcid.org\/0000-0003-0727-3573"},"institutions":[{"id":"https:\/\/openalex.org\/I145872427","display_name":"Radboud University Nijmegen","ror":"https:\/\/ror.org\/016xsfp80","country_code":"NL","type":"education","lineage":["https:\/\/openalex.org\/I145872427"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Lejla Batina","raw_affiliation_strings":["Digital Security Group, Radboud University Nijmegen, P.O. Box 9010, 6500 GL, Nijmegen, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Digital Security Group, Radboud University Nijmegen, P.O. Box 9010, 6500 GL, Nijmegen, The Netherlands","institution_ids":["https:\/\/openalex.org\/I145872427"]}]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5054213189","display_name":"Jean\u2010Luc Danger","orcid":"https:\/\/orcid.org\/0000-0001-5063-7964"},"institutions":[{"id":"https:\/\/openalex.org\/I12356871","display_name":"T\u00e9l\u00e9com Paris","ror":"https:\/\/ror.org\/01naq7912","country_code":"FR","type":"education","lineage":["https:\/\/openalex.org\/I12356871","https:\/\/openalex.org\/I205703379","https:\/\/openalex.org\/I4210145102"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Jean-Luc Danger","raw_affiliation_strings":["COMELEC, TELECOM ParisTech, 46 rue Barrault, 75014, Paris, France"],"affiliations":[{"raw_affiliation_string":"COMELEC, TELECOM ParisTech, 46 rue Barrault, 75014, Paris, France","institution_ids":["https:\/\/openalex.org\/I12356871"]}]},{"author_position":"last","author":{"id":"https:\/\/openalex.org\/A5008439372","display_name":"Sylvain Guilley","orcid":"https:\/\/orcid.org\/0000-0002-5044-3534"},"institutions":[{"id":"https:\/\/openalex.org\/I12356871","display_name":"T\u00e9l\u00e9com Paris","ror":"https:\/\/ror.org\/01naq7912","country_code":"FR","type":"education","lineage":["https:\/\/openalex.org\/I12356871","https:\/\/openalex.org\/I205703379","https:\/\/openalex.org\/I4210145102"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Sylvain Guilley","raw_affiliation_strings":["COMELEC, TELECOM ParisTech, 46 rue Barrault, 75014, Paris, France"],"affiliations":[{"raw_affiliation_string":"COMELEC, TELECOM ParisTech, 46 rue Barrault, 75014, Paris, France","institution_ids":["https:\/\/openalex.org\/I12356871"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https:\/\/openalex.org\/A5083725298"],"corresponding_institution_ids":["https:\/\/openalex.org\/I12356871","https:\/\/openalex.org\/I1283236314"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":4.7408,"has_fulltext":false,"cited_by_count":26,"citation_normalized_percentile":{"value":0.95908017,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"88","last_page":"108"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https:\/\/openalex.org\/T10951","display_name":"Cryptographic Implementations and Security","score":0.9995999932289124,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1702","display_name":"Artificial Intelligence"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},"topics":[{"id":"https:\/\/openalex.org\/T10951","display_name":"Cryptographic Implementations and Security","score":0.9995999932289124,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1702","display_name":"Artificial Intelligence"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},{"id":"https:\/\/openalex.org\/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9991999864578247,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1710","display_name":"Information Systems"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},{"id":"https:\/\/openalex.org\/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9905999898910522,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1708","display_name":"Hardware and Architecture"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https:\/\/openalex.org\/keywords\/computer-science","display_name":"Computer science","score":0.8080573081970215},{"id":"https:\/\/openalex.org\/keywords\/side-channel-attack","display_name":"Side channel attack","score":0.6503943800926208},{"id":"https:\/\/openalex.org\/keywords\/cryptosystem","display_name":"Cryptosystem","score":0.5273787975311279},{"id":"https:\/\/openalex.org\/keywords\/key","display_name":"Key (lock)","score":0.479027658700943},{"id":"https:\/\/openalex.org\/keywords\/elliptic-curve","display_name":"Elliptic curve","score":0.4679048955440521},{"id":"https:\/\/openalex.org\/keywords\/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.4332856237888336},{"id":"https:\/\/openalex.org\/keywords\/algorithm","display_name":"Algorithm","score":0.4317166209220886},{"id":"https:\/\/openalex.org\/keywords\/leakage","display_name":"Leakage (economics)","score":0.42985352873802185},{"id":"https:\/\/openalex.org\/keywords\/information-leakage","display_name":"Information leakage","score":0.4232966899871826},{"id":"https:\/\/openalex.org\/keywords\/curve25519","display_name":"Curve25519","score":0.4149734079837799},{"id":"https:\/\/openalex.org\/keywords\/arithmetic","display_name":"Arithmetic","score":0.3701575994491577},{"id":"https:\/\/openalex.org\/keywords\/computer-security","display_name":"Computer security","score":0.3459452688694},{"id":"https:\/\/openalex.org\/keywords\/computer-engineering","display_name":"Computer engineering","score":0.3351787328720093},{"id":"https:\/\/openalex.org\/keywords\/cryptography","display_name":"Cryptography","score":0.3342708349227905},{"id":"https:\/\/openalex.org\/keywords\/public-key-cryptography","display_name":"Public-key cryptography","score":0.3008292317390442},{"id":"https:\/\/openalex.org\/keywords\/encryption","display_name":"Encryption","score":0.17524540424346924},{"id":"https:\/\/openalex.org\/keywords\/mathematics","display_name":"Mathematics","score":0.13340073823928833}],"concepts":[{"id":"https:\/\/openalex.org\/C41008148","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q21198","display_name":"Computer science","level":0,"score":0.8080573081970215},{"id":"https:\/\/openalex.org\/C49289754","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q2267081","display_name":"Side channel attack","level":3,"score":0.6503943800926208},{"id":"https:\/\/openalex.org\/C6295992","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q976521","display_name":"Cryptosystem","level":3,"score":0.5273787975311279},{"id":"https:\/\/openalex.org\/C26517878","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q228039","display_name":"Key (lock)","level":2,"score":0.479027658700943},{"id":"https:\/\/openalex.org\/C179603306","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q268493","display_name":"Elliptic curve","level":2,"score":0.4679048955440521},{"id":"https:\/\/openalex.org\/C167615521","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.4332856237888336},{"id":"https:\/\/openalex.org\/C11413529","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q8366","display_name":"Algorithm","level":1,"score":0.4317166209220886},{"id":"https:\/\/openalex.org\/C2777042071","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.42985352873802185},{"id":"https:\/\/openalex.org\/C2779201187","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q2775060","display_name":"Information leakage","level":2,"score":0.4232966899871826},{"id":"https:\/\/openalex.org\/C198690329","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q15702839","display_name":"Curve25519","level":5,"score":0.4149734079837799},{"id":"https:\/\/openalex.org\/C94375191","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q11205","display_name":"Arithmetic","level":1,"score":0.3701575994491577},{"id":"https:\/\/openalex.org\/C38652104","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q3510521","display_name":"Computer security","level":1,"score":0.3459452688694},{"id":"https:\/\/openalex.org\/C113775141","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q428691","display_name":"Computer engineering","level":1,"score":0.3351787328720093},{"id":"https:\/\/openalex.org\/C178489894","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q8789","display_name":"Cryptography","level":2,"score":0.3342708349227905},{"id":"https:\/\/openalex.org\/C203062551","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3008292317390442},{"id":"https:\/\/openalex.org\/C148730421","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q141090","display_name":"Encryption","level":2,"score":0.17524540424346924},{"id":"https:\/\/openalex.org\/C33923547","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q395","display_name":"Mathematics","level":0,"score":0.13340073823928833},{"id":"https:\/\/openalex.org\/C162324750","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q8134","display_name":"Economics","level":0,"score":0},{"id":"https:\/\/openalex.org\/C139719470","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q39680","display_name":"Macroeconomics","level":1,"score":0},{"id":"https:\/\/openalex.org\/C134306372","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q7754","display_name":"Mathematical analysis","level":1,"score":0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007\/978-3-319-43283-0_6","is_oa":false,"landing_page_url":"https:\/\/doi.org\/10.1007\/978-3-319-43283-0_6","pdf_url":null,"source":{"id":"https:\/\/openalex.org\/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https:\/\/openalex.org\/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https:\/\/openalex.org\/P4310319900","https:\/\/openalex.org\/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:ru:oai:repository.ubn.ru.nl:2066\/159557","is_oa":false,"landing_page_url":"http:\/\/hdl.handle.net\/2066\/159557","pdf_url":null,"source":{"id":"https:\/\/openalex.org\/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https:\/\/openalex.org\/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https:\/\/openalex.org\/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Standaert, F.-X.; Oswald, E. (ed.), Constructive Side-Channel Analysis and Secure Design: 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers, 88 - 108. Cham : Springer International Publishing","raw_type":"info:eu-repo\/semantics\/article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https:\/\/openalex.org\/W60105051","https:\/\/openalex.org\/W1508193711","https:\/\/openalex.org\/W1509468219","https:\/\/openalex.org\/W1532398039","https:\/\/openalex.org\/W1539482743","https:\/\/openalex.org\/W1540404582","https:\/\/openalex.org\/W1562542037","https:\/\/openalex.org\/W1565369953","https:\/\/openalex.org\/W1576317854","https:\/\/openalex.org\/W1752434584","https:\/\/openalex.org\/W1832880052","https:\/\/openalex.org\/W1871651397","https:\/\/openalex.org\/W2003736153","https:\/\/openalex.org\/W2036378739","https:\/\/openalex.org\/W2096133993","https:\/\/openalex.org\/W2127059139","https:\/\/openalex.org\/W2137567577","https:\/\/openalex.org\/W2149045748","https:\/\/openalex.org\/W2150559183","https:\/\/openalex.org\/W2154909745","https:\/\/openalex.org\/W2394969257","https:\/\/openalex.org\/W2542862245","https:\/\/openalex.org\/W2743215626","https:\/\/openalex.org\/W2914572864"],"related_works":["https:\/\/openalex.org\/W2004522261","https:\/\/openalex.org\/W1533979697","https:\/\/openalex.org\/W2782833818","https:\/\/openalex.org\/W3117705379","https:\/\/openalex.org\/W2117623867","https:\/\/openalex.org\/W4387402446","https:\/\/openalex.org\/W1999560184","https:\/\/openalex.org\/W4242526801","https:\/\/openalex.org\/W2102786134","https:\/\/openalex.org\/W4312920169"],"abstract_inverted_index":null,"counts_by_year":[{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":6},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}