Class information for:
Level 1: SIDE CHANNEL ATTACKS//ADVANCED ENCRYPTION STANDARD AES//SIDE CHANNEL ANALYSIS

Basic class information

Class id #P Avg. number of
references
Database coverage
of references
13312 846 22.4 32%



Bar chart of Publication_year

Last years might be incomplete

Hierarchy of classes

The table includes all classes above and classes immediately below the current class.



Cluster id Level Cluster label #P
9 4 COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS 1247339
295 3       CRYPTOGRAPHY//COMPUTER SCIENCE, THEORY & METHODS//IEEE TRANSACTIONS ON INFORMATION THEORY 41419
2473 2             BLOCK CIPHER//STREAM CIPHER//BOOLEAN FUNCTIONS 3978
13312 1                   SIDE CHANNEL ATTACKS//ADVANCED ENCRYPTION STANDARD AES//SIDE CHANNEL ANALYSIS 846

Terms with highest relevance score



rank Term termType Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 SIDE CHANNEL ATTACKS authKW 1921422 14% 44% 121
2 ADVANCED ENCRYPTION STANDARD AES authKW 809978 4% 61% 37
3 SIDE CHANNEL ANALYSIS authKW 683950 4% 56% 34
4 DIFFERENTIAL POWER ANALYSIS authKW 649638 4% 60% 30
5 DIFFERENTIAL POWER ANALYSIS DPA authKW 629963 3% 73% 24
6 FAULT ATTACKS authKW 623851 4% 52% 33
7 DIFFERENTIAL FAULT ANALYSIS authKW 620441 2% 90% 19
8 ADVANCED ENCRYPTION STANDARD authKW 523890 4% 48% 30
9 DPA authKW 352060 5% 24% 40
10 AES authKW 350329 13% 9% 108

Web of Science journal categories



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 Computer Science, Hardware & Architecture 53618 45% 0% 378
2 Computer Science, Theory & Methods 15340 37% 0% 314
3 Computer Science, Information Systems 6313 23% 0% 192
4 Engineering, Electrical & Electronic 6152 50% 0% 422
5 Computer Science, Software Engineering 3254 15% 0% 124
6 Telecommunications 1152 10% 0% 87
7 Computer Science, Interdisciplinary Applications 133 4% 0% 34
8 Computer Science, Artificial Intelligence 19 2% 0% 16
9 Mathematics, Applied 17 3% 0% 27
10 Engineering, General 6 1% 0% 10

Address terms



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 PL INFORMAT PROC COMMUN 241259 2% 35% 19
2 UCL CRYPTO GRP 185604 1% 43% 12
3 HORST GORTZ IT SECUR 159281 2% 28% 16
4 IAIK 121800 1% 38% 9
5 STATE AIS TC 115494 0% 80% 4
6 ELECT MICROELECT EEL 72185 0% 100% 2
7 KAMAKURA OFF 72185 0% 100% 2
8 PL INFORMAT PROC COMMUN IAIK 64444 1% 36% 5
9 CRYPTO GRP 58455 1% 18% 9
10 DSIPTM S 48122 0% 67% 2

Journals



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 IET INFORMATION SECURITY 18918 2% 4% 13
2 LECTURE NOTES IN COMPUTER SCIENCE 15408 23% 0% 195
3 MICROPROCESSORS AND MICROSYSTEMS 15034 3% 2% 27
4 ACM TRANSACTIONS ON RECONFIGURABLE TECHNOLOGY AND SYSTEMS 13517 1% 4% 9
5 IEEE TRANSACTIONS ON COMPUTERS 10572 5% 1% 39
6 JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS 9096 2% 1% 21
7 IET COMPUTERS AND DIGITAL TECHNIQUES 8316 1% 2% 10
8 IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS 8314 3% 1% 28
9 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 7484 1% 2% 10
10 ETRI JOURNAL 7205 2% 1% 19

Author Key Words



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
LCSH search Wikipedia search
1 SIDE CHANNEL ATTACKS 1921422 14% 44% 121 Search SIDE+CHANNEL+ATTACKS Search SIDE+CHANNEL+ATTACKS
2 ADVANCED ENCRYPTION STANDARD AES 809978 4% 61% 37 Search ADVANCED+ENCRYPTION+STANDARD+AES Search ADVANCED+ENCRYPTION+STANDARD+AES
3 SIDE CHANNEL ANALYSIS 683950 4% 56% 34 Search SIDE+CHANNEL+ANALYSIS Search SIDE+CHANNEL+ANALYSIS
4 DIFFERENTIAL POWER ANALYSIS 649638 4% 60% 30 Search DIFFERENTIAL+POWER+ANALYSIS Search DIFFERENTIAL+POWER+ANALYSIS
5 DIFFERENTIAL POWER ANALYSIS DPA 629963 3% 73% 24 Search DIFFERENTIAL+POWER+ANALYSIS+DPA Search DIFFERENTIAL+POWER+ANALYSIS+DPA
6 FAULT ATTACKS 623851 4% 52% 33 Search FAULT+ATTACKS Search FAULT+ATTACKS
7 DIFFERENTIAL FAULT ANALYSIS 620441 2% 90% 19 Search DIFFERENTIAL+FAULT+ANALYSIS Search DIFFERENTIAL+FAULT+ANALYSIS
8 ADVANCED ENCRYPTION STANDARD 523890 4% 48% 30 Search ADVANCED+ENCRYPTION+STANDARD Search ADVANCED+ENCRYPTION+STANDARD
9 DPA 352060 5% 24% 40 Search DPA Search DPA
10 AES 350329 13% 9% 108 Search AES Search AES

Core articles

The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c:
(1) Number of references referring to publications in the class.
(2) Share of total number of active references referring to publications in the class.
(3) Age of the article. New articles get higher score than old articles.
(4) Citation rate, normalized to year.



Rank Reference # ref.
in cl.
Shr. of ref. in
cl.
Citations
1 KUNDI, DS , AZIZ, A , IKRAM, N , (2016) A HIGH PERFORMANCE ST-BOX BASED UNIFIED AES ENCRYPTION/DECRYPTION ARCHITECTURE ON FPGA.MICROPROCESSORS AND MICROSYSTEMS. VOL. 41. ISSUE . P. 37 -46 25 96% 1
2 TENA-SANCHEZ, E , CASTRO, J , ACOSTA, AJ , (2014) A METHODOLOGY FOR OPTIMIZED DESIGN OF SECURE DIFFERENTIAL LOGIC GATES FOR DPA RESISTANT CIRCUITS.IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS. VOL. 4. ISSUE 2. P. 203 -215 26 93% 1
3 SOLTANI, A , SHARIFIAN, S , (2015) AN ULTRA-HIGH THROUGHPUT AND FULLY PIPELINED IMPLEMENTATION OF AES ALGORITHM ON FPGA.MICROPROCESSORS AND MICROSYSTEMS. VOL. 39. ISSUE 7. P. 480 -493 20 100% 3
4 NIKOVA, S , RIJMEN, V , SCHLAFFER, M , (2011) SECURE HARDWARE IMPLEMENTATION OF NONLINEAR FUNCTIONS IN THE PRESENCE OF GLITCHES.JOURNAL OF CRYPTOLOGY. VOL. 24. ISSUE 2. P. 292 -321 18 100% 38
5 KIM, CK , SCHLAFFER, M , MOON, SJ , (2008) DIFFERENTIAL SIDE CHANNEL ANALYSIS ATTACKS ON FPGA IMPLEMENTATIONS OF ARIA.ETRI JOURNAL. VOL. 30. ISSUE 2. P. 315 -325 17 94% 14
6 MORADI, A , SALMASIZADEH, M , SHALMANI, MTM , EISENBARTH, T , (2009) VULNERABILITY MODELING OF CRYPTOGRAPHIC HARDWARE TO POWER ANALYSIS ATTACKS.INTEGRATION-THE VLSI JOURNAL. VOL. 42. ISSUE 4. P. 468 -478 16 100% 2
7 PIRET, G , STANDAERT, FX , (2008) SECURITY ANALYSIS OF HIGHER-ORDER BOOLEAN MASKING SCHEMES FOR BLOCK CIPHERS (WITH CONDITIONS OF PERFECT MASKING).IET INFORMATION SECURITY. VOL. 2. ISSUE 1. P. 1 -11 16 100% 2
8 WANG, Y , HA, YJ , (2014) A PERFORMANCE AND AREA EFFICIENT ASIP FOR HIGHER-ORDER DPA-RESISTANT AES.IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS. VOL. 4. ISSUE 2. P. 190 -202 15 88% 3
9 KIM, CH , (2012) IMPROVED DIFFERENTIAL FAULT ANALYSIS ON AES KEY SCHEDULE.IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY. VOL. 7. ISSUE 1. P. 41-50 13 100% 12
10 SUGAWARA, T , SATOH, A , HOMMA, N , AOKI, T , (2011) HIGH-PERFORMANCE ARCHITECTURE FOR CONCURRENT ERROR DETECTION FOR AES PROCESSORS.IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES. VOL. E94A. ISSUE 10. P. 1971 -1980 14 100% 0

Classes with closest relation at Level 1



Rank Class id link
1 33726 RC4//QUALITY OF PROTECTION//DISTINGUISHING ATTACKS
2 7292 BLOCK CIPHER//DIFFERENTIAL CRYPTANALYSIS//HASH FUNCTION
3 21091 HARDWARE SECURITY//PHYSICAL UNCLONABLE FUNCTION//HARDWARE TROJAN
4 1500 SCALAR MULTIPLICATION//ELLIPTIC CURVE CRYPTOGRAPHY//ELLIPTIC CURVE CRYPTOSYSTEM
5 10813 BOOLEAN FUNCTIONS//ALGEBRAIC IMMUNITY//STREAM CIPHER
6 23300 RETURN ORIENTED PROGRAMMING//DEVICE DRIVERS//HYPERVISORS
7 13551 ASYNCHRONOUS CIRCUITS//SIGNAL TRANSITION GRAPHS//ASYNCHRONOUS DESIGN
8 16868 RFID//DISTANCE BOUNDING PROTOCOL//RELAY ATTACK
9 32726 DEVICE PAIRING//TWO CHANNEL CRYPTOGRAPHY//DEVICE ASSOCIATION
10 8485 RECONFIGURABLE COMPUTING//ACM TRANSACTIONS ON RECONFIGURABLE TECHNOLOGY AND SYSTEMS//RECONFIGURABLE ARCHITECTURES

Go to start page