{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T13:28:59Z","timestamp":1764250139564,"version":"3.37.3"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,2,15]],"date-time":"2018-02-15T00:00:00Z","timestamp":1518652800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,2,15]],"date-time":"2018-02-15T00:00:00Z","timestamp":1518652800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1314655","CNS-1337854"],"award-info":[{"award-number":["CNS-1314655","CNS-1337854"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Hardw Syst Secur"],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1007\/s41635-018-0032-7","type":"journal-article","created":{"date-parts":[[2018,2,15]],"date-time":"2018-02-15T17:24:42Z","timestamp":1518715482000},"page":"69-82","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Power Analysis Attack of an AES GPU Implementation"],"prefix":"10.1007","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9647-3675","authenticated-orcid":false,"given":"Chao","family":"Luo","sequence":"first","affiliation":[]},{"given":"Yunsi","family":"Fei","sequence":"additional","affiliation":[]},{"given":"Liwei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"A. Adam","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Pei","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Saoni","family":"Mukherjee","sequence":"additional","affiliation":[]},{"given":"David","family":"Kaeli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,15]]},"reference":[{"key":"32_CR1","doi-asserted-by":"crossref","unstructured":"Brier E, Clavier C, Olivier F (2004) Correlation power analysis with a leakage model. InL: Cryptographic hardware & embedded systems, vol 3156, pp 16\u201329","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"32_CR2","first-page":"252","volume-title":"Differential power analysis in the presence of hardware countermeasures","author":"C Clavier","year":"2000","unstructured":"Clavier C, Coron JS, Dabbous N (2000) Differential power analysis in the presence of hardware countermeasures. Springer, Berlin, pp 252\u2013263"},{"key":"32_CR3","unstructured":"Cook D, Keromytis AD (2006) Cryptographics: exploiting graphics cards for security, vol 20. Springer Science & Business Media"},{"key":"32_CR4","doi-asserted-by":"crossref","unstructured":"Cook DL, Ioannidis J, Keromytis AD, Luck J (2005) Cryptographics: secret key cryptography using graphics cards. In: Topics in cryptology\u2013CT-RSA 2005. Springer, pp 334\u2013350","DOI":"10.1007\/978-3-540-30574-3_23"},{"key":"32_CR5","unstructured":"Daemen J, Rijmen V (1998) AES proposal: Rijndael"},{"issue":"4","key":"32_CR6","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/s13389-015-0107-0","volume":"5","author":"Y Fei","year":"2015","unstructured":"Fei Y, Ding AA, Lao J, Zhang L (2015) A statistics-based success rate model for DPA and CPA. J Cryptogr Eng 5(4):227\u2013243","journal-title":"J Cryptogr Eng"},{"key":"32_CR7","volume-title":"Heterogeneous computing with openCL: revised openCL 1.2 edition","author":"B Gaster","year":"2013","unstructured":"Gaster B, Howes L, Kaeli DR, Mistry P, Schaa D (2013) Heterogeneous computing with openCL: revised openCL 1.2 edition, 2nd edn. Morgan Kaufmann Publishers Inc., San Francisco","edition":"2nd edn."},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"Genkin D, Shamir A, Tromer E (2014) RSA key extraction via low-bandwidth acoustic cryptanalysis. In: Advances in cryptology\u2013CRYPTO 2014. Springer, pp 444\u2013461","DOI":"10.1007\/978-3-662-44371-2_25"},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"Gierlichs B, Batina L, Tuyls P, Preneel B (2008) Mutual information analysis. In: Cryptographic hardware & embedded systems, pp 426\u2013442","DOI":"10.1007\/978-3-540-85053-3_27"},{"key":"32_CR10","doi-asserted-by":"crossref","unstructured":"Gilger J, Barnickel J, Meyer U (2012) GPU-acceleration of block ciphers in the OpenSSL cryptographic library. In: Information security. Springer, pp 338\u2013353","DOI":"10.1007\/978-3-642-33383-5_21"},{"key":"32_CR11","volume-title":"GPU computing gems emerald edition","author":"WM Hwu","year":"2011","unstructured":"Hwu WM (2011) GPU computing gems emerald edition, 1st edn. Morgan Kaufmann Publishers Inc., San Francisco","edition":"1st edn."},{"key":"32_CR12","doi-asserted-by":"publisher","unstructured":"Iwai K, Kurokawa T, Nisikawa N (2010) Aes encryption implementation on cuda gpu and its analysis. In: 2010 First international conference on networking and computing, pp 209\u2013214. \n                    https:\/\/doi.org\/10.1109\/IC-NC.2010.49","DOI":"10.1109\/IC-NC.2010.49"},{"key":"32_CR13","unstructured":"Jan MR, Anantha C, Borivoje N (2003) Digital integrated circuits: a design perspective"},{"key":"32_CR14","doi-asserted-by":"publisher","unstructured":"Jiang ZH, Fei Y, Kaeli D (2016) A complete key recovery timing attack on a gpu. In: 2016 IEEE International symposium on high performance computer architecture (HPCA), pp 394\u2013405. \n                    https:\/\/doi.org\/10.1109\/HPCA.2016.7446081","DOI":"10.1109\/HPCA.2016.7446081"},{"issue":"1","key":"32_CR15","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s13389-011-0006-y","volume":"1","author":"P Kocher","year":"2011","unstructured":"Kocher P, Jaffe J, Jun B, Rohatgi P (2011) Introduction to differential power analysis. J Cryptogr Eng 1(1):5\u201327","journal-title":"J Cryptogr Eng"},{"key":"32_CR16","unstructured":"Leischner N, Osipov V, Sanders P (2009) Nvidia fermi architecture white paper. \n                    http:\/\/www.nvidia.com\/content\/pdf\/fermi_white_papers\/nvidia_fermi_compute_architecture_whitepaper.pdf"},{"key":"32_CR17","doi-asserted-by":"publisher","unstructured":"Li Q, Zhong C, Zhao K, Mei X, Chu X (2012) Implementation and analysis of aes encryption on gpu. In: 2012 IEEE 14th International conference on high performance computing and communication, 2012 IEEE 9th international conference on embedded software and systems, pp 843\u2013848. \n                    https:\/\/doi.org\/10.1109\/HPCC.2012.119","DOI":"10.1109\/HPCC.2012.119"},{"key":"32_CR18","doi-asserted-by":"crossref","unstructured":"Lombardi F, Di Pietro R (2014) Towards a GPU cloud: benefits and security issues. In: Continued rise of the cloud. Springer, pp 3\u201322","DOI":"10.1007\/978-1-4471-6452-4_1"},{"key":"32_CR19","doi-asserted-by":"crossref","unstructured":"Luo C, Fei Y, Luo P, Mukherjee S, Kaeli D (2015) Side-channel power analysis of a GPU AES implementation. In: IEEE Int. Con. on computer design (ICCD). IEEE, pp 281\u2013288","DOI":"10.1109\/ICCD.2015.7357115"},{"key":"32_CR20","doi-asserted-by":"crossref","unstructured":"Luo P, Fei Y, Fang X, Ding AA, Leeser M, Kaeli DR (2014) Power analysis attack on hardware implementation of MAC-Keccak on FPGAs. In: Int. Conf. on ReConFigurable computing and FPGAs (ReConFig), pp 1\u20137","DOI":"10.1109\/ReConFig.2014.7032549"},{"key":"32_CR21","doi-asserted-by":"crossref","unstructured":"Manavski S (2007) CUDA compatible GPU as an efficient hardware accelerator for AES cryptography. In: IEEE Int. Conf. on signal processing & communications, pp 65\u201368","DOI":"10.1109\/ICSPC.2007.4728256"},{"key":"32_CR22","first-page":"222","volume-title":"Hardware countermeasures against DPA \u2013 a statistical analysis of their effectiveness","author":"S Mangard","year":"2004","unstructured":"Mangard S (2004) Hardware countermeasures against DPA \u2013 a statistical analysis of their effectiveness. Springer, Berlin, pp 222\u2013235"},{"key":"32_CR23","unstructured":"Margara P (2015) Engine-CUDA, a cryptographic engine for CUDA supported devices. \n                    https:\/\/code.google.com\/p\/engine-cuda\/"},{"key":"32_CR24","doi-asserted-by":"crossref","unstructured":"Maurice C, Neumann C, Heen O, Francillon A (2014) Confidentiality issues on a GPU in a virtualized environment. In: Financial cryptography and data security. Springer, pp 119\u2013135","DOI":"10.1007\/978-3-662-45472-5_9"},{"key":"32_CR25","doi-asserted-by":"crossref","unstructured":"Messerges TS, Dabbish EA, Sloan RH (1999) Power analysis attacks of modular exponentiation in smartcards. In: Cryptographic hardware & embedded systems, pp 144\u2013157","DOI":"10.1007\/3-540-48059-5_14"},{"key":"32_CR26","doi-asserted-by":"crossref","unstructured":"Moradi A, Hinterw\u00e4lder G (2015) Side-Channel security analysis of ultra-low-power FRAM-based MCUs. In: Proc. Int WkShp on constructive side-channel analysis & secure design","DOI":"10.1007\/978-3-319-21476-4_16"},{"key":"32_CR27","unstructured":"NVIDIA (2015) CUDA C Programming Guide. \n                    http:\/\/docs.nvidia.com\/cuda\/pdf\/CUDA_C_Programming_Guide.pdf"},{"key":"32_CR28","unstructured":"Ors SB, Gurkaynak F, Oswald E, Preneel B (2004) Power-analysis attack on an ASIC AES implementation. In: Int. conf. on info. tech.: coding & computing, vol 2, pp 546\u2013552"},{"key":"32_CR29","doi-asserted-by":"crossref","unstructured":"\u00d6rs SB, Oswald E, Preneel B (2003) Power-analysis attacks on an FPGA\u2013first experimental results. In: Cryptographic hardware & embedded systems, pp 35\u201350","DOI":"10.1007\/978-3-540-45238-6_4"},{"issue":"1","key":"32_CR30","first-page":"15","volume":"15","author":"RD Pietro","year":"2016","unstructured":"Pietro RD, Lombardi F, Villani A (2016) CUDA leaks: a detailed hack for CUDA and a (partial) fix. ACM Trans Embedded Comput Syst (TECS) 15(1):15","journal-title":"ACM Trans Embedded Comput Syst (TECS)"},{"key":"32_CR31","doi-asserted-by":"crossref","unstructured":"Szerwinski R, G\u00fcneysu T (2008) Exploiting the power of GPUs for asymmetric cryptography. In: Cryptographic hardware and embedded systems. Springer, pp 79\u201399","DOI":"10.1007\/978-3-540-85053-3_6"}],"container-title":["Journal of Hardware and Systems Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s41635-018-0032-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-018-0032-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-018-0032-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,17]],"date-time":"2020-05-17T05:28:45Z","timestamp":1589693325000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s41635-018-0032-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,15]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,3]]}},"alternative-id":["32"],"URL":"https:\/\/doi.org\/10.1007\/s41635-018-0032-7","relation":{},"ISSN":["2509-3428","2509-3436"],"issn-type":[{"type":"print","value":"2509-3428"},{"type":"electronic","value":"2509-3436"}],"subject":[],"published":{"date-parts":[[2018,2,15]]},"assertion":[{"value":"5 October 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 January 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 February 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}