{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T22:18:11Z","timestamp":1771366691485,"version":"3.50.1"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100005073","name":"Military Crypto Research Center funded by the Defense Acquisition Program Administration (DAPA) and the Agency for Defense Development","doi-asserted-by":"publisher","award":["UD210027XD"],"award-info":[{"award-number":["UD210027XD"]}],"id":[{"id":"10.13039\/501100005073","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3273150","type":"journal-article","created":{"date-parts":[[2023,5,4]],"date-time":"2023-05-04T17:31:23Z","timestamp":1683221483000},"page":"44578-44589","source":"Crossref","is-referenced-by-count":13,"title":["Stealing Keys From Hardware Wallets: A Single Trace Side-Channel Attack on Elliptic Curve Scalar Multiplication Without Profiling"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4820-389X","authenticated-orcid":false,"given":"Dongjun","family":"Park","sequence":"first","affiliation":[{"name":"Institute of Cyber Security and Privacy (ICSP), Korea University, Seoul, South Korea"}]},{"given":"Minsig","family":"Choi","sequence":"additional","affiliation":[{"name":"Institute of Cyber Security and Privacy (ICSP), Korea University, Seoul, South Korea"}]},{"given":"Gyusang","family":"Kim","sequence":"additional","affiliation":[{"name":"Institute of Cyber Security and Privacy (ICSP), Korea University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5523-6710","authenticated-orcid":false,"given":"Daehyeon","family":"Bae","sequence":"additional","affiliation":[{"name":"Institute of Cyber Security and Privacy (ICSP), Korea University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8137-4810","authenticated-orcid":false,"given":"Heeseok","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of AI Cyber Security, College of Science and Technology, Korea University, Sejong Campus, Sejong-si, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7506-4023","authenticated-orcid":false,"given":"Seokhie","family":"Hong","sequence":"additional","affiliation":[{"name":"Institute of Cyber Security and Privacy (ICSP), Korea University, Seoul, South Korea"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/HOST45689.2020.9300265"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64647-3_5"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i2.199-224"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/DTIS.2016.7483807"},{"key":"ref15","author":"nedospasov","year":"2018","journal-title":"Wallet Fail"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2023.i1.238-276"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED48828.2020.9137051"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-35869-3_8"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i4.1-26"},{"key":"ref30","first-page":"179","article-title":"An improved horizontal correlation analysis using collision characteristics on lookup table based scalar multiplication algorithms","volume":"30","author":"park","year":"2020","journal-title":"J Korea Inst Inf Secur Cryptol"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IVSW.2019.8854391"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3180742"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44709-1_21"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2022.3191736"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3119291"},{"key":"ref1","author":"nakamoto","year":"2008","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System"},{"key":"ref17","article-title":"Side-channel assessment of open source hardware wallets","author":"pedro","year":"2019"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-011-0012-0"},{"key":"ref16","first-page":"1","article-title":"MIN()imum failure: EMFI attacks against USB stacks","author":"o\u2019flynn","year":"2019","journal-title":"Proc 13th USENIX Workshop Offensive Technol (WOOT)"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36563-X_23"},{"key":"ref19","author":"wuille","year":"2012","journal-title":"Hierarchical deterministic wallets"},{"key":"ref18","author":"dzetkulic","year":"2022","journal-title":"Trezor Firmware"},{"key":"ref24","author":"brown","year":"2010","journal-title":"SEC 2 Recommended elliptic curve domain parameters"},{"key":"ref23","author":"rusnak","year":"2017","journal-title":"Derivation Scheme for P2WPKH Based Accounts"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2021.01.013"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-72359-4_10"},{"key":"ref20","author":"palatinus","year":"2014","journal-title":"Purpose Field for Deterministic Wallets"},{"key":"ref42","author":"hankerson","year":"2006","journal-title":"Guide to Elliptic Curve Cryptography"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2020.3039753"},{"key":"ref22","author":"weigl","year":"2016","journal-title":"Derivation scheme for P2WPKH-nested-in-P2SH based accounts"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3072653"},{"key":"ref21","year":"2014","journal-title":"Multi-Account Hierarchy for Deterministic Wallets"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19074-2_8"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17650-0_5"},{"key":"ref27","article-title":"Advanced encryption standards (AES)","author":"dworkin","year":"2022"},{"key":"ref29","article-title":"Digital signature standard (DSS)","author":"regenschei","year":"2022"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography4020015"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3123894"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-02683-7_26"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32101-7_26"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCSP49186.2020.9315193"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2905899"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10115517.pdf?arnumber=10115517","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T17:43:47Z","timestamp":1685382227000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10115517\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3273150","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}