{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T16:43:02Z","timestamp":1770223382524,"version":"3.49.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/asianhost.2016.7835555","type":"proceedings-article","created":{"date-parts":[[2017,1,30]],"date-time":"2017-01-30T16:56:52Z","timestamp":1485795412000},"page":"1-6","source":"Crossref","is-referenced-by-count":17,"title":["Chosen ciphertext Simple Power Analysis on software 8-bit implementation of ring-LWE encryption"],"prefix":"10.1109","author":[{"given":"Aesun","family":"Park","sequence":"first","affiliation":[]},{"given":"Dong-Guk","family":"Han","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Introduction to Algorithms","author":"thomas","year":"0"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_34"},{"key":"ref12","first-page":"233","article-title":"Additively Homomorphic Ring-LWE Masking","volume":"9606","author":"oscar","year":"2016","journal-title":"PQCrypto"},{"key":"ref13","first-page":"104","article-title":"Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems","volume":"1109","author":"paul","year":"1996","journal-title":"Crypto"},{"key":"ref14","first-page":"388","article-title":"Differential power analysis","volume":"1666","author":"paul","year":"1999","journal-title":"Crypto"},{"key":"ref15","first-page":"512","article-title":"On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes","volume":"7428","author":"g\u00f6ttert","year":"2012","journal-title":"CHES"},{"key":"ref16","first-page":"367","article-title":"Collision Based Attacks in Practice","author":"ibrahima","year":"2015","journal-title":"DSD"},{"key":"ref17","article-title":"Power analysis attacks: Revealing the secrets of smart cards","volume":"31","author":"mangard","year":"0"},{"key":"ref4","first-page":"553","article-title":"Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem","author":"joppe","year":"2015","journal-title":"SP"},{"key":"ref3","first-page":"1","article-title":"On Ideal Lattices and Learning with Errors Over Rings","volume":"6110","author":"vadim","year":"2010","journal-title":"Eurocrypt"},{"key":"ref6","first-page":"68","article-title":"Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware","volume":"8282","author":"thomas","year":"2013","journal-title":"Sac"},{"key":"ref5","first-page":"371","article-title":"Compact Ring-LWE Cryptoprocessor","volume":"8731","author":"sujoy","year":"2014","journal-title":"CHES"},{"key":"ref8","first-page":"339","article-title":"Efficient Software Implementation of Ring-LWE Encryption","author":"de clercq and","year":"2015","journal-title":"DATE"},{"key":"ref7","article-title":"High-Performance Ideal Lattice-Based Cryptography on 8-bit ATxmega Microcontrollers","author":"thomas","year":"2015","journal-title":"Eprint"},{"key":"ref2","first-page":"84","article-title":"On lattices, learning with errors, random linear codes, and cryptography","author":"oded","year":"2005","journal-title":"STOC"},{"key":"ref1","first-page":"124","article-title":"Algorithms for Quantum Computation: Discrete Logarithms and Factoring","author":"peter","year":"1994","journal-title":"FOCS"},{"key":"ref9","first-page":"663","article-title":"Efficient Ring-LWE Encryption on 8-Bit AVR Processors","volume":"9293","author":"zhe","year":"2015","journal-title":"CHES"}],"event":{"name":"2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)","location":"Yilan, Taiwan","start":{"date-parts":[[2016,12,19]]},"end":{"date-parts":[[2016,12,20]]}},"container-title":["2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7824659\/7835548\/07835555.pdf?arnumber=7835555","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,13]],"date-time":"2017-12-13T15:08:26Z","timestamp":1513177706000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7835555\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/asianhost.2016.7835555","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}