{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:14:14Z","timestamp":1740100454544,"version":"3.37.3"},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,13]],"date-time":"2021-10-13T00:00:00Z","timestamp":1634083200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,13]],"date-time":"2021-10-13T00:00:00Z","timestamp":1634083200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100017608","name":"Postgraduate-Enterprise Cooperation Fund of Shenzhen Technology University","doi-asserted-by":"publisher","award":["XQHZ202119"],"award-info":[{"award-number":["XQHZ202119"]}],"id":[{"id":"10.13039\/501100017608","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,13]]},"DOI":"10.1109\/icct52962.2021.9657885","type":"proceedings-article","created":{"date-parts":[[2022,1,4]],"date-time":"2022-01-04T20:36:39Z","timestamp":1641328599000},"page":"274-278","source":"Crossref","is-referenced-by-count":3,"title":["Profiling Attacks against ECC: Side Channel Analysis Based on Deep Learning for Curve-25519"],"prefix":"10.1109","author":[{"given":"Jiajun","family":"Xu","sequence":"first","affiliation":[{"name":"College of Big Data and Internet Shenzhen Technology University,Shenzhen,China"}]},{"given":"Meng","family":"Li","sequence":"additional","affiliation":[{"name":"College of Big Data and Internet Shenzhen Technology University,Shenzhen,China"}]},{"given":"Lixin","family":"Liang","sequence":"additional","affiliation":[{"name":"College of Big Data and Internet Shenzhen Technology University,Shenzhen,China"}]},{"given":"Yiwei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Shenzhen DJI Technology Co., Ltd.,Shenzhen,China"}]},{"given":"Shaohua","family":"Xiang","sequence":"additional","affiliation":[{"name":"College of Big Data and Internet Shenzhen Technology University,Shenzhen,China"}]},{"given":"Zhe","family":"Ma","sequence":"additional","affiliation":[{"name":"Bank Card Test Center (BCTC),Beijingy,China"}]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2020.i1.1-36"},{"key":"ref3","first-page":"65","article-title":"New method of differential attack for encryption chip based on convolutional neural network","volume":"54","author":"dongxin","year":"2018","journal-title":"Computer Engineering and Applications"},{"key":"ref6","article-title":"Research on the Side Channel Attack Technology Based on Conditional Generation Against Network[J\/OL]","author":"jing","year":"0","journal-title":"Computer Engineering and Applications"},{"key":"ref10","first-page":"260","author":"kim","year":"0","journal-title":"Complete addition law for Montgomery curves [C]\/\/International Conference on Information Security and Cryptology"},{"key":"ref5","first-page":"1157","article-title":"VGG-based side channel attack on RSA implementation[C]\/\/2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","author":"lei","year":"0","journal-title":"IEEE"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2905899"},{"key":"ref12","first-page":"225","article-title":"A Side-Channel Attack Using Order 8 Rational Points against Curve25519 on an 8-Bit Microcontroller[C]\/\/2019 Seventh International Symposium on Computing and Networking (CANDAR)","author":"uetake","year":"0","journal-title":"IEEE"},{"key":"ref8","first-page":"25","author":"sasdrich","year":"0","journal-title":"Efficient elliptic-curve cryptography using Curve25519 on reconfigurable devices[C]\/\/International Symposium on Applied Reconfigurable Computing"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3055833"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_3"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49445-6_1"},{"key":"ref9","first-page":"13","article-title":"Template Attacks against ECC: practical implementation against Curve25519[C]\/\/2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","author":"loiseau","year":"0","journal-title":"IEEE"}],"event":{"name":"2021 IEEE 21st International Conference on Communication Technology (ICCT)","start":{"date-parts":[[2021,10,13]]},"location":"Tianjin, China","end":{"date-parts":[[2021,10,16]]}},"container-title":["2021 IEEE 21st International Conference on Communication Technology (ICCT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9657830\/9657831\/09657885.pdf?arnumber=9657885","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T23:51:44Z","timestamp":1659484304000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9657885\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,13]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icct52962.2021.9657885","relation":{},"subject":[],"published":{"date-parts":[[2021,10,13]]}}}