{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:34:19Z","timestamp":1774539259305,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T00:00:00Z","timestamp":1477267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/"}],"funder":[{"name":"Blavatnik Interdisciplinary Cyber Research Center"},{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","award":["Faculty Research Award (Tromer)"],"award-info":[{"award-number":["Faculty Research Award (Tromer)"]}],"id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007028","name":"Leona M. and Harry B. Helmsley Charitable Trust","doi-asserted-by":"publisher","award":["Advanced Communication Technology Project"],"award-info":[{"award-number":["Advanced Communication Technology Project"]}],"id":[{"id":"10.13039\/100007028","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007615","name":"Australian Research Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100007615","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Australian Department of Communications"},{"name":"sraeli Centers of Research Excellence I-CORE program","award":["Center 4\/11"],"award-info":[{"award-number":["Center 4\/11"]}]},{"name":"NATO's Public Diplomacy Division","award":["Science for Peace"],"award-info":[{"award-number":["Science for Peace"]}]},{"name":"Check Point Institute for Information Security"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978353","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T12:46:35Z","timestamp":1477399595000},"page":"1626-1638","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":128,"title":["ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels"],"prefix":"10.1145","author":[{"given":"Daniel","family":"Genkin","sequence":"first","affiliation":[{"name":"Technion and Tel Aviv University, Haifa and Tel Aviv, Israel"}]},{"given":"Lev","family":"Pachmanov","sequence":"additional","affiliation":[{"name":"Tel Aviv University, Tel Aviv, Israel"}]},{"given":"Itamar","family":"Pipman","sequence":"additional","affiliation":[{"name":"Tel Aviv University, Tel Aviv, Israel"}]},{"given":"Eran","family":"Tromer","sequence":"additional","affiliation":[{"name":"Tel Aviv University, Tel Aviv, Israel"}]},{"given":"Yuval","family":"Yarom","sequence":"additional","affiliation":[{"name":"The University of Adelaide and Data61, CSIRO, Adelaide, Australia"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Bitcoin Core. URL: https:\/\/bitcoin.org\/en\/bitcoin-core\/. Bitcoin Core. URL: https:\/\/bitcoin.org\/en\/bitcoin-core\/."},{"key":"e_1_3_2_1_2_1","unstructured":"CoreBitcoin Library. URL: https:\/\/github.com\/oleganza\/CoreBitcoin. CoreBitcoin Library. URL: https:\/\/github.com\/oleganza\/CoreBitcoin."},{"key":"e_1_3_2_1_3_1","unstructured":"Working with micropayment channels. URL: https:\/\/bitcoinj.github.io\/working-with-micropayments. Working with micropayment channels. URL: https:\/\/bitcoinj.github.io\/working-with-micropayments."},{"key":"e_1_3_2_1_4_1","volume-title":"Workshop on Cryptographic Hardware and Embedded Systems (CHES) CHES 2012 rump session. URL: https:\/\/www.cosic.esat.kuleuven.be\/ches2012\/ches_rump\/rs5.pdf.","unstructured":"SPA\/SEMA vulnerabilities of popular RSA-CRT sliding window implementations, 2012 . presented at Workshop on Cryptographic Hardware and Embedded Systems (CHES) CHES 2012 rump session. URL: https:\/\/www.cosic.esat.kuleuven.be\/ches2012\/ches_rump\/rs5.pdf. SPA\/SEMA vulnerabilities of popular RSA-CRT sliding window implementations, 2012. presented at Workshop on Cryptographic Hardware and Embedded Systems (CHES) CHES 2012 rump session. URL: https:\/\/www.cosic.esat.kuleuven.be\/ches2012\/ches_rump\/rs5.pdf."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2011.6123131"},{"key":"e_1_3_2_1_6_1","first-page":"29","volume-title":"Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2002","author":"Agrawal D.","year":"2002","unstructured":"D. Agrawal , B. Archambeault , J. R. Rao , and P. Rohatgi . The EM side-channel(s) . In Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2002 , pages 29 -- 45 . Springer , 2002 . D. Agrawal, B. Archambeault, J. R. Rao, and P. Rohatgi. The EM side-channel(s). In Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2002, pages 29--45. Springer, 2002."},{"key":"e_1_3_2_1_7_1","unstructured":"M. Albrecht S. Bai D. Cad\u00e9 X. Pujol and D. Stehl\u00e9. fplll-4.0 a floating-point LLL implementation. URL: http:\/\/perso.ens-lyon.fr\/damien.stehle. M. Albrecht S. Bai D. Cad\u00e9 X. Pujol and D. Stehl\u00e9. fplll-4.0 a floating-point LLL implementation. URL: http:\/\/perso.ens-lyon.fr\/damien.stehle."},{"key":"e_1_3_2_1_9_1","volume-title":"Security Engineering -- A Guide to Building Dependable Distributed Systems","author":"Anderson R. J.","year":"2008","unstructured":"R. J. Anderson . Security Engineering -- A Guide to Building Dependable Distributed Systems ( 2 nd ed.). Wiley , 2008 . R. J. Anderson. Security Engineering -- A Guide to Building Dependable Distributed Systems (2nd ed.). Wiley, 2008.","edition":"2"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48051-9_1"},{"key":"e_1_3_2_1_11_1","unstructured":"Apple Inc. Cryptographic libraries. URL: https:\/\/developer.apple.com\/cryptography\/. Apple Inc. Cryptographic libraries. URL: https:\/\/developer.apple.com\/cryptography\/."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45611-8_14"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_30"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29485-8_14"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_5"},{"key":"e_1_3_2_1_17_1","unstructured":"D. J. Bernstein. Cache-timing attacks on AES. http:\/\/cr.yp.to\/papers.html#cachetiming 2005. D. J. Bernstein. Cache-timing attacks on AES. http:\/\/cr.yp.to\/papers.html#cachetiming 2005."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/646761.706148"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10366-7_39"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/2041225.2041252"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.01.010"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39927-8_32"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/648254.752555"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/648252.752381"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2010.5513110"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/2184081.2184103"},{"key":"e_1_3_2_1_27_1","first-page":"620","volume-title":"Cryptographic Hardware and Embedded Systems (CHES) CHES 2015","author":"Galea J. L.","year":"2015","unstructured":"J. L. Galea , E. D. Mulder , D. Page , and M. Tunstall . Soc it to EM: electromagnetic side-channel attacks on a complex system-on-chip . In Cryptographic Hardware and Embedded Systems (CHES) CHES 2015 , pages 620 -- 640 . Springer , 2015 . J. L. Galea, E. D. Mulder, D. Page, and M. Tunstall. Soc it to EM: electromagnetic side-channel attacks on a complex system-on-chip. In Cryptographic Hardware and Embedded Systems (CHES) CHES 2015, pages 620--640. Springer, 2015."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/648254.752700"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_11"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29485-8_13"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_14"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_25"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21476-4_17"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34913-3"},{"key":"e_1_3_2_1_35_1","article-title":"Singular spectrum analysis: Methodology and comparison","author":"Hassani H.","year":"2007","unstructured":"H. Hassani . Singular spectrum analysis: Methodology and comparison . J. of Data Science, (5):239--257 , 2007 . H. Hassani. Singular spectrum analysis: Methodology and comparison. J. of Data Science, (5):239--257, 2007.","journal-title":"J. of Data Science, (5):239--257"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02384-2_21"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29889-9_4"},{"key":"e_1_3_2_1_38_1","volume-title":"Mobile Security Technologies (MoST) MoST 2012","author":"Kenworthy G.","year":"2012","unstructured":"G. Kenworthy and P. Rohatgi . Mobile device security: The case for side channel resistance . In Mobile Security Technologies (MoST) MoST 2012 , 2012 . G. Kenworthy and P. Rohatgi. Mobile device security: The case for side channel resistance. In Mobile Security Technologies (MoST) MoST 2012, 2012."},{"key":"e_1_3_2_1_39_1","volume-title":"Window Length Selection and Signal-Noise Separation and Reconstruction in Singular Spectrum Analysis. Monash Econometrics and Business Statistics Working Papers 23\/11","author":"Khan M. A. R.","year":"2011","unstructured":"M. A. R. Khan and D. Poskitt . Window Length Selection and Signal-Noise Separation and Reconstruction in Singular Spectrum Analysis. Monash Econometrics and Business Statistics Working Papers 23\/11 , Monash University , Department of Econometrics and Business Statistics, 2011 . URL: https:\/\/ideas.repec.org\/p\/msh\/ebswps\/2011--23.html. M. A. R. Khan and D. Poskitt. Window Length Selection and Signal-Noise Separation and Reconstruction in Singular Spectrum Analysis. Monash Econometrics and Business Statistics Working Papers 23\/11, Monash University, Department of Econometrics and Business Statistics, 2011. URL: https:\/\/ideas.repec.org\/p\/msh\/ebswps\/2011--23.html."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-011-0006-y"},{"key":"e_1_3_2_1_41_1","volume-title":"ARMageddon: Last-level cache attacks on mobile devices. CoRR, abs\/1511.04897","author":"Lipp M.","year":"2015","unstructured":"M. Lipp , D. Gruss , R. Spreitzer , and S. Mangard . ARMageddon: Last-level cache attacks on mobile devices. CoRR, abs\/1511.04897 , 2015 . http:\/\/arxiv.org\/abs\/1511.04897. M. Lipp, D. Gruss, R. Spreitzer, and S. Mangard. ARMageddon: Last-level cache attacks on mobile devices. CoRR, abs\/1511.04897, 2015. http:\/\/arxiv.org\/abs\/1511.04897."},{"key":"e_1_3_2_1_42_1","volume-title":"Power Analysis Attacks -- Revealing the Secrets of Smart Cards","author":"Mangard S.","year":"2007","unstructured":"S. Mangard , E. Oswald , and T. Popp . Power Analysis Attacks -- Revealing the Secrets of Smart Cards . Springer , 2007 . S. Mangard, E. Oswald, and T. Popp. Power Analysis Attacks -- Revealing the Secrets of Smart Cards. Springer, 2007."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/646557.694753"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/648025.744357"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43826-8_6"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.FIPS.186-4","volume-title":"Digital Signature Standard (DSS)","author":"National Institute of Standards and Technology.","year":"2013","unstructured":"National Institute of Standards and Technology. Digital Signature Standard (DSS) , 2013 . National Institute of Standards and Technology. Digital Signature Standard (DSS), 2013."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/2008684.2008687"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025436905711"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_1"},{"key":"e_1_3_2_1_50_1","unstructured":"C. Percival. Cache missing for fun and profit. Presented at BSDCan. http:\/\/www.daemonology.net\/hyperthreading-considered-harmful 2005. C. Percival. Cache missing for fun and profit. Presented at BSDCan. http:\/\/www.daemonology.net\/hyperthreading-considered-harmful 2005."},{"key":"e_1_3_2_1_51_1","first-page":"3","volume-title":"RSA Conference Cryptographers' Track (CT-RSA) CT-RSA 2015","author":"J.","year":"2015","unstructured":"J. VANPolvan de PolVan de Pol, N. P. Smart, and Y. Yarom. Just a little bit more . In RSA Conference Cryptographers' Track (CT-RSA) CT-RSA 2015 , pages 3 -- 21 , 2015 . J.VANPolvan de PolVan de Pol, N. P. Smart, and Y. Yarom. Just a little bit more. In RSA Conference Cryptographers' Track (CT-RSA) CT-RSA 2015, pages 3--21, 2015."},{"key":"e_1_3_2_1_52_1","first-page":"6979","article-title":"Deterministic usage of the digital signature algorithm (DSA) and elliptic curve digital signature algorithm (ECDSA)","author":"Pornin T.","year":"2013","unstructured":"T. Pornin . Deterministic usage of the digital signature algorithm (DSA) and elliptic curve digital signature algorithm (ECDSA) . RFC 6979 , 2013 . T. Pornin. Deterministic usage of the digital signature algorithm (DSA) and elliptic curve digital signature algorithm (ECDSA). RFC 6979, 2013.","journal-title":"RFC"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_3"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.5555\/646803.705980"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0065-2458(08)60610-5"},{"key":"e_1_3_2_1_56_1","volume-title":"What are micropayments and how does Bitcoin enable them?","author":"Smith C.","year":"2015","unstructured":"C. Smith . What are micropayments and how does Bitcoin enable them? , 2015 . URL : https:\/\/coincenter.org\/2015\/06\/what-are-micropayments-and-how-does-bitcoin-enable-them\/. C. Smith. What are micropayments and how does Bitcoin enable them?, 2015. URL: https:\/\/coincenter.org\/2015\/06\/what-are-micropayments-and-how-does-bitcoin-enable-them\/."},{"key":"e_1_3_2_1_57_1","unstructured":"P. Wuille. libsecp256k1. URL: https:\/\/github.com\/bitcoin\/secp256k1. P. Wuille. libsecp256k1. URL: https:\/\/github.com\/bitcoin\/secp256k1."},{"key":"e_1_3_2_1_58_1","unstructured":"P. Wuille. Dealing with malleability 2014. URL: https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0062.mediawiki. P. Wuille. Dealing with malleability 2014. URL: https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0062.mediawiki."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2014.2300139"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978353","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978353","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:40:14Z","timestamp":1750218014000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978353"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":57,"alternative-id":["10.1145\/2976749.2978353","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978353","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}