{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T16:45:28Z","timestamp":1751388328434,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["1801341"],"award-info":[{"award-number":["1801341"]}]},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["2101085"],"award-info":[{"award-number":["2101085"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1145\/3569562.3569564","type":"proceedings-article","created":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T04:09:08Z","timestamp":1695355748000},"page":"10-17","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Side-Channel Analysis and Countermeasure Design for Implementation of Curve448 on Cortex-M4"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1311-8679","authenticated-orcid":false,"given":"Mojtaba","family":"Bisheh-Niasar","sequence":"first","affiliation":[{"name":"Florida Atlantic University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-3530-7024","authenticated-orcid":false,"given":"Mila","family":"Anastasova","sequence":"additional","affiliation":[{"name":"Florida Atlantic University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-8032-6012","authenticated-orcid":false,"given":"Abubakr","family":"Abdulgadir","sequence":"additional","affiliation":[{"name":"PQSecure Technologies, LLC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0069-9061","authenticated-orcid":false,"given":"Hwajeong","family":"Seo","sequence":"additional","affiliation":[{"name":"Hansung University, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6921-6868","authenticated-orcid":false,"given":"Reza","family":"Azarderakhsh","sequence":"additional","affiliation":[{"name":"Florida Atlantic University, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,9,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90022-9_24"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/HOST54066.2022.9839742"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Lejla Batina Lukasz Chmielewski Bj\u00f6rn Haase Niels Samwel and Peter Schwabe. 2021. SCA-secure ECC in software - mission impossible?IACR Cryptol. ePrint Arch. (2021) 1003.  Lejla Batina Lukasz Chmielewski Bj\u00f6rn Haase Niels Samwel and Peter Schwabe. 2021. SCA-secure ECC in software - mission impossible?IACR Cryptol. ePrint Arch. (2021) 1003.","DOI":"10.46586\/tches.v2023.i1.557-589"},{"key":"e_1_3_2_1_4_1","unstructured":"Georg\u00a0T. Becker Jim Cooper Elizabeth\u00a0K. DeMulder Gilbert Goodwill Joshua Jaffe Gary Kenworthy T. Kouzminov Andrew\u00a0J. Leiserson Mark\u00a0E. Marson Pankaj Rohatgi and Sami Saab. 2013. Test Vector Leakage Assessment (TVLA) methodology in practice.  Georg\u00a0T. Becker Jim Cooper Elizabeth\u00a0K. DeMulder Gilbert Goodwill Joshua Jaffe Gary Kenworthy T. Kouzminov Andrew\u00a0J. Leiserson Mark\u00a0E. Marson Pankaj Rohatgi and Sami Saab. 2013. Test Vector Leakage Assessment (TVLA) methodology in practice."},{"key":"e_1_3_2_1_5_1","volume-title":"Bernstein and Tanja Lange","author":"J.","year":"2011","unstructured":"Daniel\u00a0 J. Bernstein and Tanja Lange . 2011 . Security dangers of the NIST curves. Daniel\u00a0J. Bernstein and Tanja Lange. 2011. Security dangers of the NIST curves."},{"key":"e_1_3_2_1_6_1","unstructured":"D.\u00a0J. Bernstein and T. Lange.2016. SafeCurves: choosing safe curves for elliptic-curve cryptography. url:\u00a0https:\/\/safecurves.cr.yp.to\/..  D.\u00a0J. Bernstein and T. Lange.2016. SafeCurves: choosing safe curves for elliptic-curve cryptography. url:\u00a0https:\/\/safecurves.cr.yp.to\/.."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-65277-7_10"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2021.3068136"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2021.3077885"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARITH48897.2020.00019"},{"key":"e_1_3_2_1_11_1","volume-title":"Draft NIST Special Publication","author":"Chen Lily","year":"2019","unstructured":"Lily Chen , Dustin Moody , Andrew Regenscheid , and Karen Randall . 2019. Recommendations for Discrete Logarithm-Based Cryptography: Elliptic Curve Domain Parameters. Computer Security , Draft NIST Special Publication , National Institute of Standards and Technology 800-186 ( 2019 ). Lily Chen, Dustin Moody, Andrew Regenscheid, and Karen Randall. 2019. Recommendations for Discrete Logarithm-Based Cryptography: Elliptic Curve Domain Parameters. Computer Security, Draft NIST Special Publication, National Institute of Standards and Technology 800-186 (2019)."},{"key":"e_1_3_2_1_12_1","volume-title":"CHIPWHISPERER","author":"New Technology Inc.","year":"2021","unstructured":"[ 12 ] New Technology Inc. : CHIPWHISPERER . 2021 . url:\u00a0https:\/\/www.newae.com\/chipwhisperer. [12] New Technology Inc.: CHIPWHISPERER. 2021. url:\u00a0https:\/\/www.newae.com\/chipwhisperer."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Jean-S\u00e9bastien Coron. 1999 Worcester MA USA. Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems. In Cryptographic Hardware and Embedded Systems CHES\u201999 \u00c7etin\u00a0Kaya Ko\u00e7 and Christof Paar (Eds.). 292\u2013302.  Jean-S\u00e9bastien Coron. 1999 Worcester MA USA. Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems. In Cryptographic Hardware and Embedded Systems CHES\u201999 \u00c7etin\u00a0Kaya Ko\u00e7 and Christof Paar (Eds.). 292\u2013302.","DOI":"10.1007\/3-540-48059-5_25"},{"key":"e_1_3_2_1_14_1","volume-title":"CARDIS 2017","author":"Ding Adam","year":"2017","unstructured":"A.\u00a0 Adam Ding , Liwei Zhang , Fran\u00e7ois Durvaux , Fran\u00e7ois-Xavier Standaert , and Yunsi Fei . 2017 . Towards Sound and Optimal Leakage Detection Procedure. In Smart Card Research and Advanced Applications - 16th International Conference , CARDIS 2017 , Lugano, Switzerland , November 13-15, 2017, Revised Selected Papers(Lecture Notes in Computer Science, Vol.\u00a010728). Springer, 105\u2013122. A.\u00a0Adam Ding, Liwei Zhang, Fran\u00e7ois Durvaux, Fran\u00e7ois-Xavier Standaert, and Yunsi Fei. 2017. Towards Sound and Optimal Leakage Detection Procedure. In Smart Card Research and Advanced Applications - 16th International Conference, CARDIS 2017, Lugano, Switzerland, November 13-15, 2017, Revised Selected Papers(Lecture Notes in Computer Science, Vol.\u00a010728). Springer, 105\u2013122."},{"key":"e_1_3_2_1_15_1","volume-title":"State-of-the-art of Secure ECC Implementations: A Survey on Known Side-channel Attacks and Countermeasures. In HOST2010","author":"Fan Junfeng","year":"2010","unstructured":"Junfeng Fan , Xu Guo , Elke\u00a0De Mulder , Patrick Schaumont , Bart Preneel , and Ingrid Verbauwhede . 2010 . State-of-the-art of Secure ECC Implementations: A Survey on Known Side-channel Attacks and Countermeasures. In HOST2010 , 13-14 June 2010, California, USA. 76\u201387. Junfeng Fan, Xu Guo, Elke\u00a0De Mulder, Patrick Schaumont, Bart Preneel, and Ingrid Verbauwhede. 2010. State-of-the-art of Secure ECC Implementations: A Survey on Known Side-channel Attacks and Countermeasures. In HOST2010, 13-14 June 2010, California, USA. 76\u201387."},{"key":"e_1_3_2_1_16_1","volume-title":"Progress in Cryptology - LATINCRYPT 2017","author":"Fujii Hayato","year":"2017","unstructured":"Hayato Fujii and Diego\u00a0 F. Aranha . 2017 . Curve25519 for the Cortex-M4 and Beyond . In Progress in Cryptology - LATINCRYPT 2017 , Havana, Cuba , September 20-22, 2017, Tanja Lange and Orr Dunkelman (Eds.). Vol.\u00a011368. Springer, 109\u2013127. Hayato Fujii and Diego\u00a0F. Aranha. 2017. Curve25519 for the Cortex-M4 and Beyond. In Progress in Cryptology - LATINCRYPT 2017, Havana, Cuba, September 20-22, 2017, Tanja Lange and Orr Dunkelman (Eds.). Vol.\u00a011368. Springer, 109\u2013127."},{"key":"e_1_3_2_1_17_1","first-page":"625","article-title":"Ed448-Goldilocks, a new elliptic curve","volume":"2015","author":"Hamburg Mike","year":"2015","unstructured":"Mike Hamburg . 2015 . Ed448-Goldilocks, a new elliptic curve . IACR Cryptology ePrint Archive 2015 (2015), 625 . Mike Hamburg. 2015. Ed448-Goldilocks, a new elliptic curve. IACR Cryptology ePrint Archive 2015 (2015), 625.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_18_1","volume-title":"CHES2017 rump session","author":"Hasse B","year":"2017","unstructured":"B Hasse . 2017 . Memory bandwidth influence makes Cortex M4 benchmarking difficult . CHES2017 rump session (2017). B Hasse. 2017. Memory bandwidth influence makes Cortex M4 benchmarking difficult. CHES2017 rump session (2017)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"A. Langley M. Hamburg and S. Turner. 2016. Elliptic Curves for Security.  A. Langley M. Hamburg and S. Turner. 2016. Elliptic Curves for Security.","DOI":"10.17487\/RFC7748"},{"key":"e_1_3_2_1_20_1","unstructured":"Emill Lenngren. 2021. P256-Cortex-M4. url:\u00a0https:\/\/github.com\/Emill\/P256-Cortex-M4.  Emill Lenngren. 2021. P256-Cortex-M4. url:\u00a0https:\/\/github.com\/Emill\/P256-Cortex-M4."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Zhe Liu Patrick Longa Geovandro C. C.\u00a0F. Pereira Oscar Reparaz and Hwajeong Seo. 2017. FourQ on embedded devices with strong countermeasures against side-channel attacks. IACR Cryptol. ePrint Arch. (2017) 434.  Zhe Liu Patrick Longa Geovandro C. C.\u00a0F. Pereira Oscar Reparaz and Hwajeong Seo. 2017. FourQ on embedded devices with strong countermeasures against side-channel attacks. IACR Cryptol. ePrint Arch. (2017) 434.","DOI":"10.1007\/978-3-319-66787-4_32"},{"key":"e_1_3_2_1_22_1","unstructured":"Mike Hamburg. 2015. Ed448-Goldilocks A new high-strength curve and implementation. url:\u00a0https:\/\/csrc.nist.gov\/csrc\/media\/events\/workshop-on-elliptic-curve-cryptography-standards\/documents\/presentations\/session7-hamburg-michael.pdf.  Mike Hamburg. 2015. Ed448-Goldilocks A new high-strength curve and implementation. url:\u00a0https:\/\/csrc.nist.gov\/csrc\/media\/events\/workshop-on-elliptic-curve-cryptography-standards\/documents\/presentations\/session7-hamburg-michael.pdf."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866113-7"},{"key":"e_1_3_2_1_24_1","first-page":"259","article-title":"Practical Evaluation of Protected Residue Number System Scalar Multiplication","volume":"2019","author":"Papachristodoulou Louiza","year":"2019","unstructured":"Louiza Papachristodoulou , Apostolos\u00a0 P. Fournaris , Kostas Papagiannopoulos , and Lejla Batina . 2019 . Practical Evaluation of Protected Residue Number System Scalar Multiplication . IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019 , 1 (2019), 259 \u2013 282 . Louiza Papachristodoulou, Apostolos\u00a0P. Fournaris, Kostas Papagiannopoulos, and Lejla Batina. 2019. Practical Evaluation of Protected Residue Number System Scalar Multiplication. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019, 1 (2019), 259\u2013282.","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8446"},{"key":"e_1_3_2_1_26_1","volume-title":"International Conference on Smart Card Research and Advanced Applications. Springer.","author":"Roche Thomas","year":"2019","unstructured":"Thomas Roche , Laurent Imbert , and Victor Lomn\u00e9 . 2019 . Side-channel attacks on blinded scalar multiplications revisited . In International Conference on Smart Card Research and Advanced Applications. Springer. Thomas Roche, Laurent Imbert, and Victor Lomn\u00e9. 2019. Side-channel attacks on blinded scalar multiplications revisited. In International Conference on Smart Card Research and Advanced Applications. Springer."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2700834"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062222"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-018-0048-z"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.2018-0445"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-68890-5_7"},{"key":"e_1_3_2_1_32_1","unstructured":"ST. 2020. STM32F405xx STM32F407xx Datasheet - production data.  ST. 2020. STM32F405xx STM32F407xx Datasheet - production data."},{"key":"e_1_3_2_1_33_1","unstructured":"Hannes Tschofenig and Manuel Pegourie-Gonnard. 2015. Performance of State-of-the-Art Cryptography on ARM-based Microprocessors.  Hannes Tschofenig and Manuel Pegourie-Gonnard. 2015. Performance of State-of-the-Art Cryptography on ARM-based Microprocessors."},{"key":"e_1_3_2_1_34_1","unstructured":"Michael Tunstall and Gilbert Goodwill. 2016. Applying TVLA to Public Key Cryptographic Algorithms. IACR Cryptol. ePrint Arch. (2016) 513.  Michael Tunstall and Gilbert Goodwill. 2016. Applying TVLA to Public Key Cryptographic Algorithms. IACR Cryptol. ePrint Arch. (2016) 513."}],"event":{"name":"HASP '22: Hardware and Architectural Support for Security and Privacy","acronym":"HASP '22","location":"Chicago IL USA"},"container-title":["Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3569562.3569564","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3569562.3569564","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3569562.3569564","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:57Z","timestamp":1750182537000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3569562.3569564"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10]]},"references-count":34,"alternative-id":["10.1145\/3569562.3569564","10.1145\/3569562"],"URL":"https:\/\/doi.org\/10.1145\/3569562.3569564","relation":{},"subject":[],"published":{"date-parts":[[2022,10]]},"assertion":[{"value":"2023-09-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}