{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:40:10Z","timestamp":1755880810319,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,10]],"date-time":"2024-05-10T00:00:00Z","timestamp":1715299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,10]]},"DOI":"10.1145\/3665348.3665374","type":"proceedings-article","created":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T18:25:40Z","timestamp":1720031140000},"page":"144-149","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Side-Channel Analysis of Curve-25519 Based on Deep Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-3045-0172","authenticated-orcid":false,"given":"Zongnan","family":"Zhang","sequence":"first","affiliation":[{"name":"College of Big Data and Internet, Shenzhen Technology University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7129-7265","authenticated-orcid":false,"given":"Meng","family":"Li","sequence":"additional","affiliation":[{"name":"College of Big Data and Internet, Shenzhen Technology University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9816-530X","authenticated-orcid":false,"given":"Xiaoxin","family":"An","sequence":"additional","affiliation":[{"name":"College of Big Data and Internet, Shenzhen Technology University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-5232-3414","authenticated-orcid":false,"given":"Zhen","family":"Li","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Shandong University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-0937-905X","authenticated-orcid":false,"given":"Zhe","family":"Ma","sequence":"additional","affiliation":[{"name":"Bank Card Test Center (BCTC), China"}]}],"member":"320","published-online":{"date-parts":[[2024,7,3]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"4th International Workshop","author":"Chari Suresh","year":"2002","unstructured":"Suresh Chari, Josyula R. Rao, and Pankaj Rohatgi. 2002. Template Attacks. Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers."},{"key":"e_1_3_2_1_2_1","volume-title":"International Joint Conference on Neural Networks.","author":"Picek Stjepan","year":"2017","unstructured":"Stjepan Picek, Annelie Heuser, Alan Jovic, Simone A. Ludwig, Sylvain Guilley, Domagoj Jakobovic, and Nele Mentens. 2017. Side-channel analysis and machine learning: A practical perspective. International Joint Conference on Neural Networks."},{"key":"e_1_3_2_1_3_1","volume-title":"Optimization of Power Analysis Using Neural Network. Smart Card Research and Advanced Application Conference. Springer","author":"Martinasek Zdenek","year":"2014","unstructured":"Zdenek Martinasek, Jan Hajny, and Lukas Malina. 2014. Optimization of Power Analysis Using Neural Network. Smart Card Research and Advanced Application Conference. Springer, Cham, 2013."},{"key":"e_1_3_2_1_4_1","first-page":"2016921","article-title":"Breaking Cryptographic Implementations Using Deep Learning Techniques","volume":"2016","author":"Maghrebi Houssem","year":"2016","unstructured":"Houssem Maghrebi, Thibault Portigliatti, and Emmanuel Prouff. 2016. Breaking Cryptographic Implementations Using Deep Learning Techniques. IACR Cryptology ePrint Archive, 2016, 2016921","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_5_1","volume-title":"Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures. International Conference on Cryptographic Hardware and Embedded Systems. Springer","author":"Cagli Eleonora","year":"2017","unstructured":"Eleonora Cagli, C\u00e9cile Dumas, and Emmanuel Prouff. 2017. Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures. International Conference on Cryptographic Hardware and Embedded Systems. Springer, Cham, 2017."},{"issue":"1","key":"e_1_3_2_1_6_1","first-page":"1","article-title":"Methodology for Efficient CNN Architectures in Profiling Attacks","volume":"2020","author":"Zaid Gabriel","year":"2020","unstructured":"Gabriel Zaid, Lilian Bossuet, Amaury Habrard, and Alexandre Venelli. 2020. Methodology for Efficient CNN Architectures in Profiling Attacks. IACR Transactions on Cryptographic Hardware and Embedded Systems ISSN 2569-2925, Vol. 2020, No. 1, pp. 1-36","journal-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems ISSN 2569-2925"},{"key":"e_1_3_2_1_7_1","first-page":"8246","volume-title":"Applied Sciences","author":"Lipeng Chang","year":"2022","unstructured":"Chang Lipeng, Wei Yuechuan, He Shuiyu, and Pan Xiaozhong. 2022. Research on Side-Channel Analysis Based on Deep Learning with Different Sample Data. Applied Sciences, 2022,12(16):8246-8246"},{"key":"e_1_3_2_1_8_1","first-page":"72","article-title":"A deep learning-based side channel attack model for different block ciphers","volume":"2023","author":"Lang Li","year":"2023","unstructured":"Li Lang and Ou Yu. 2023. A deep learning-based side channel attack model for different block ciphers. Journal of Computational Science, 2023, 72","journal-title":"Journal of Computational Science"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-05960-0_3"},{"volume-title":"2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).","author":"Loiseau Antoine","key":"e_1_3_2_1_10_1","unstructured":"Antoine Loiseau, Maxime Lecomte, and Jacques J. A. Fournier. 2020. Template Attacks against ECC: practical implementation against Curve25519. 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)."},{"key":"e_1_3_2_1_11_1","volume-title":"International Conference on Information Security and Cryptology. Springer","author":"Kim Jaeheon","year":"2019","unstructured":"Jaeheon Kim, Je Hong Park, Dong-Chan Kim, and Woo-Hwan Kim. 2019. Complete addition law for Montgomery curves. International Conference on Information Security and Cryptology. Springer, Cham, 2019: 260-277"},{"key":"e_1_3_2_1_12_1","volume-title":"High-speed implementation of ECC scalar multiplication in GF (p) for generic Montgomery curves","author":"Roy Debapriya Basu","year":"2019","unstructured":"Debapriya Basu Roy and Debdeep Mukhopadhyay. 2019. High-speed implementation of ECC scalar multiplication in GF (p) for generic Montgomery curves. IEEE transactions on very large scale integration (VLSI) systems, 2019, 27(7):1587-1600."},{"key":"e_1_3_2_1_13_1","volume-title":"5th International Conference on Information Security and Cryptology \u2015 ICISC 2002","author":"Mangard Stefan","year":"2002","unstructured":"Stefan Mangard. 2002. A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion. 5th International Conference on Information Security and Cryptology \u2015 ICISC 2002, Nov 28-29, 2002, Seoul, Korea. Institute for Applied Information Processing and Communications Graz University of Technology Inffeldgasse 16a, A-8010 Graz, Austria, 2002."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s13389-011-0006-y","article-title":"Introduction to differential power analysis","volume":"2011","author":"Paul Kocher","year":"2011","unstructured":"Kocher Paul, Jaffe Joshua, Jun Benjamin, and Rohatgi Pankaj. 2011. Introduction to differential power analysis. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2011, 1(01): 5-27.","journal-title":"JOURNAL OF CRYPTOGRAPHIC ENGINEERING"}],"event":{"name":"GAIIS 2024: 2024 International Conference on Generative Artificial Intelligence and Information Security","acronym":"GAIIS 2024","location":"Kuala Lumpur Malaysia"},"container-title":["Proceedings of the 2024 International Conference on Generative Artificial Intelligence and Information Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3665348.3665374","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3665348.3665374","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:22:04Z","timestamp":1755879724000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3665348.3665374"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,10]]},"references-count":14,"alternative-id":["10.1145\/3665348.3665374","10.1145\/3665348"],"URL":"https:\/\/doi.org\/10.1145\/3665348.3665374","relation":{},"subject":[],"published":{"date-parts":[[2024,5,10]]},"assertion":[{"value":"2024-07-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}