{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T19:06:56Z","timestamp":1771614416294,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540284741","type":"print"},{"value":"9783540319405","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11545262_26","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T14:35:35Z","timestamp":1127831735000},"page":"354-365","source":"Crossref","is-referenced-by-count":103,"title":["Prototype IC with WDDL and Differential Routing \u2013 DPA Resistance Assessment"],"prefix":"10.1007","author":[{"given":"Kris","family":"Tiri","sequence":"first","affiliation":[]},{"given":"David","family":"Hwang","sequence":"additional","affiliation":[]},{"given":"Alireza","family":"Hodjat","sequence":"additional","affiliation":[]},{"given":"Bo-Cheng","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Shenglin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"Schaumont","sequence":"additional","affiliation":[]},{"given":"Ingrid","family":"Verbauwhede","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","unstructured":"Agilent technologies, 54542C 4 Channel 2 GSa\/s Color Digitizing Oscilloscope, http:\/\/www.home.agilent.com\/USeng\/nav\/-536894779.536881118\/pd.html"},{"key":"26_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/3-540-45472-1_12","volume-title":"Financial Cryptography","author":"J. Coron","year":"2001","unstructured":"Coron, J., Kocher, P., Naccache, D.: Statistics and Secret Leakage. In: Frankel, Y. (ed.) FC 2000. LNCS, vol.\u00a01962, pp. 157\u2013173. Springer, Heidelberg (2001)"},{"key":"26_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/978-3-540-45238-6_12","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"J. Fournier","year":"2003","unstructured":"Fournier, J., Moore, S., Li, H., Mullins, R., Taylor, G.: Security Evaluation of Asynchronous Circuits. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 137\u2013151. Springer, Heidelberg (2003)"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Hodjat, A., Hwang, D., Lai, B., Tiri, K., Verbauwhede, I.: A 3.84 Gbits\/s AES Crypto Coprocessor with Modes of Operation in a 0.18-\u03bcm CMOS Technology. In: accepted at Great Lakes Symposium on VLSI (GLSVLSI 2005) (April 2005)","DOI":"10.1145\/1057661.1057677"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Hwang, D., Schaumont, P., Fan, Y., Hodjat, A., Lai, B., Sakiyama, K., Yang, S., Verbauwhede, I.: Design flow for HW\/SW acceleration transparency in the ThumbPod secure embedded system. In: 40th Design Automation Conference (DAC 2003), pp. 60\u201365 (June 2003)","DOI":"10.1145\/775832.775850"},{"key":"26_CR6","unstructured":"Hwang, D., Schaumont, P., Tiri, K., Verbauwhede, I.: Making embedded systems secure. accepted at IEEE Security & Privacy Magazine"},{"key":"26_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/978-3-540-30574-3_24","volume-title":"Topics in Cryptology \u2013 CT-RSA 2005","author":"S. Mangard","year":"2005","unstructured":"Mangard, S., Popp, T., Gammel, B.: Side-Channel Leakage of Masked CMOS Gates. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol.\u00a03376, pp. 351\u2013365. Springer, Heidelberg (2005)"},{"key":"26_CR8","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1016\/S0141-9331(03)00092-9","volume":"27","author":"S. Moore","year":"2003","unstructured":"Moore, S., Anderson, R., Mullins, R., Taylor, G.: Balanced Self-Checking Asynchronous Logic for Smart Card Applications. Journal of Microprocessors and Microsystems\u00a027, 421\u2013430 (2003)","journal-title":"Journal of Microprocessors and Microsystems"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Pramstaller, N., G\u00fcrkaynak, F., H\u00e4ne, S., Kaeslin, H., Felber, N., Fichtner, W.: Towards an AES Crypto-chip Resistant to Differential Power Analysis. In: 30th European Solid-State Circuits Conference (ESSCIRC 2004), pp. 307\u2013310 (September 2004)","DOI":"10.1109\/ESSCIR.2004.1356679"},{"key":"26_CR10","unstructured":"Tektronix, CT1 current probe, http:\/\/www.tek.com\/site\/ps\/60-12572\/pdfs\/60W_12572.pdf"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Tiri, K., Verbauwhede, I.: A VLSI Design Flow for Secure Side-Channel Attack Resistant ICs. In: accepted at Design, Automation and Test in Europe Conference (DATE 2005) (March 2005)","DOI":"10.1109\/DATE.2005.44"},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Tiri, K., Verbauwhede, I.: Place and Route for Secure Standard Cell Design. In: 6th International Conference on Smart Card Research and Advanced Applications (CARDIS 2004), pp. 143\u2013158 (August 2004)","DOI":"10.1007\/1-4020-8147-2_10"},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Tiri, K., Verbauwhede, I.: A Logic Level Design Methodology for a Secure DPA Resistant ASIC or FPGA Implementation. In: Design, Automation and Test in Europe Conference (DATE 2004), pp. 246\u2013251 (February 2004)","DOI":"10.1109\/DATE.2004.1268856"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems \u2013 CHES 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11545262_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:18:41Z","timestamp":1605644321000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11545262_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540284741","9783540319405"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/11545262_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005]]}}}