{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:54:29Z","timestamp":1725472469929},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540496083"},{"type":"electronic","value":"9783540496106"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11937807_6","type":"book-chapter","created":{"date-parts":[[2006,11,8]],"date-time":"2006-11-08T13:56:48Z","timestamp":1162994208000},"page":"66-77","source":"Crossref","is-referenced-by-count":0,"title":["Designing Power Analysis Resistant and High Performance Block Cipher Coprocessor Using WDDL and Wave-Pipelining"],"prefix":"10.1007","author":[{"given":"Yuanman","family":"Tong","sequence":"first","affiliation":[]},{"given":"Zhiying","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Kui","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Hongyi","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P. Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"6_CR2","unstructured":"Mangard, S.: Securing Implementations of Block Ciphers against Side-Channel Attacks. IAIK, Graz University of Technology. Phd. Thesis (2004)"},{"key":"6_CR3","unstructured":"Schneider, H.: Analysis of the Resistance of Different Logic Styles Against SPA & DPA Attacks. IAIK, Graz University of Technology. Master\u2019s thesis (2003)"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Tiri, K., Verbauwhede, I.: A VLSI Design Flow for Secure Side-Channel Attack Resistant ICs. In: Design, Automation and Test in Europe, DATE 2005, vol.\u00a03, pp. 58\u201363 (2005)","DOI":"10.1109\/DATE.2005.44"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Tiri, K., Verbauwhede, I.: Place and Route for Secure Standard Cell Design. In: 6th International Conference on Smart Card Research and Advanced Applications, CARDIS 2004, pp. 143\u2013158 (2004)","DOI":"10.1007\/1-4020-8147-2_10"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Tiri, K., Verbauwhede, I.: A Logic Level Design Methodology for a Secure DPA Resistant ASIC or FPGA Implementation. In: Design, Automation and Test in Europe, DATE 2004, pp. 246\u2013251 (2004)","DOI":"10.1109\/DATE.2004.1268856"},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/43.184841","volume":"12","author":"D.C. Wong","year":"1993","unstructured":"Wong, D.C., De Micheli, G., Flynn, M.J.: Designing High-Performance Digital Circuits Using Wave Pipelining: Algorithms and Practical Experiences. IEEE Trans. On CAD of IC and Systems\u00a012, 25\u201346 (1993)","journal-title":"IEEE Trans. On CAD of IC and Systems"},{"key":"6_CR8","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1109\/92.711317","volume":"6","author":"W.P. Burleson","year":"1998","unstructured":"Burleson, W.P., Ciesielski, M., Klass, F., Liu, W.: Wave-Pipelining: A Tutorial and Research Survey. IEEE Trans. On VLSI Systems\u00a06, 464\u2013474 (1998)","journal-title":"IEEE Trans. On VLSI Systems"},{"key":"6_CR9","unstructured":"NIST: Data Encryption Standard. Federal Information Processing Standards Publication 46 (1977)"},{"key":"6_CR10","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"S. Thomas","year":"2002","unstructured":"Thomas, S., Messerges, E.A., Dabbish, R.H.: Sloan:Examining Smart-Card Security under the Threat of Power Analysis Attacks. IEEE Trans. on Computers\u00a051, 541\u2013552 (2002)","journal-title":"IEEE Trans. on Computers"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11937807_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:48:40Z","timestamp":1619509720000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11937807_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540496083","9783540496106"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/11937807_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}