{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:54:54Z","timestamp":1742928894956,"version":"3.40.3"},"publisher-location":"New York, NY","reference-count":31,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461479147"},{"type":"electronic","value":"9781461479154"}],"license":[{"start":{"date-parts":[[2013,9,13]],"date-time":"2013-09-13T00:00:00Z","timestamp":1379030400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,9,13]],"date-time":"2013-09-13T00:00:00Z","timestamp":1379030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-1-4614-7915-4_5","type":"book-chapter","created":{"date-parts":[[2013,9,12]],"date-time":"2013-09-12T08:10:18Z","timestamp":1378973418000},"page":"95-116","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Hardware and VLSI Designs"],"prefix":"10.1007","author":[{"given":"Mario","family":"Kirschbaum","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Plos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,9,13]]},"reference":[{"key":"5_CR1","unstructured":"Aeroflex Gaisler. The Aeroflex Gaisler Website. http:\/\/www.gaisler.com\/."},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, and B. Sunar. Trojan Detection using IC Fingerprinting. In IEEE Symposium on Security and Privacy (SP \u201907), Berkeley, Californie, USA, May 20\u201323 2007, pages 296\u2013310, 2007.","DOI":"10.1109\/SP.2007.36"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"D. Canright and L. Batina. A Very Compact \u201dPerfectly Masked\u201d S-Box for AES. In Applied Cryptography and Network Security - ACNS 2008, New York, USA, June 3\u20136, 2008, Proceedings, volume 5037 of Lecture Notes in Computer Science, pages 446\u2013459. Springer, 2008.","DOI":"10.1007\/978-3-540-68914-0_27"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"M. Feldhofer, J. Wolkerstorfer, and V. Rijmen. AES Implementation on a Grain of Sand. IEE Proceedings on Information Security, 152(1):13\u201320, October 2005.","DOI":"10.1049\/ip-ifs:20055006"},{"key":"5_CR5","unstructured":"Gaisler Research. LEON2 Processor Users Manual. XST Edition. [Online] http:\/\/www.gaisler.com\/doc\/leon2-1.0.30-xst.pdf, July 2005. Version 1.0.30."},{"issue":"12","key":"5_CR6","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/MC.1983.1654264","volume":"16","author":"D. Gajski","year":"1983","unstructured":"D. Gajski and R. H. Kuhn. New VLSI Tools - Guest Eidtors\u2019 Introduction. IEEE Computer, 16(12):11\u201314, 1983.","journal-title":"IEEE Computer"},{"key":"5_CR7","unstructured":"A. Hodjat and I. Verbauwhede. Interfacing a High Speed Crypto Accelerator to an Embedded CPU. In Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems, and Computers, 2004, volume 1, pages 488\u2013492. IEEE, November 2004."},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"H. Kaeslin. Digital Integrated Circuit Design - From VLSI Architectures to CMOS Fabrication. Cambridge University Press, 2008. ISBN 978-0-521-88267-5.","DOI":"10.1017\/CBO9780511805172"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"P. C. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In N. Koblitz, editor, Advances in Cryptology - CRYPTO \u201996, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18\u201322, 1996, Proceedings, number 1109 in Lecture Notes in Computer Science, pages 104\u2013113. Springer, 1996.","DOI":"10.1007\/3-540-68697-5_9"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"P. C. Kocher, J. Jaffe, and B. Jun. Differential Power Analysis. In M. Wiener, editor, Advances in Cryptology - CRYPTO \u201999, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15\u201319, 1999, Proceedings, volume 1666 of Lecture Notes in Computer Science, pages 388\u2013397. Springer, 1999.","DOI":"10.1007\/3-540-48405-1_25"},{"key":"5_CR11","unstructured":"O. K\u00f6mmerling and M. G. Kuhn. Design Principles for Tamper-Resistant Smartcard Processors. In Proceedings of the 1st USENIX Workshop on Smartcard Technology (Smartcard \u201999), Chicago, Illinois, USA, May 10\u201311, 1999, pages 9\u201320, McCormick Place South, May 1999. USENIX Association. ISBN 1-880446-34-0."},{"issue":"4","key":"5_CR12","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1109\/TC.2003.1190589","volume":"52","author":"S. Mangard","year":"2003","unstructured":"S. Mangard, M. Aigner, and S. Dominikus. A Highly Regular and Scalable AES Hardware Architecture. IEEE Transactions on Computers, 52(4):483\u2013491, April 2003.","journal-title":"IEEE Transactions on Computers,"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"S. Mangard, T. Popp, and B. M. Gammel. Side-Channel Leakage of Masked CMOS Gates. In A. Menezes, editor, Topics in Cryptology - CT-RSA 2005, The Cryptographers\u2019 Track at the RSA Conference 2005, San Francisco, CA, USA, February 14\u201318, 2005, Proceedings, volume 3376 of Lecture Notes in Computer Science, pages 351\u2013365. Springer, February 2005.","DOI":"10.1007\/978-3-540-30574-3_24"},{"key":"5_CR14","unstructured":"National Institute of Standards and Technology (NIST). FIPS PUB 140\u20131: Security Requirements for Cryptographic Modules, 1994. [Online] http:\/\/www.itl.nist.gov\/fipspubs\/."},{"key":"5_CR15","unstructured":"National Institute of Standards and Technology (NIST). FIPS-197: Advanced Encryption Standard, November 2001. [Online] http:\/\/www.itl.nist.gov\/fipspubs\/."},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"T. Popp, M. Kirschbaum, T. Zefferer, and S. Mangard. Evaluation of the Masked Logic Style MDPL on a Prototype Chip. In P. Paillier and I. Verbauwhede, editors, Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10\u201313, 2007, Proceedings, volume 4727 of Lecture Notes in Computer Science, pages 81\u201394. Springer, September 2007. ISBN 978-3-540-74734-5.","DOI":"10.1007\/978-3-540-74735-2_6"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"T. Popp and S. Mangard. Masked Dual-Rail Pre-Charge Logic: DPA-Resistance without Routing Constraints. In J. R. Rao and B. Sunar, editors, Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29\u2013September\u00a01, 2005, Proceedings, volume 3659 of Lecture Notes in Computer Science, pages 172\u2013186. Springer, 2005.","DOI":"10.1007\/11545262_13"},{"key":"5_CR18","unstructured":"J. M. Rabaey. The SPICE Home Page. http:\/\/bwrc.eecs.berkeley.edu\/Classes\/IcBook\/SPICE\/."},{"key":"5_CR19","unstructured":"J. M. Rabaey. Digital Integrated Circuits - A Design Perspective.  Electronics and VLSI Series. Prentice Hall, 1st edition, 1996. ISBN 0-13-178609-1."},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"P. Schaumont and K. Tiri. Masking and Dual-Rail Logic Dont Add Up. In P. Paillier and I. Verbauwhede, editors, Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10\u201313, 2007, Proceedings, volume 4727 of Lecture Notes in Computer Science, pages 95\u2013106. Springer, September 2007.","DOI":"10.1007\/978-3-540-74735-2_7"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"D. Suzuki, M. Saeki, and T. Ichikawa. Random Switching Logic: A New Countermeasure against DPA and Second-Order DPA at the Logic Level. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E90-A(1):160\u2013168, 2007. ISSN 0916\u20138508.","DOI":"10.1093\/ietfec\/e90-a.1.160"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"S. Tillich and J. Gro\u00dfsch\u00e4dl. Instruction Set Extensions for Efficient AES Implementation on 32-bit Processors. In L. Goubin and M. Matsui, editors, Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10\u201313, 2006, Proceedings, volume 4249 of Lecture Notes in Computer Science, pages 270\u2013284. Springer, 2006.","DOI":"10.1007\/11894063_22"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"S. Tillich and J. Gro\u00dfsch\u00e4dl. Power-Analysis Resistant AES Implementation with Instruction Set Extensions. In P. Paillier and I. Verbauwhede, editors, Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10\u201313, 2007, Proceedings, volume 4727 of Lecture Notes in Computer Science, pages 303\u2013319. Springer, September 2007.","DOI":"10.1007\/978-3-540-74735-2_21"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"S. Tillich, M. Kirschbaum, and A. Szekely. SCA-Resistant Embedded Processors - The Next Generation. In C. Gates, M. Franz, and J. P. McDermott, editors, 26th Annual Computer Security Applications Conference (ACSAC 2010), 6\u201310 December 2010, Austin, Texas, USA, pages 211\u2013220. ACM Press, 2010.","DOI":"10.1145\/1920261.1920293"},{"key":"5_CR25","unstructured":"K. Tiri and P. Schaumont. Changing the Odds against Masked Logic. In E. Biham and A. M.Youssef, editors, Selected Areas in Cryptography, 13th International Workshop, SAC 2006, Montreal, Quebec, Canada, August 17\u201318, 2006, Revised Selected Papers, volume 4356 of Lecture Notes in Computer Science, pp. 134\u2013146. Springer, 2007. [Online] http:\/\/rijndael.ece.vt.edu\/schaum\/papers\/2006sac.pdf."},{"key":"5_CR26","unstructured":"X. Wang, M. Tehranipoor, and J. Plusquellic. Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions. In M. Tehranipoor and J. Plusquellic, editors, Hardware-Oriented Security and Trust (HOST 2008), Anaheim, CA, June 9 2008, Proceedings, pages 15\u201319, 2008."},{"key":"5_CR27","unstructured":"N. H. E. Weste and D. Harris. CMOS VLSI Design\u2014A Circuits and Systems Perspective. Addison-Wesley, 3rd edition, May 2004. ISBN 0-321-14901-7."},{"key":"5_CR28","doi-asserted-by":"crossref","unstructured":"F. G. Wolff, C. A. Papachristou, S. Bhunia, and R. S. Chakraborty. Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme. In Design, Automation and Test in Europe (DATE), 10\u201314 March, 2008, 2008.","DOI":"10.1109\/DATE.2008.4484928"},{"key":"5_CR29","unstructured":"B. Yang, K. Wu, and R. Karri. Scan Based Side Channel Attack on Dedicated Hardware Implementations of Data Encryption Standard. In Proceedings of the International Test Conference on International Test Conference, CCS \u201905, pages 139\u2013146, New York, NY, USA, 2005. ACM."},{"issue":"10","key":"5_CR30","doi-asserted-by":"crossref","first-page":"2287","DOI":"10.1109\/TCAD.2005.862745","volume":"25","author":"B. Yang","year":"2006","unstructured":"B. Yang, K. Wu, and R. Karri. Secure Scan: A Design-for-Test Architecture for Crypto Chips. IEEE Trans. on CAD of Integrated Circuits and Systems, 25(10):2287\u20132293, 2006.","journal-title":"IEEE Trans. on CAD of Integrated Circuits and Systems"},{"key":"5_CR31","unstructured":"P. Yu and P. Schaumont. Secure FPGA circuits using controlled placement and routing. In Proceedings of the 5th IEEE\/ACM international conference on Hardware\/software codesign and system synthesis, Salzburg, Austria, September 30 - October 5, 2007, pages 45\u201350. ACM Press, September 2007. ISBN 978-1-59593-824-4."}],"container-title":["Secure Smart Embedded Devices, Platforms and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-7915-4_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,17]],"date-time":"2023-02-17T21:09:47Z","timestamp":1676668187000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4614-7915-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,13]]},"ISBN":["9781461479147","9781461479154"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-7915-4_5","relation":{},"subject":[],"published":{"date-parts":[[2013,9,13]]},"assertion":[{"value":"13 September 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}