{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T13:10:02Z","timestamp":1748697002289,"version":"3.41.0"},"publisher-location":"New Delhi","reference-count":13,"publisher":"Springer India","isbn-type":[{"type":"print","value":"9788132226512"},{"type":"electronic","value":"9788132226536"}],"license":[{"start":{"date-parts":[[2015,11,19]],"date-time":"2015-11-19T00:00:00Z","timestamp":1447891200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-81-322-2653-6_13","type":"book-chapter","created":{"date-parts":[[2015,11,18]],"date-time":"2015-11-18T15:47:51Z","timestamp":1447861671000},"page":"189-198","source":"Crossref","is-referenced-by-count":0,"title":["CAD-Based Analysis of Power Distribution Network for SOC Design"],"prefix":"10.1007","author":[{"given":"Ayan","family":"Majumder","sequence":"first","affiliation":[]},{"given":"Moumita","family":"Chakraborty","sequence":"additional","affiliation":[]},{"given":"Krishnendu","family":"Guha","sequence":"additional","affiliation":[]},{"given":"Amlan","family":"Chakrabarti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,19]]},"reference":[{"key":"13_CR1","unstructured":"Pant, S.: Design and Analysis of Power Distribution networks in VLSI Circuits. Thesis report, The University of Michigan (2008)"},{"key":"13_CR2","unstructured":"Chakraborty, M., Guha, K., Chakrabarti, A., Saha, D.: Analysis of power distribution network for some cryptocores. In: Proceedings of International Conference on Advances in Computing, Communications and Informatics (ICACCI, 2014), pp 2618\u20132622 (2014)"},{"issue":"6","key":"13_CR3","doi-asserted-by":"publisher","first-page":"1087","DOI":"10.1109\/TED.2005.848125","volume":"52","author":"K Shakeri","year":"2005","unstructured":"Shakeri, K., Meindl, J.D.: Compact physical IR-drop models for chip\/package co-design of gigascale integration. IEEE Trans. Electron. Dev. 52(6), 1087\u20131096 (2005)","journal-title":"IEEE Trans. Electron. Dev."},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"DeHaven, K., Dietz, J.: Controlled collapse chip connection (C4)-an enabling technology. In: Proceedings of Electronic Components and Technology Conference, pp. 1\u20136 (1994)","DOI":"10.1109\/ECTC.1994.367660"},{"key":"13_CR5","unstructured":"Turnmula, R.R., Rymwzewski, E.J.: Microelectronics Packaging Handbook, pp. 366\u2013391. Van Nostrand Reinhold, NewYork ch. 6 (1989)"},{"key":"13_CR6","unstructured":"Andrade, D., Martorell, F., Moll, F., Rubio. A.: Voltage fluctuations. In: IC Power Supply Distribution Networks: Impact On Digital Processing Systems"},{"key":"13_CR7","unstructured":"Rabaey, J.M., Chandrakasan, A., Nikolic. B.: Digital Integrated Circuits a Design Perspective, 2nd edn. ISBN: 0130909963"},{"issue":"3","key":"13_CR8","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1109\/96.704931","volume":"21","author":"H.H. Chen","year":"1998","unstructured":"Chen, H.H., Neely, J.S.: Interconnect and circuit modeling techniques for full-chip power supply noise analysis. In: IEEE Trans. Compon. Packag. Manuf. 21(3), 209\u2013215 (1998)","journal-title":"IEEE Transactions on Components, Packaging, and Manufacturing Technology: Part B"},{"key":"13_CR9","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/s10470-005-6761-x","volume":"42","author":"A Ajami","year":"2005","unstructured":"Ajami, A., Banerjee, K., Pedram, M.: Scaling analysis of on-chip power grid voltage variations in nanometerscale ULSI. Analog Integr. Circ. Sig. Process 42, 277\u2013290 (2005)","journal-title":"Analog Integr. Circ. Sig. Process"},{"key":"13_CR10","unstructured":"https:\/\/filebox.ece.vt.edu\/~mhsiao\/iscas85.html"},{"key":"13_CR11","first-page":"13","volume-title":"Advances in Intelligent Systems and Computing","author":"Krishnendu Guha","year":"2015","unstructured":"Guha, K., Sahani, R.R., Chakraborty, M., Chakrabarti, A.: Analysis of secret key revealing trojan using path delay analysis for some cryptocores. In: Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, Advances in Intelligent Systems and Computing, vol. 328, pp 13\u201320 (2015)"},{"key":"13_CR12","unstructured":"Stallings, W.: Cryptography and Network Security, 3rd edn. Prentice Hall (2003). ISBN: 0-13-11 1502-2"},{"key":"13_CR13","unstructured":"Forouzan, B., Mukhopadhyay, D.: Cryptography and Network Security, 2nd edn. Mc Graw Hill. ISBN: 978-0-07-070208-0"}],"container-title":["Advances in Intelligent Systems and Computing","Advanced Computing and Systems for Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-2653-6_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T12:45:42Z","timestamp":1748695542000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-81-322-2653-6_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,19]]},"ISBN":["9788132226512","9788132226536"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-2653-6_13","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015,11,19]]}}}