{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T03:49:52Z","timestamp":1725853792439},"publisher-location":"Singapore","reference-count":6,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811004506"},{"type":"electronic","value":"9789811004513"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-981-10-0451-3_49","type":"book-chapter","created":{"date-parts":[[2016,4,19]],"date-time":"2016-04-19T23:31:45Z","timestamp":1461108705000},"page":"541-554","source":"Crossref","is-referenced-by-count":2,"title":["Differential Power Attack on Trivium Implemented on FPGA"],"prefix":"10.1007","author":[{"family":"Akash Gupta","sequence":"first","affiliation":[]},{"given":"Surya Prakesh","family":"Mishra","sequence":"additional","affiliation":[]},{"given":"Brij Mohan","family":"Suri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,21]]},"reference":[{"key":"49_CR1","unstructured":"Recberger, Ch., Oswald, E.: Stream Ciphers and Side-Channel Analysis. In: SASC 2004\u2014The State of the Art of Stream Ciphers (Brugge, Belgium, October 14\u201315, 2004), Workshop Record, pp. 320\u2013326 (2004). http:\/\/www.ecrypt.eu.org\/stvl\/sasc\/record.html"},{"key":"49_CR2","doi-asserted-by":"crossref","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener M.J. (ed.) Advances in Cryptology\u2014CRYPTO\u201999, Lecture Notes in CS, vol. 1666, pp. 388\u2013397, Springer-Verlag (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"key":"49_CR3","doi-asserted-by":"crossref","unstructured":"Bartkewitz, T., Lemke-Rust, K.: Efficient template attack on probabilistic multi-class support vector machines. Springer (2013)","DOI":"10.1007\/978-3-642-37288-9_18"},{"key":"49_CR4","doi-asserted-by":"crossref","unstructured":"Mohamed, M.S.E., Bulygin, B., Buchmann.: In: COSADE 2011 on the Improved Differential Fault Analysis of Trivium, Darmstadt, Germany, 24\u201325 Feb 2011","DOI":"10.1007\/978-3-642-23141-4_7"},{"key":"49_CR5","doi-asserted-by":"crossref","unstructured":"Fischer, W., Gammel, M., Kniffler, O., Velten J.: Differential Power Analysis of Stream Ciphers. LNCS 4377, pp. 257\u2013270. Springer-Verlag (2007)","DOI":"10.1007\/11967668_17"},{"key":"49_CR6","doi-asserted-by":"crossref","unstructured":"De Canniere, C., Preneel, B.: Trivium. In: New Stream Cipher Designs: The eSTREAM Finalists, pp. 244\u2013266 (2008)","DOI":"10.1007\/978-3-540-68351-3_18"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of Fifth International Conference on Soft Computing for Problem Solving"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-0451-3_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,18]],"date-time":"2022-06-18T00:32:26Z","timestamp":1655512346000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-0451-3_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9789811004506","9789811004513"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-0451-3_49","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2016]]}}}