{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T15:28:43Z","timestamp":1746199723024},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811004506"},{"type":"electronic","value":"9789811004513"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-981-10-0451-3_50","type":"book-chapter","created":{"date-parts":[[2016,4,19]],"date-time":"2016-04-19T23:31:45Z","timestamp":1461108705000},"page":"555-567","source":"Crossref","is-referenced-by-count":3,"title":["Investigations of Power and EM Attacks on AES Implemented in FPGA"],"prefix":"10.1007","author":[{"given":"Arvind Kumar","family":"Singh","sequence":"first","affiliation":[]},{"given":"S. P.","family":"Mishra","sequence":"additional","affiliation":[]},{"given":"B. M.","family":"Suri","sequence":"additional","affiliation":[]},{"family":"Anu Khosla","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,21]]},"reference":[{"key":"50_CR1","unstructured":"Advanced Encryption Standard. http:\/\/en.wikipedia.org\/wiki\/Adavanced_Encryption_Standard"},{"key":"50_CR2","unstructured":"Stallings, W.: Cryptography and Network Security: Principles and Practice, 3rd edn. Prentice Hall, USA (2003)"},{"key":"50_CR3","unstructured":"Kocher, P.C.: Cryptanalysis of Diffie-Hellman, RSA, DSS, and other systems using timing attacks. In: Advances in Cryptology Conference, CRYPTO \u201895, pp. 171\u2013183 (1995)"},{"key":"50_CR4","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"Paul Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M., (ed.) CRYPTO 99. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"50_CR5","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1007\/3-540-45418-7_17","volume-title":"Smart Card Programming and Security","author":"Jean-Jacques Quisquater","year":"2001","unstructured":"Quisquater, J.-J., Samyde, D.: ElectroMagnetic analysis (EMA): measures and countermeasures for smart cards. In: International Conference on Research in Smart Cards\u2013E-smart 2001. LNCS, vol. 2140, pp. 200\u2013210. Springer, New York (2001)"},{"key":"50_CR6","unstructured":"Kang, S.-M., Leblebici, Y.: CMOS Digital Integrated Circuits: Analysis and Design. McGraw Hill, New York (2002)"},{"key":"50_CR7","doi-asserted-by":"crossref","unstructured":"Jaffe, J., Kocher, P.: Introduction to differential power analysis and related attacks. In: Cryptography Research, pp. 1\u20135 (1998)","DOI":"10.1007\/s13389-011-0006-y"},{"key":"50_CR8","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks. Springer, New York (2007)"},{"key":"50_CR9","unstructured":"Han, Y., Zou, X., Liu, Z., Chen Y.: Efficient DPA Attacks on AES Hardware Implementations. Int. J. Commun. Netw. Syst. Sci. 1(1), 1\u2013103 (2008)"},{"key":"50_CR10","first-page":"16","volume-title":"Lecture Notes in Computer Science","author":"Eric Brier","year":"2004","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: The Proceedings of CHES 2004. LNCS, vol. 3156, pp. 16\u201329. Springer, Hiedelberg (2004)"},{"key":"50_CR11","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/3-540-44709-1_21","volume-title":"Cryptographic Hardware and Embedded Systems \u2014 CHES 2001","author":"Karine Gandolfi","year":"2001","unstructured":"Gandolfi, K., Mourtel, C., Oliver F.: Electromagnetic analysis: concrete results. In: The Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems 2001 (CHES 2001), LNCS 2162 Paris, France, pp. 251\u2013261 (2001)"},{"key":"50_CR12","unstructured":"Mangard, S.: Exploiting radiated emissions\u2014EM attacks on cryptographic ICs. In: Proceedings of Austrochip (2003)"},{"key":"50_CR13","doi-asserted-by":"crossref","unstructured":"Agrawal, D., Archambeault, B., Rao, J., Rohatgi, P.: The EM side\u2013channel(s): attacks and assessment methodologies. In: Proceedings of Cryptographic Hardware and Embedded Systems\u2014CHES2002. LNCS, vol. 2523, pp. 29\u201345. Springer, New York (2002)","DOI":"10.1007\/3-540-36400-5_4"},{"key":"50_CR14","doi-asserted-by":"crossref","unstructured":"Berna Ors, S., Oswald, E., Preneel, B.: Power-Analysis Attacks on an FPGA\u2013First Experimental Results. CHES 2003, LNCS 2779, pp. 35\u201350, Springer, Heidelberg (2003)","DOI":"10.1007\/978-3-540-45238-6_4"},{"key":"50_CR15","doi-asserted-by":"crossref","unstructured":"Benhadjyoussef, N., Mestiri, H., Machhout, M., Tourki, R.: Implementation of CPA analysis against AES design on FPGA. In: 2nd International Conference on Communications and Information Technology (ICCIT), pp. 124\u2013128 (2012)","DOI":"10.1109\/ICCITechnol.2012.6285774"},{"key":"50_CR16","doi-asserted-by":"crossref","unstructured":"Ors, S.B., Gurkaynak, F., Oswald, E., Preneel, B.: Power-analysis attack on an ASIC AES implementation. In: The proceedings of ITCC 2004, Las Vegas, April 5\u20137 (2004)","DOI":"10.1109\/ITCC.2004.1286711"},{"issue":"3","key":"50_CR17","doi-asserted-by":"crossref","first-page":"25","DOI":"10.5815\/ijcnis.2013.03.03","volume":"5","author":"Hassen Mestiri","year":"2012","unstructured":"Mestiri, H., Benhadjyoussef, N., Machhout, M., Tourki, R.: A Comparative study of power consumption models for CPA attack. In: International Journal of Computer Network and Information Security, pp. 25\u201331 (2013)","journal-title":"International Journal of Computer Network and Information Security"},{"key":"50_CR18","unstructured":"Tope, K., Rane, A., Rohate, R., Nalawade, S.M.: Encryption and decryption using artificial neural network. Int. Adv. Res. J. Sci. Eng. Techn. 2(4) (2015)"},{"key":"50_CR19","doi-asserted-by":"crossref","unstructured":"Qaid, G.R., Talbar, S.N.: Encrypting image by using fuzzy logic algorithm. Int. J. Image Process. Vis. Sci. 2(1) (2013)","DOI":"10.47893\/IJIPVS.2013.1059"},{"key":"50_CR20","doi-asserted-by":"publisher","first-page":"821","DOI":"10.1007\/978-81-322-1771-8_71","volume":"258","author":"R Ratan","year":"2014","unstructured":"Ratan, R.: Application of Genetic algorithm in cryptology. Adv. Intell. Syst. Comput. 258, 821\u2013831 (2014)","journal-title":"Adv. Intell. Syst. Comput."}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of Fifth International Conference on Soft Computing for Problem Solving"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-0451-3_50","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,18]],"date-time":"2022-06-18T00:32:41Z","timestamp":1655512361000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-0451-3_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9789811004506","9789811004513"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-0451-3_50","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2016]]}}}