{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T12:58:50Z","timestamp":1765976330676,"version":"3.37.3"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Electron Test"],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1007\/s10836-019-05826-8","type":"journal-article","created":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T12:03:44Z","timestamp":1573041824000},"page":"605-619","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Count Your Toggles: a New Leakage Model for Pre-Silicon Power Analysis of Crypto Designs"],"prefix":"10.1007","volume":"35","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2922-9517","authenticated-orcid":false,"given":"Rajat","family":"Sadhukhan","sequence":"first","affiliation":[]},{"given":"Paulson","family":"Mathew","sequence":"additional","affiliation":[]},{"given":"Debapriya Basu","family":"Roy","sequence":"additional","affiliation":[]},{"given":"Debdeep","family":"Mukhopadhyay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,6]]},"reference":[{"unstructured":"Akkar ML, Bevan R, Dischamp P, Moyart D (2000). In: Okamoto T","key":"#cr-split#-5826_CR1.1"},{"unstructured":"(ed) Proc. advances in cryptology - ASIACRYPT 2000. Springer, Berlin, pp 489-502","key":"#cr-split#-5826_CR1.2"},{"doi-asserted-by":"publisher","unstructured":"Bayrak AG, Regazzoni F, Brisk P, Standaert F, Ienne P (2011). In: Proceedings of the 48th design automation conference, DAC 2011, San Diego, California, USA, June 5\u201310, 2011, pp 230\u2013235, DOI \nhttps:\/\/doi.org\/10.1145\/2024724.2024778\n\n, (to appear in print)","key":"5826_CR2","DOI":"10.1145\/2024724.2024778"},{"unstructured":"Brier E, Clavier C, Olivier F (2004). In: Joye M, Quisquater JJ (eds) Proc. cryptographic hardware and embedded systems - CHES 2004. Springer, Berlin, pp 16\u201329","key":"5826_CR3"},{"doi-asserted-by":"crossref","unstructured":"Chandrakasan AP, Brodersen RW (eds.) (1997) Low-power CMOS design, 1st edn. Wiley-IEEE Press","key":"5826_CR4","DOI":"10.1109\/9780470545058"},{"unstructured":"Goodwill G, Jun B, Jaffe J, Rohatgi P (2011)","key":"5826_CR5"},{"doi-asserted-by":"publisher","unstructured":"He MT, Park J, Nahiyan A, Vassilev A, Jin Y, Tehranipoor M (2019). In: Proc. 37th IEEE VLSI test symposium, VTS 2019, Monterey, CA, USA, April 23\u201325, 2019, pp 1\u20136, DOI \nhttps:\/\/doi.org\/10.1109\/VTS.2019.8758600\n\n, (to appear in print)","key":"5826_CR6","DOI":"10.1109\/VTS.2019.8758600"},{"key":"5826_CR7","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-642-42001-6_12","volume-title":"Lecture Notes in Computer Science","author":"Sorin A. Huss","year":"2013","unstructured":"Huss SA, St\u00f6ttinger M, Zohner M (2013). In: AMASIVE: an adaptable and modular autonomous side-channel vulnerability evaluation framework. Springer, Berlin, pp 151\u2013165, DOI \nhttps:\/\/doi.org\/10.1007\/978-3-642-42001-6_12\n\n, (to appear in print)"},{"key":"5826_CR8","doi-asserted-by":"publisher","first-page":"953","DOI":"10.1007\/978-3-642-17342-4","volume-title":"PRESENT\u2013 block cipher","author":"LR Knudsen","year":"2011","unstructured":"Knudsen LR, Leander G. (2011) PRESENT\u2013 block cipher. Springer, Boston, pp 953\u2013955"},{"unstructured":"Kocher P, Jaffe J, Jun B (1999). In: Wiener M (ed) Proc. advances in cryptology \u2014 CRYPTO\u2019 99. Springer, Berlin, pp 388\u2013397","key":"5826_CR9"},{"unstructured":"Liu H, Qian G, Goto S, Tsunoo Y (2011). In: Chung Y, Yung M (eds) Proc. Information security applications. Springer, Berlin, pp 191\u2013205","key":"5826_CR10"},{"unstructured":"Mangard S, Pramstaller N, Oswald E (2005). In: Rao JR, Sunar B (eds) Proc. Cryptographic hardware and embedded systems \u2013 CHES 2005. Springer, Berlin, pp 157\u2013171","key":"5826_CR11"},{"issue":"1","key":"5826_CR12","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.vlsi.2005.12.013","volume":"40","author":"E Peeters","year":"2007","unstructured":"Peeters E, Standaert FX, Quisquater JJ (2007) . Integr VLSI J 40(1):52. \nhttps:\/\/doi.org\/10.1016\/j.vlsi.2005.12.013","journal-title":"Integr VLSI J"},{"issue":"3","key":"5826_CR13","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1109\/TC.2018.2875746","volume":"68","author":"DB Roy","year":"2019","unstructured":"Roy DB, Bhasin S, Guilley S, Heuser A, Patranabis S, Mukhopadhyay D (2019) . IEEE Trans Comput 68(3):347. \nhttps:\/\/doi.org\/10.1109\/TC.2018.2875746","journal-title":"IEEE Trans Comput"},{"doi-asserted-by":"publisher","unstructured":"Sadhukhan R, Datta N, Mukhopadhyay D (2019). In: Proc. 32nd International conference on VLSI design and 2019 18th international conference on embedded systems, VLSID 2019, Delhi, India, January 5\u20139, 2019, pp 531\u2013532, DOI \nhttps:\/\/doi.org\/10.1109\/VLSID.2019.00121\n\n, (to appear in print)","key":"5826_CR14","DOI":"10.1109\/VLSID.2019.00121"},{"issue":"12","key":"5826_CR15","doi-asserted-by":"publisher","first-page":"2829","DOI":"10.1109\/TVLSI.2019.2925421","volume":"27","author":"Rajat Sadhukhan","year":"2019","unstructured":"Sadhukhan R, Datta N, Mukhopadhyay D (2019) IEEE Trans Very Large Scale Integr(VLSI) Syst, 1\u201313. \nhttps:\/\/doi.org\/10.1109\/TVLSI.2019.2925421","journal-title":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems"},{"doi-asserted-by":"crossref","unstructured":"Sakiyama K, Sasaki Y, Li Y (2015) Security of block ciphers: from algorithm design to hardware implementation, 1st edn. Wiley Publishing","key":"5826_CR16","DOI":"10.1002\/9781118660027"},{"unstructured":"Specification for the advanced encryption standard (aes). Federal Information Processin Standards Publication 197 (2001). \nhttp:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf","key":"5826_CR17"},{"unstructured":"Standaert FX, Malkin TG, Yung M (2009). In: Joux A","key":"#cr-split#-5826_CR18.1"},{"unstructured":"(ed) Proc. advances in cryptology - EUROCRYPT 2009. Springer, Berlin, pp 443-461","key":"#cr-split#-5826_CR18.2"},{"doi-asserted-by":"publisher","unstructured":"Veshchikov N, Guilley S (2017). In: Proc. 2017 IEEE European symposium on security and privacy, EuroS&P 2017, Paris, France, April 26\u201328, 2017, pp 51\u201359, DOI \nhttps:\/\/doi.org\/10.1109\/EuroSP.2017.31\n\n, (to appear in print)","key":"5826_CR19","DOI":"10.1109\/EuroSP.2017.31"},{"unstructured":"Zhou Y, Feng D (2005) Side-channel attacks: ten years after its publication and the impacts on cryptographic module security testing. \nhttp:\/\/eprint.iacr.org\/2005\/388\n\n. Zyb@is.iscas.ac.cn 13083 received 27 Oct 2005","key":"5826_CR20"}],"container-title":["Journal of Electronic Testing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-019-05826-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10836-019-05826-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-019-05826-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T00:13:57Z","timestamp":1604535237000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10836-019-05826-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":22,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,10]]}},"alternative-id":["5826"],"URL":"https:\/\/doi.org\/10.1007\/s10836-019-05826-8","relation":{},"ISSN":["0923-8174","1573-0727"],"issn-type":[{"type":"print","value":"0923-8174"},{"type":"electronic","value":"1573-0727"}],"subject":[],"published":{"date-parts":[[2019,10]]},"assertion":[{"value":"9 July 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 September 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 November 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}