{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T13:40:29Z","timestamp":1772631629763,"version":"3.50.1"},"reference-count":70,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T00:00:00Z","timestamp":1761523200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T00:00:00Z","timestamp":1761523200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Electron Test"],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s10836-025-06201-6","type":"journal-article","created":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T06:14:20Z","timestamp":1761545660000},"page":"37-56","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Beyond Power Side Channels: Impedance as a Cryptographic Threat"],"prefix":"10.1007","volume":"42","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1635-3324","authenticated-orcid":false,"given":"Md Sadik","family":"Awal","sequence":"first","affiliation":[]},{"given":"Buddhipriya","family":"Gayanath","sequence":"additional","affiliation":[]},{"given":"Md Tauhidur","family":"Rahman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,27]]},"reference":[{"issue":"2","key":"6201_CR1","doi-asserted-by":"publisher","first-page":"15","DOI":"10.3390\/cryptography4020015","volume":"4","author":"M Randolph","year":"2020","unstructured":"Randolph M, Diehl W (2020) Power side-channel attack analysis: a review of 20 years of study for the layman. Cryptography 4(2):15","journal-title":"Cryptography"},{"key":"6201_CR2","doi-asserted-by":"crossref","unstructured":"Gattu N, Khan MNI, De A, Ghosh S (2020) Power side channel attack analysis and detection. In: Proceedings of the 39th international conference on computer-aided design, pp 1\u20137","DOI":"10.1145\/3400302.3415692"},{"key":"6201_CR3","doi-asserted-by":"crossref","unstructured":"Del\u00a0Pozo SM, Standaert F-X, Kamel D, Moradi A (2015) Side-channel attacks from static power: When should we care? In: 2015 Design, automation & test in europe conference & exhibition (DATE), IEEE, pp 145\u2013150","DOI":"10.7873\/DATE.2015.0712"},{"key":"6201_CR4","doi-asserted-by":"crossref","unstructured":"Das D, Nath M, Ghosh S, Sen S (2020) Killing em side-channel leakage at its source. In: 2020 IEEE 63rd International midwest symposium on circuits and systems (MWSCAS), IEEE, pp 1108\u20131111","DOI":"10.1109\/MWSCAS48704.2020.9184657"},{"key":"6201_CR5","doi-asserted-by":"crossref","unstructured":"Sehatbakhsh N, Yilmaz BB, Zajic A, Prvulovic M (2020) Emsim: A microarchitecture-level simulation tool for modeling electromagnetic side-channel signals. In: 2020 IEEE International symposium on high performance computer architecture (HPCA), IEEE, pp 71\u201385","DOI":"10.1109\/HPCA47549.2020.00016"},{"key":"6201_CR6","doi-asserted-by":"crossref","unstructured":"Agrawal D, Archambeault B, Rao JR, Rohatgi P (2003) The em side\u2014channel (s). In: Cryptographic hardware and embedded systems-CHES 2002: 4th international workshop redwood shores, CA, USA, August 13\u201315, 2002 Revised Papers 4, Springer, pp 29\u201345","DOI":"10.1007\/3-540-36400-5_4"},{"key":"6201_CR7","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.mejo.2017.02.004","volume":"62","author":"Z Hameed","year":"2017","unstructured":"Hameed Z, Moez K (2017) Design of impedance matching circuits for rf energy harvesting systems. Microelectron J 62:49\u201356","journal-title":"Microelectron J"},{"key":"6201_CR8","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/s10836-013-5430-8","volume":"30","author":"U Guin","year":"2014","unstructured":"Guin U, DiMase D, Tehranipoor M (2014) Counterfeit integrated circuits: detection, avoidance, and the challenges ahead. J Electron Test 30:9\u201323","journal-title":"J Electron Test"},{"key":"6201_CR9","doi-asserted-by":"publisher","first-page":"490","DOI":"10.1109\/JRFID.2022.3196662","volume":"6","author":"MS Awal","year":"2022","unstructured":"Awal MS, Madanayake A, Rahman MT (2022) Nearfield rf sensing for feature-detection and algorithmic classification of tamper attacks. IEEE J Radio Frequency Identification 6:490\u2013499","journal-title":"IEEE J Radio Frequency Identification"},{"key":"6201_CR10","doi-asserted-by":"crossref","unstructured":"Zhu H, Shan H, Sullivan D, Guo X, Jin Y, Zhang X (2023) Pdnpulse: Sensing pcb anomaly with the intrinsic power delivery network. IEEE Trans Inf Forensics Sec","DOI":"10.1109\/TIFS.2023.3285490"},{"key":"6201_CR11","doi-asserted-by":"publisher","unstructured":"Awal MS, Rahman MT (2025) Impedance leakage vulnerability and its utilization in reverse-engineering embedded software. J Emerg Technol Comput Syst. https:\/\/doi.org\/10.1145\/3764931. Just Accepted","DOI":"10.1145\/3764931"},{"key":"6201_CR12","doi-asserted-by":"crossref","unstructured":"Awal MS, Thompson C, Rahman MT (2022) Utilization of impedance disparity incurred from switching activities to monitor and characterize firmware activities. In: 2022 IEEE Physical assurance and inspection of electronics (PAINE), IEEE, pp 1\u20137","DOI":"10.1109\/PAINE56030.2022.10014924"},{"key":"6201_CR13","doi-asserted-by":"crossref","unstructured":"Monfared SK, Mosavirik T, Tajik S (2023) Leakyohm: Secret bits extraction using impedance analysis. In: Proceedings of the 2023 ACM SIGSAC conference on computer and communications security, pp 1675\u20131689","DOI":"10.1145\/3576915.3623092"},{"key":"6201_CR14","doi-asserted-by":"crossref","unstructured":"Kabin I, Dyka Z, Sigourou A-A, Langendoerfer P (2024) Static power consumption as a new side-channel analysis threat to elliptic curve cryptography implementations. In: 2024 IEEE International conference on cyber security and resilience (CSR), pp 884\u2013889","DOI":"10.1109\/CSR61664.2024.10679507"},{"key":"6201_CR15","doi-asserted-by":"crossref","unstructured":"Moos T, Moradi A, Richter B (2019) Static power side-channel analysis\u2014an investigation of measurement factors. IEEE Trans Very Large Scale Integration (VLSI) Syst 28(2):376\u2013389","DOI":"10.1109\/TVLSI.2019.2948141"},{"key":"6201_CR16","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/s41635-020-00093-y","volume":"4","author":"LN Nguyen","year":"2020","unstructured":"Nguyen LN, Cheng C-L, Werner FT, Prvulovic M, Zajic A (2020) A comparison of backscattering, em, and power side-channels and their performance in detecting software and hardware intrusions. J Hardware Syst Sec 4:150\u2013165","journal-title":"J Hardware Syst Sec"},{"key":"6201_CR17","doi-asserted-by":"crossref","unstructured":"Satoh A, Morioka S, Takano K, Munetoh S (2001) A compact rijndael hardware architecture with s-box optimization. In: International conference on the theory and application of cryptology and information security, Springer, pp 239\u2013254","DOI":"10.1007\/3-540-45682-1_15"},{"key":"6201_CR18","doi-asserted-by":"crossref","unstructured":"Barrera A, Cheng C-W, Kumar S (2020) A fast implementation of the rijndael substitution box for cryptographic aes. In: 2020 3rd International conference on data intelligence and security (ICDIS), IEEE, pp 20\u201325","DOI":"10.1109\/ICDIS50059.2020.00009"},{"key":"6201_CR19","doi-asserted-by":"publisher","unstructured":"Dworkin M, Barker E, Nechvatal J, Foti J, Bassham L, Roback E, Dray J (2001) Advanced Encryption Standard (AES). Federal Inf. Process. Stds. (NIST FIPS), National Institute of Standards and Technology, Gaithersburg, MD. https:\/\/doi.org\/10.6028\/NIST.FIPS.197","DOI":"10.6028\/NIST.FIPS.197"},{"key":"6201_CR20","doi-asserted-by":"crossref","unstructured":"Awal MS, Rahman MT (2023) Disassembling software instruction types through impedance side-channel analysis. In: 2023 IEEE International symposium on hardware oriented security and trust (HOST), IEEE, pp 227\u2013237","DOI":"10.1109\/HOST55118.2023.10133318"},{"key":"6201_CR21","unstructured":"Pozar DM (2021) Microwave engineering: theory and techniques. John wiley & sons"},{"key":"6201_CR22","doi-asserted-by":"publisher","unstructured":"Nguyen LN, Yilmaz BB, Prvulovic M, Zajic A (2020) A novel golden-chip-free clustering technique using backscattering side channel for hardware trojan detection. In: 2020 IEEE International symposium on hardware oriented security and trust (HOST), pp 1\u201312. https:\/\/doi.org\/10.1109\/HOST45689.2020.9300127","DOI":"10.1109\/HOST45689.2020.9300127"},{"key":"6201_CR23","doi-asserted-by":"crossref","unstructured":"Zhu H, Guo X, Jin Y, Zhang X (2020) Powerscout: A security-oriented power delivery network modeling framework for cross-domain side-channel analysis. In: 2020 Asian hardware oriented security and trust symposium (AsianHOST), IEEE, pp 1\u20136","DOI":"10.1109\/AsianHOST51057.2020.9358263"},{"key":"6201_CR24","doi-asserted-by":"crossref","unstructured":"Das S, Whatmough P, Bull D (2015) Modeling and characterization of the system-level power delivery network for a dual-core arm cortex-a57 cluster in 28nm cmos. In: 2015 IEEE\/ACM International symposium on low power electronics and design (ISLPED), IEEE, pp 146\u2013151","DOI":"10.1109\/ISLPED.2015.7273505"},{"key":"6201_CR25","doi-asserted-by":"crossref","unstructured":"Zhu H, Cao W, Zhang X (2023) Pdnsig: Identifying multi-tenant cloud fpgas with power distribution network-based signatures. In: 2023 IEEE\/ACM International conference on computer aided design (ICCAD), IEEE, pp 1\u20138","DOI":"10.1109\/ICCAD57390.2023.10323545"},{"key":"6201_CR26","doi-asserted-by":"publisher","first-page":"46573","DOI":"10.1109\/ACCESS.2021.3067644","volume":"9","author":"MA Akram","year":"2021","unstructured":"Akram MA, Hwang I-C, Ha S (2021) Power delivery networks for embedded mobile socs: architectural advancements and design challenges. IEEE Access 9:46573\u201346588","journal-title":"IEEE Access"},{"key":"6201_CR27","doi-asserted-by":"crossref","unstructured":"Moon S, Nam S, Son J, Lee SLS (2018) An approach for pdn simplification of a mobile processor. In: 2018 IEEE 68th Electronic components and technology conference (ECTC), IEEE, pp 1706\u20131711","DOI":"10.1109\/ECTC.2018.00256"},{"issue":"4","key":"6201_CR28","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1109\/TCPMT.2021.3065690","volume":"11","author":"K Radhakrishnan","year":"2021","unstructured":"Radhakrishnan K, Swaminathan M, Bhattacharyya BK (2021) Power delivery for high-performance microprocessors\u2013challenges, solutions, and future trends. IEEE Trans Components Packaging Manufac Technol 11(4):655\u2013671","journal-title":"IEEE Trans Components Packaging Manufac Technol"},{"key":"6201_CR29","doi-asserted-by":"publisher","unstructured":"Brier E, Clavier C, Olivier F (2004) Correlation power analysis with a leakage model 3156:16\u201329. https:\/\/doi.org\/10.1007\/978-3-540-28632-5_2","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"6201_CR30","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/3-540-36552-4_24","volume-title":"Information Security and Cryptology \u2013 ICISC 2002","author":"S Mangard","year":"2003","unstructured":"Mangard S (2003) A simple power-analysis (spa) attack on implementations of the aes key expansion. In: Lee PJ, Lim CH (eds) Information Security and Cryptology \u2013 ICISC 2002. Springer, Berlin, Heidelberg, pp 343\u2013358"},{"key":"6201_CR31","doi-asserted-by":"publisher","unstructured":"Ambrose JA, Aldon N, Ignjatovic A, Parameswaran S (2008) Anatomy of differential power analysis for aes. In: 2008 10th International symposium on symbolic and numeric algorithms for scientific computing, pp 459\u2013466. https:\/\/doi.org\/10.1109\/SYNASC.2008.8","DOI":"10.1109\/SYNASC.2008.8"},{"key":"6201_CR32","doi-asserted-by":"publisher","unstructured":"Han Y, Zou X, Zhenglin L, Chen Y-c (2008) The research of dpa attacks against aes implementations. J China Universities Posts Telecommun 15:101\u2013106. https:\/\/doi.org\/10.1016\/S1005-8885(08)60412-4","DOI":"10.1016\/S1005-8885(08)60412-4"},{"issue":"2","key":"6201_CR33","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1080\/23742917.2016.1231523","volume":"1","author":"O Lo","year":"2017","unstructured":"Lo O, Buchanan WJ, Carson D (2017) Power analysis attacks on the aes-128 s-box using differential power analysis (dpa) and correlation power analysis (cpa). J Cyber Sec Technol 1(2):88\u2013107","journal-title":"J Cyber Sec Technol"},{"key":"6201_CR34","doi-asserted-by":"publisher","unstructured":"Nuradha FR, Putra SD, Kurniawan Y, Rizqulloh MA (2019) Attack on aes encryption microcontroller devices with correlation power analysis. In: 2019 International symposium on electronics and smart devices (ISESD), pp 1\u20134. https:\/\/doi.org\/10.1109\/ISESD.2019.8909447","DOI":"10.1109\/ISESD.2019.8909447"},{"key":"6201_CR35","doi-asserted-by":"publisher","unstructured":"Ors SB, Gurkaynak F, Oswald E, Preneel B (2004) Power-analysis attack on an asic aes implementation. In: International conference on information technology: coding and computing, 2004. Proceedings. ITCC 2004., vol. 2, pp. 546\u20135522. https:\/\/doi.org\/10.1109\/ITCC.2004.1286711","DOI":"10.1109\/ITCC.2004.1286711"},{"key":"6201_CR36","doi-asserted-by":"publisher","unstructured":"Jayasinghe D, Ragel R, Ambrose JA, Ignjatovic A, Parameswaran S (2014) Advanced modes in aes: Are they safe from power analysis based side channel attacks? In: 2014 IEEE 32nd International conference on computer design (ICCD), pp 173\u2013180. https:\/\/doi.org\/10.1109\/ICCD.2014.6974678","DOI":"10.1109\/ICCD.2014.6974678"},{"key":"6201_CR37","doi-asserted-by":"publisher","first-page":"496","DOI":"10.1016\/j.future.2017.06.004","volume":"83","author":"S Fahd","year":"2018","unstructured":"Fahd S, Afzal M, Abbas H, Iqbal W, Waheed S (2018) Correlation power analysis of modes of encryption in aes and its countermeasures. Futur Gener Comput Syst 83:496\u2013509","journal-title":"Futur Gener Comput Syst"},{"key":"6201_CR38","doi-asserted-by":"publisher","unstructured":"Nguyen LN, Cheng C-L, Prvulovic M, Zaji\u0107 A (2019) Creating a backscattering side channel to enable detection of dormant hardware trojans. IEEE Trans Very Large Scale Integration (VLSI) Syst 27(7):1561\u20131574. https:\/\/doi.org\/10.1109\/TVLSI.2019.2906547","DOI":"10.1109\/TVLSI.2019.2906547"},{"key":"6201_CR39","unstructured":"Okamoto K, Amano T, Iokibe K, Toyota Y (2012) Identification of equivalent current source of cryptographic circuit based on impedance and current measurements at board level. In: 2012 Proceedings of SICE annual conference (SICE), IEEE, pp 73\u201378"},{"key":"6201_CR40","doi-asserted-by":"crossref","unstructured":"Cheng C-L, Sangodoyin S, Nguyen LN, Prvulovic M, Zaji\u0107 A (2020) Digital electronics as rfid tags: Impedance estimation and propagation characterization at 26.5 ghz and 300 ghz. IEEE J Radio Frequency Identification 5(1):29\u201339","DOI":"10.1109\/JRFID.2020.3015798"},{"key":"6201_CR41","unstructured":"Weste NH, Harris D (2015) CMOS VLSI design: a circuits and systems perspective. Pearson Education India"},{"issue":"4","key":"6201_CR42","doi-asserted-by":"publisher","first-page":"962","DOI":"10.1109\/TPEL.2009.2030201","volume":"25","author":"H Fujita","year":"2009","unstructured":"Fujita H (2009) A resonant gate-drive circuit capable of high-frequency and high-efficiency operation. IEEE Trans Power Electron 25(4):962\u2013969","journal-title":"IEEE Trans Power Electron"},{"key":"6201_CR43","unstructured":"Wei Z, Xu W, Zhekun P, Bo P, DongHyun K (2021) Voltage-dependency effect of through-silicon vias on the power distribution network. In: DesignCon"},{"issue":"8","key":"6201_CR44","doi-asserted-by":"publisher","first-page":"1399","DOI":"10.1109\/TCPMT.2013.2261932","volume":"3","author":"M-S Zhang","year":"2013","unstructured":"Zhang M-S, Tan H-Z, Mao J-F (2013) New power distribution network design method for digital systems using time-domain transient impedance. IEEE Trans Components Packaging Manufact Technol 3(8):1399\u20131408","journal-title":"IEEE Trans Components Packaging Manufact Technol"},{"issue":"3","key":"6201_CR45","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1109\/TCPMT.2022.3149810","volume":"12","author":"C Zhi","year":"2022","unstructured":"Zhi C, Dong G, Zhu Z, Yang Y (2022) Time-domain power distribution network (pdn) analysis for 3-d integrated circuits based on wlp-fdtd. IEEE Trans Components Packaging Manufact Technol 12(3):551\u2013561","journal-title":"IEEE Trans Components Packaging Manufact Technol"},{"key":"6201_CR46","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/s13389-017-0162-9","volume":"8","author":"L Lerman","year":"2018","unstructured":"Lerman L, Poussier R, Markowitch O, Standaert F-X (2018) Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version. J Cryptogr Eng 8:301\u2013313","journal-title":"J Cryptogr Eng"},{"key":"6201_CR47","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103383","volume":"87","author":"T Kubota","year":"2021","unstructured":"Kubota T, Yoshida K, Shiozaki M, Fujino T (2021) Deep learning side-channel attack against hardware implementations of aes. Microprocess Microsyst 87:103383","journal-title":"Microprocess Microsyst"},{"key":"6201_CR48","doi-asserted-by":"crossref","unstructured":"Chari S, Rao JR, Rohatgi P (2003) Template attacks. In: Cryptographic Hardware and Embedded Systems-CHES 2002: 4th International workshop redwood shores, CA, USA, August 13\u201315, 2002 Revised Papers 4, Springer, pp 13\u201328","DOI":"10.1007\/3-540-36400-5_3"},{"key":"6201_CR49","doi-asserted-by":"crossref","unstructured":"Selvam R, Tyagi A (2021) Power distribution network capacitive decoupling for side-channel resistance. In: 2021 IEEE International symposium on smart electronic systems (iSES), IEEE, pp 183\u2013188","DOI":"10.1109\/iSES52644.2021.00051"},{"key":"6201_CR50","doi-asserted-by":"crossref","unstructured":"Ding F, Li H, Luo F, Hu H, Cheng L, Xiao H, Ge R (2020) Deeppower: Non-intrusive and deep learning-based detection of iot malware using power side channels. In: Proceedings of the 15th ACM Asia conference on computer and communications security, pp 33\u201346","DOI":"10.1145\/3320269.3384727"},{"key":"6201_CR51","unstructured":"Ahmadi MM, Alrahis L, Sinanoglu O, Shafique M (2023) Dnn-alias: Deep neural network protection against side-channel attacks via layer balancing. arXiv:2303.06746"},{"issue":"11","key":"6201_CR52","first-page":"2717","volume":"67","author":"Y Xiang","year":"2020","unstructured":"Xiang Y, Chen Z, Chen Z, Fang Z, Hao H, Chen J, Liu Y, Wu Z, Xuan Q, Yang X (2020) Open dnn box by power side-channel attack. IEEE Trans Circuits Syst II Express Briefs 67(11):2717\u20132721","journal-title":"IEEE Transactions on Circuits and Systems II: Express Briefs"},{"key":"6201_CR53","doi-asserted-by":"crossref","unstructured":"Oh D, Razmadze A, Chandrasekar K (2013) Power integrity analysis for core logic blocks. In: 2013 IEEE 22nd Conference on electrical performance of electronic packaging and systems, IEEE, pp 79\u201382","DOI":"10.1109\/EPEPS.2013.6703471"},{"key":"6201_CR54","unstructured":"Pandit VS, Ryu WH, Choi MJ (2010) Power Integrity for I\/O Interfaces: with Signal Integrity\/power Integrity Co-design. Pearson Education"},{"key":"6201_CR55","doi-asserted-by":"crossref","unstructured":"Tanaka Y, Takatani H, Fujita H, Oizono Y, Nabeshima Y, Sudo T, Sakai A, Uchiyama S, Ikeda H (2012) Measurement of sso noise and pdn impedance of 3d sip with 4k-io widebus structure. In: 2012 IEEE 21st Conference on electrical performance of electronic packaging and systems, IEEE, pp 91\u201394","DOI":"10.1109\/EPEPS.2012.6457850"},{"key":"6201_CR56","doi-asserted-by":"publisher","unstructured":"Hossen MO, Chava B, Plas G, Beyne E, Bakir MS (2020) Power delivery network (pdn) modeling for backside-pdn configurations with buried power rails and $$\\mu$$ tsvs. IEEE Trans Electron Devices 67(1):11\u201317. https:\/\/doi.org\/10.1109\/TED.2019.2954301","DOI":"10.1109\/TED.2019.2954301"},{"issue":"6","key":"6201_CR57","doi-asserted-by":"publisher","first-page":"6586","DOI":"10.1109\/TPEL.2024.3370596","volume":"39","author":"J Wu","year":"2024","unstructured":"Wu J, Yang X, Huang X, Li Q, Wei J, Chen W, Wang K (2024) A method to reduce pdn impedance based on multicapacitor loop coupling. IEEE Trans Power Electron 39(6):6586\u20136590","journal-title":"IEEE Trans Power Electron"},{"key":"6201_CR58","doi-asserted-by":"crossref","unstructured":"Peng Z, Park J, Li C, Stecher J, Venkataraman S, Wang X, Rangaswamy G, Kim D (2024) Modeling of power distrubition network (pdn) noise coupling induced clock phase noise. In: 2024 IEEE International symposium on electromagnetic compatibility, signal & power integrity (EMC+ SIPI), IEEE, pp 52\u201357","DOI":"10.1109\/EMCSIPI49824.2024.10705606"},{"key":"6201_CR59","doi-asserted-by":"crossref","unstructured":"Hwang J, Pak JS, Yoon D, Lee H, Jeong J, Heo Y, Kim I (2021) Enhancing on-die pdn for optimal use of package pdn with decoupling capacitor. In: 2021 IEEE 71st Electronic components and technology conference (ECTC), IEEE, pp 1825\u20131830","DOI":"10.1109\/ECTC32696.2021.00288"},{"issue":"6","key":"6201_CR60","doi-asserted-by":"publisher","first-page":"1904","DOI":"10.1109\/TEMC.2018.2881247","volume":"61","author":"CA Pardue","year":"2019","unstructured":"Pardue CA, Torun HM, Bellaredj MLF, Swaminathan M (2019) Rf near-field coupling system using reverse pdn and considering electromagnetic effects. IEEE Trans Electromagn Compat 61(6):1904\u20131912","journal-title":"IEEE Trans Electromagn Compat"},{"issue":"6","key":"6201_CR61","doi-asserted-by":"publisher","first-page":"2442","DOI":"10.1109\/JSEN.2013.2256121","volume":"13","author":"J Ilg","year":"2013","unstructured":"Ilg J, Rupitsch SJ, Lerch R (2013) Impedance-based temperature sensing with piezoceramic devices. IEEE Sens J 13(6):2442\u20132449","journal-title":"IEEE Sens J"},{"key":"6201_CR62","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.microrel.2017.11.024","volume":"80","author":"VI Smirnov","year":"2018","unstructured":"Smirnov VI, Sergeev VA, Gavrikov AA, Shorin A (2018) Modulation method for measuring thermal impedance components of semiconductor devices. Microelectron Reliab 80:205\u2013212","journal-title":"Microelectron Reliab"},{"key":"6201_CR63","doi-asserted-by":"crossref","unstructured":"Rumiantsev A, Ridler N (2008) Vna calibration IEEE Microwave magazine 9(3):86\u201399","DOI":"10.1109\/MMM.2008.919925"},{"issue":"8","key":"6201_CR64","doi-asserted-by":"publisher","first-page":"2631","DOI":"10.1109\/TMTT.2016.2580141","volume":"64","author":"RA Monsalve","year":"2016","unstructured":"Monsalve RA, Rogers AE, Mozdzen TJ, Bowman JD (2016) One-port direct\/reverse method for characterizing vna calibration standards. IEEE Trans Microw Theory Tech 64(8):2631\u20132639","journal-title":"IEEE Trans Microw Theory Tech"},{"issue":"1","key":"6201_CR65","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.vlsi.2005.12.013","volume":"40","author":"E Peeters","year":"2007","unstructured":"Peeters E, Standaert F-X, Quisquater J-J (2007) Power and electromagnetic analysis: improved model, consequences and comparisons. Integration 40(1):52\u201360","journal-title":"Integration"},{"issue":"2","key":"6201_CR66","doi-asserted-by":"publisher","first-page":"166","DOI":"10.46586\/tches.v2022.i2.166-191","volume":"2022","author":"S Kumar","year":"2022","unstructured":"Kumar S, Dasu VA, Baksi A, Sarkar S, Jap D, Breier J, Bhasin S (2022) Side channel attack on stream ciphers: a three-step approach to state\/key recovery. IACR Trans Cryptogr Hardw Embed Syst 2022(2):166\u2013191","journal-title":"IACR Trans Cryptogr Hardw Embed Syst"},{"issue":"2","key":"6201_CR67","doi-asserted-by":"publisher","first-page":"15","DOI":"10.3390\/cryptography4020015","volume":"4","author":"M Randolph","year":"2020","unstructured":"Randolph M, Diehl W (2020) Power side-channel attack analysis: a review of 20 years of study for the layman. Cryptography 4(2):15","journal-title":"Cryptography"},{"issue":"4","key":"6201_CR68","doi-asserted-by":"publisher","first-page":"38","DOI":"10.3390\/jlpea11040038","volume":"11","author":"MNI Khan","year":"2021","unstructured":"Khan MNI, Bhasin S, Liu B, Yuan A, Chattopadhyay A, Ghosh S (2021) Comprehensive study of side-channel attack on emerging non-volatile memories. J Low Power Electron Appl 11(4):38","journal-title":"J Low Power Electron Appl"},{"key":"6201_CR69","doi-asserted-by":"crossref","unstructured":"Dodo SB, Bishnoi R, Tahoori MB (2019) Secure stt-mram bit-cell design resilient to differential power analysis attacks. IEEE Trans Very Large Scale Integration (VLSI) Syst 28(1):263\u2013272","DOI":"10.1109\/TVLSI.2019.2940449"},{"key":"6201_CR70","unstructured":"Alchitry Au Product Page. https:\/\/alchitry.com\/boards\/au\/. (Accessed: 3 April 2024)"}],"container-title":["Journal of Electronic Testing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-025-06201-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10836-025-06201-6","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-025-06201-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T06:27:05Z","timestamp":1772605625000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10836-025-06201-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,27]]},"references-count":70,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["6201"],"URL":"https:\/\/doi.org\/10.1007\/s10836-025-06201-6","relation":{},"ISSN":["0923-8174","1573-0727"],"issn-type":[{"value":"0923-8174","type":"print"},{"value":"1573-0727","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,27]]},"assertion":[{"value":"27 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 October 2025","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Update","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This paper has been revised to address and correct the identified formatting inconsistencies.","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interests"}},{"value":"The authors declare that they have no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interest"}}]}}