{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T05:31:36Z","timestamp":1731475896427,"version":"3.28.0"},"reference-count":16,"publisher":"Institution of Engineering and Technology (IET)","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET Inf. Secur."],"published-print":{"date-parts":[[2007,9,10]]},"DOI":"10.1049\/iet-ifs:20060112","type":"journal-article","created":{"date-parts":[[2007,9,20]],"date-time":"2007-09-20T14:46:50Z","timestamp":1190299610000},"page":"128-133","source":"Crossref","is-referenced-by-count":11,"title":["Testing power-analysis attack susceptibility in register-transfer level designs"],"prefix":"10.1049","volume":"1","author":[{"given":"M.","family":"Bucci","sequence":"first","affiliation":[{"name":"Infineon Technologies Austria AG, Babenbergerstrasse 10, Graz, A-8020, Austria"}]},{"given":"R.","family":"Luzzi","sequence":"additional","affiliation":[{"name":"Infineon Technologies Austria AG, Babenbergerstrasse 10, Graz, A-8020, Austria"}]},{"given":"F.","family":"Menichelli","sequence":"additional","affiliation":[{"name":"Dipartimento di Ingegneria Elettronica, Universita\u0300 di Roma \u2018La Sapienza\u2019, Via Eudossiana 18, Rome, I-00184, Italy"}]},{"given":"R.","family":"Menicocci","sequence":"additional","affiliation":[{"name":"Dipartimento di Ingegneria Elettronica, Universita\u0300 di Roma \u2018La Sapienza\u2019, Via Eudossiana 18, Rome, I-00184, Italy"}]},{"given":"M.","family":"Olivieri","sequence":"additional","affiliation":[{"name":"Dipartimento di Ingegneria Elettronica, Universita\u0300 di Roma \u2018La Sapienza\u2019, Via Eudossiana 18, Rome, I-00184, Italy"}]},{"given":"A.","family":"Trifiletti","sequence":"additional","affiliation":[{"name":"Dipartimento di Ingegneria Elettronica, Universita\u0300 di Roma \u2018La Sapienza\u2019, Via Eudossiana 18, Rome, I-00184, Italy"}]}],"member":"265","reference":[{"key":"10.1049\/iet-ifs:20060112_r1","unstructured":"Quisquater, J.-J., and Koeune, F.: \u2018Side-channel attacks: state-of-the-art\u2019, 2002),http:\/\/www.ipa.go.jp\/security\/enc\/CRYPTREC\/fy15\/doc\/1047_Side_Channel_report.pdf, project CRYPTREC"},{"key":"10.1049\/iet-ifs:20060112_r2","first-page":"78","volume":"3655","author":"Koeune","year":"2005"},{"key":"10.1049\/iet-ifs:20060112_r3","first-page":"104","volume":"1109","author":"Kocher","year":"1996"},{"key":"10.1049\/iet-ifs:20060112_r4","first-page":"388","volume":"1666","author":"Kocher","year":"1999"},{"key":"10.1049\/iet-ifs:20060112_r5","unstructured":"Quisquater, J.-J., and Samyde, D.: \u2018A new tool for non-intrusive analysis of smart cards based on electro-magnetic emissions: the SEMA and DEMA methods\u2019. Advances in cryptology \u2013 EUROCRYPT 2000\u2019, Rump Session"},{"key":"10.1049\/iet-ifs:20060112_r6","first-page":"200","volume":"2140","author":"Quisquater","year":"2001"},{"key":"10.1049\/iet-ifs:20060112_r7","first-page":"481","volume":"3254","author":"Bucci","year":"2004"},{"key":"10.1049\/iet-ifs:20060112_r8","first-page":"546","volume":"2","author":"Berna Ors","journal-title":"Proc. IEEE Int. Conf. on Information Technology: Coding and Computing \u2013 ITCC'04"},{"key":"10.1049\/iet-ifs:20060112_r9","first-page":"85","volume":"173","author":"den Hartog","year":"2005"},{"journal-title":"Proc. ACM IEEE Conf. on Design Automation \u2013 DAC05","first-page":"228","author":"Tiri","key":"10.1049\/iet-ifs:20060112_r10"},{"key":"10.1049\/iet-ifs:20060112_r11","first-page":"137","volume":"2779","author":"Fournier","year":"2003"},{"key":"10.1049\/iet-ifs:20060112_r12","first-page":"280","volume":"3659","author":"Li","year":"2004"},{"key":"10.1049\/iet-ifs:20060112_r13","doi-asserted-by":"crossref","unstructured":"Daemen, J., and Rijmen, V.: \u2018The design of Rijndael: The wide trail strategy explained\u2019, (Springer-Verlag, New York, NY 2000)","DOI":"10.1007\/3-540-45325-3_20"},{"key":"10.1049\/iet-ifs:20060112_r14","first-page":"16","volume":"3156","author":"Brier","year":"2004"},{"key":"10.1049\/iet-ifs:20060112_r15","unstructured":"\u2018Final report modeling & simulation of SCA effects\u2019, Technical, IST-2002-507270\/SCARD Project, Doc. ID:IST-2002-507270\/6.1\/1.0, www.scard-project.eu"},{"key":"10.1049\/iet-ifs:20060112_r16","unstructured":"\u2018Final report design space exploration for SCA countermeasures\u2019, Technical Report IST-2002-507270\/SCARD Project, Doc. ID:IST-2002-507270\/3.2\/1.0, www.scard-project.eu"}],"container-title":["IET Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/digital-library.theiet.org\/content\/journals\/10.1049\/iet-ifs_20060112?crawler=true&mimetype=application\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T16:21:03Z","timestamp":1731428463000},"score":1,"resource":{"primary":{"URL":"http:\/\/digital-library.theiet.org\/doi\/10.1049\/iet-ifs%3A20060112"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9,10]]},"references-count":16,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2007,9,10]]}},"alternative-id":["10.1049\/iet-ifs:20060112"],"URL":"https:\/\/doi.org\/10.1049\/iet-ifs:20060112","relation":{},"ISSN":["1751-8709","1751-8717"],"issn-type":[{"type":"print","value":"1751-8709"},{"type":"electronic","value":"1751-8717"}],"subject":[],"published":{"date-parts":[[2007,9,10]]}}}