{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T14:54:50Z","timestamp":1777128890670,"version":"3.51.4"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/apccas.2016.7803910","type":"proceedings-article","created":{"date-parts":[[2017,1,11]],"date-time":"2017-01-11T21:22:50Z","timestamp":1484169770000},"page":"115-118","source":"Crossref","is-referenced-by-count":9,"title":["Success rate model for fully AES-128 in correlation power analysis"],"prefix":"10.1109","author":[{"given":"Ali Akbar","family":"Pammu","sequence":"first","affiliation":[]},{"given":"Kwen-Siong","family":"Chong","sequence":"additional","affiliation":[]},{"given":"Ne Kyaw","family":"Zwa Lwin","sequence":"additional","affiliation":[]},{"given":"Weng-Geng","family":"Ho","sequence":"additional","affiliation":[]},{"given":"Nan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Bah-Hwee","family":"Gwee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36095-4_2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/GCCE.2012.6379944"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2012.2200399"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.862437"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24586-2_12"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24660-2_18"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2013.6613952"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/EDSSC.2015.7285109"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/978-3-642-40349-1_2","article-title":"Success through Confidence: Evaluating the Effectiveness of a Side-Channel Attack","volume":"8086","author":"thillard","year":"2013","journal-title":"Cryptographic Hardware and Embedded Systems - CHES 2013"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","article-title":"Differential Power Analysis","volume":"1666","author":"kocher","year":"1999","journal-title":"Advances in Cryptology - CRYPTO'99"}],"event":{"name":"2016 IEEE Asia-Pacific Conference on Circuits and Systems (APCCAS)","location":"Jeju","start":{"date-parts":[[2016,10,25]]},"end":{"date-parts":[[2016,10,28]]}},"container-title":["2016 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7786273\/7803879\/07803910.pdf?arnumber=7803910","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,21]],"date-time":"2022-07-21T09:58:43Z","timestamp":1658397523000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7803910\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/apccas.2016.7803910","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}