{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T16:13:42Z","timestamp":1755792822323,"version":"3.44.0"},"reference-count":11,"publisher":"IEEE","license":[{"start":{"date-parts":[[2016,10,1]],"date-time":"2016-10-01T00:00:00Z","timestamp":1475280000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2016,10,1]],"date-time":"2016-10-01T00:00:00Z","timestamp":1475280000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/apccas.2016.7804081","type":"proceedings-article","created":{"date-parts":[[2017,1,11]],"date-time":"2017-01-11T16:22:50Z","timestamp":1484151770000},"page":"650-653","source":"Crossref","is-referenced-by-count":27,"title":["Interceptive side channel attack on AES-128 wireless communications for IoT applications"],"prefix":"10.1109","author":[{"given":"Ali Akbar","family":"Pammu","sequence":"first","affiliation":[{"name":"School of Electrical and Electronic Engineering, Nanyang Technological University, 50 Nanyang Avenue, Singapore 639798"}]},{"given":"Kwen-Siong","family":"Chong","sequence":"additional","affiliation":[{"name":"School of Electrical and Electronic Engineering, Nanyang Technological University, 50 Nanyang Avenue, Singapore 639798"}]},{"given":"Weng-Geng","family":"Ho","sequence":"additional","affiliation":[{"name":"School of Electrical and Electronic Engineering, Nanyang Technological University, 50 Nanyang Avenue, Singapore 639798"}]},{"given":"Bah-Hwee","family":"Gwee","sequence":"additional","affiliation":[{"name":"School of Electrical and Electronic Engineering, Nanyang Technological University, 50 Nanyang Avenue, Singapore 639798"}]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2326331"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2442956"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_30"},{"key":"ref6","first-page":"388","article-title":"Differential Power Analysis","volume":"1666","author":"kocher","year":"1999","journal-title":"Advances in Cryptology-CRYPTO'99"},{"journal-title":"Amel-8271J-AVR-ATmega-Datasheet_1112015 ATmega48A\/PA\/88A\/PA\/168A\/PA\/328\/P","year":"0","key":"ref11"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICISE.2016.11"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/GCCE.2012.6379944"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/EDSSC.2015.7285109"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2440176"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.19"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2306382"}],"event":{"name":"2016 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS)","start":{"date-parts":[[2016,10,25]]},"location":"Jeju, Korea (South)","end":{"date-parts":[[2016,10,28]]}},"container-title":["2016 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7786273\/7803879\/07804081.pdf?arnumber=7804081","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,14]],"date-time":"2025-08-14T18:41:09Z","timestamp":1755196869000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7804081\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/apccas.2016.7804081","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}