{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T05:21:22Z","timestamp":1737436882012,"version":"3.33.0"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,16]],"date-time":"2024-12-16T00:00:00Z","timestamp":1734307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,16]],"date-time":"2024-12-16T00:00:00Z","timestamp":1734307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,16]]},"DOI":"10.1109\/asianhost63913.2024.10838485","type":"proceedings-article","created":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T18:35:25Z","timestamp":1737052525000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["A Hybrid Simulation Approach for Accurate and Fast System-Level Side-Channel Leakage Evaluation"],"prefix":"10.1109","author":[{"given":"Kazuki","family":"Monta","sequence":"first","affiliation":[{"name":"Secafy Co., Ltd.,Kobe,Japan"}]},{"given":"Takafumi","family":"Oki","sequence":"additional","affiliation":[{"name":"Kobe University,Kobe,Japan"}]},{"given":"Rikuu","family":"Hasegawa","sequence":"additional","affiliation":[{"name":"Kobe University,Kobe,Japan"}]},{"given":"Takuya","family":"Wadatsumi","sequence":"additional","affiliation":[{"name":"Kobe University,Kobe,Japan"}]},{"given":"Takuji","family":"Miki","sequence":"additional","affiliation":[{"name":"Kobe University,Kobe,Japan"}]},{"given":"Makoto","family":"Nagata","sequence":"additional","affiliation":[{"name":"Kobe University,Kobe,Japan"}]},{"given":"Lang","family":"Lin","sequence":"additional","affiliation":[{"name":"Ansys Inc.,USA"}]},{"given":"Norman","family":"Chang","sequence":"additional","affiliation":[{"name":"Ansys Inc.,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2004.1268856"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2009.2034081"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/11767480_16"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_26"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/11935308_38"},{"key":"ref8","article-title":"Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order","author":"Gross","year":"2016","journal-title":"Cryptology ePrint Archive, Report 2016\/486"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2559627.2559628"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01004-0_13"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1065579.1065640"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-020-00233-8"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/dac56929.2023.10247834"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/LEMCPA.2020.2978624"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/iSES50453.2020.00038"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2011.5955002"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-019-05826-8"},{"volume-title":"Power Analysis Attacks: Revealing the Secrets of Smart Cards","year":"2007","author":"Mangard","key":"ref19"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2017.2702098"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2020.3005338"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-52153-4_8"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44499-8_5"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCS.2009.5412599"},{"key":"ref25","first-page":"403","article-title":"A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards","volume-title":"Proceedings of the 28th European Solid-State Circuits Conference","author":"Tiri","year":"2002"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2006.870913"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36095-4_1"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34961-4_44"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/VLSID.2007.79"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCS.2009.5412604"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2019.8854372"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2017.7870301"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2018.2822691"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744866"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2016.2555810"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30574-3_24"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i2.293-317"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64647-3_1"},{"key":"ref39","first-page":"385","article-title":"Masking proofs are tight and how to exploit it in security evaluations Advances","volume-title":"Cryptology- EUROCRYPT 20182018","author":"Grosso"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30634-1_20"},{"issue":"1","key":"ref41","first-page":"23","article-title":"Silicon-correlated Simulation Methodology of EM Side-channel Leakage Analysis","volume":"19","author":"Monta","year":"2022","journal-title":"J. Emerg. TechnoI. Comput. Syst."},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-89915-8_6"}],"event":{"name":"2024 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)","start":{"date-parts":[[2024,12,16]]},"location":"Kobe, Japan","end":{"date-parts":[[2024,12,18]]}},"container-title":["2024 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10838388\/10838389\/10838485.pdf?arnumber=10838485","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T18:40:21Z","timestamp":1737398421000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10838485\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,16]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/asianhost63913.2024.10838485","relation":{},"subject":[],"published":{"date-parts":[[2024,12,16]]}}}