{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T13:44:54Z","timestamp":1764251094331},"reference-count":12,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/async.2002.1000311","type":"proceedings-article","created":{"date-parts":[[2004,4,23]],"date-time":"2004-04-23T18:38:15Z","timestamp":1082745495000},"page":"211-218","source":"Crossref","is-referenced-by-count":81,"title":["Improving smart card security using self-timed circuits"],"prefix":"10.1109","author":[{"given":"S.","family":"Moore","sequence":"first","affiliation":[]},{"given":"R.","family":"Anderson","sequence":"additional","affiliation":[]},{"given":"P.","family":"Cunningham","sequence":"additional","affiliation":[]},{"given":"R.","family":"Mullins","sequence":"additional","affiliation":[]},{"given":"G.","family":"Taylor","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"200","article-title":"ElecroMagnetic analysis EMA: Measures and coutermeasures for smart cards","author":"quisquater","year":"2001","journal-title":"LNCS2140"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","article-title":"Differential power analysis","author":"kocher","year":"1999","journal-title":"Proc 19th International Advances in Cryptology Conference - CRYPTO '99"},{"key":"ref10","first-page":"115","article-title":"Non-deterministic processors","author":"may","year":"2001","journal-title":"Information Security and Privacy LNCS 2119"},{"key":"ref6","first-page":"1","article-title":"Tamper resistance - a cautionary note","author":"anderson","year":"1996","journal-title":"Second USENIX Workshop on Electronic Commerce"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1007\/3-540-44709-1_4","article-title":"Random register renaming to foil DPA","author":"may","year":"2001","journal-title":"Cryptographic Hardware and Embedded Systems-CHES 2001 Vol 2162 of LNCS"},{"article-title":"Clock frequency modulation for secure microprocessors","year":"1993","author":"sprunk","key":"ref5"},{"article-title":"Serpent: A proposal for the Advnaced Encryption Standard","year":"2001","author":"anderson","key":"ref12"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/BF01788562"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/0471224146"},{"key":"ref2","first-page":"104","article-title":"Timing attacks on implementations of diffie-hellman RSA, DSS, and other systems","author":"kocher","year":"1996","journal-title":"Proc 16th International Advances in Cryptology Conference &#x2013; CRYPTO '96"},{"key":"ref9","article-title":"System timing","author":"seitz","year":"1980","journal-title":"Introduction to VLSI Systems"},{"key":"ref1","first-page":"9","article-title":"Design principles for tamper-resistant smartcard processors","author":"k\u00f6mmerling","year":"1999","journal-title":"Proceedings of the First USENIX Workshop on Smartcard Technology"}],"event":{"name":"Eighth International Symposium on Asynchronous Circuits and Systems","acronym":"ASYNC-02","location":"Manchester, UK"},"container-title":["Proceedings Eighth International Symposium on Asynchronous Circuits and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/7846\/21599\/01000311.pdf?arnumber=1000311","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T06:21:47Z","timestamp":1497594107000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1000311\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/async.2002.1000311","relation":{},"subject":[]}}