{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:13:39Z","timestamp":1761707619566},"reference-count":19,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/async.2003.1199180","type":"proceedings-article","created":{"date-parts":[[2003,10,8]],"date-time":"2003-10-08T15:04:05Z","timestamp":1065625445000},"page":"206-215","source":"Crossref","is-referenced-by-count":21,"title":["An investigation into the security of self-timed circuits"],"prefix":"10.1109","author":[{"given":"Z.C.","family":"Yu","sequence":"first","affiliation":[]},{"given":"S.B.","family":"Furber","sequence":"additional","affiliation":[]},{"given":"L.A.","family":"Plana","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Investigation of Power Analysis Attacks on Smartcards","author":"messerges","year":"1999","journal-title":"USENIX Workshop on Smartcard Technology"},{"key":"ref11","article-title":"Optical Fault Induction Attacks","author":"skorobogatov","year":"2002","journal-title":"Proc Workshop on Cryptographic Hardware and Embedded Systems"},{"key":"ref12","article-title":"Physical Security Attacks and Defences for Computing Systems","author":"weingart","year":"0","journal-title":"Secure System and Smart Cards"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ASYNC.2002.1000311"},{"key":"ref14","article-title":"Defeating Power Analysis Attacks","author":"yu","year":"2000","journal-title":"Proc of 9th UK Asynchronous Forum"},{"key":"ref15","article-title":"SPA - A Synthesizable Amulet Core for Smartcard Applications","author":"plana","year":"2002","journal-title":"Proc of ASYNCH'02"},{"article-title":"Implementing Balsa Handshake Circuits","year":"2000","author":"bardsley","key":"ref16"},{"key":"ref17","first-page":"231","article-title":"Principles of CMOS VLSI Design - A Systems Perspective SE","author":"weste","year":"0"},{"article-title":"ARM System-on-Chip Architecture","year":"2000","author":"furber","key":"ref18"},{"year":"0","key":"ref19","article-title":"The student Edition of Matlab"},{"article-title":"Security Engineering a Guide to Building Dependable Distributed Systems","year":"0","author":"anderson","key":"ref4"},{"key":"ref3","article-title":"Tamper resistance-a cautionary notice","author":"anderson","year":"1996","journal-title":"Proc Second Usenix Workshop on Electronic Commerce"},{"key":"ref6","first-page":"513","article-title":"Differential Fault Analysis of Secret Key Cryptosystem","author":"biham","year":"0","journal-title":"Proc Crypto'97"},{"key":"ref5","article-title":"Low Cost Attacks on Tamper Resistant Devices","author":"anderson","year":"1997","journal-title":"Proc Security Protocols Workshop"},{"key":"ref8","article-title":"Differential Power Analy-sis","author":"kocher","year":"1999","journal-title":"Proc Crypto'99"},{"key":"ref7","article-title":"Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other system","author":"kocher","year":"1996","journal-title":"Proc Crypto 96"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/188280.188291"},{"article-title":"Introduction to Differential Power Analysis and Related Attacks","year":"1998","author":"kocher","key":"ref1"},{"key":"ref9","article-title":"Design Principles for Tamper-Resistant Smartcard Processors","author":"kommerling","year":"1999","journal-title":"USENIX Workshop on Smartcard Technology"}],"event":{"name":"Ninth International Symposium on Asynchronous Circuits and Systems","acronym":"ASYNC-03","location":"Vancouver, BC, Canada"},"container-title":["Ninth International Symposium on Asynchronous Circuits and Systems, 2003. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8538\/26997\/01199180.pdf?arnumber=1199180","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T18:23:27Z","timestamp":1489429407000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1199180\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/async.2003.1199180","relation":{},"subject":[]}}