{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T04:28:49Z","timestamp":1725769729329},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/cicc.2014.6946135","type":"proceedings-article","created":{"date-parts":[[2014,11,12]],"date-time":"2014-11-12T17:50:10Z","timestamp":1415814610000},"page":"1-4","source":"Crossref","is-referenced-by-count":15,"title":["Impact of inductive integrated voltage regulator on the power attack vulnerability of encryption engines: A simulation study"],"prefix":"10.1109","author":[{"given":"M.","family":"Kar","sequence":"first","affiliation":[]},{"given":"D.","family":"Lie","sequence":"additional","affiliation":[]},{"given":"M.","family":"Wolf","sequence":"additional","affiliation":[]},{"given":"V.","family":"De","sequence":"additional","affiliation":[]},{"given":"S.","family":"Mukhopadhyay","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2014.6757361"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2012.2196316"},{"year":"0","key":"ref12"},{"year":"0","key":"ref13"},{"key":"ref14","article-title":"Correlation power analysis in frequency domain","author":"schimmel","year":"2013","journal-title":"ICAR"},{"key":"ref4","article-title":"Secure and Efficient Masking of AES - A Mission Impossible?","author":"oswald","year":"2004","journal-title":"IACR Cryptology ePrint"},{"key":"ref3","article-title":"On Second-Order Differential Power Analysis","author":"joye","year":"2005","journal-title":"CHES"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2008.4681650"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72738-5_10"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2463209.2488830"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2005.855939"},{"key":"ref2","article-title":"Differential power analysis","author":"kocher","year":"1999","journal-title":"Crypto"},{"key":"ref1","article-title":"Correlation Power Analysis with a Leakage Model","author":"brier","year":"2004","journal-title":"CHES"},{"key":"ref9","article-title":"Evaluation of On-chip Decoupling Capacitor's Effect on AES Cryptographic Circuit","author":"nakai","year":"2013","journal-title":"SASIMI"}],"event":{"name":"2014 IEEE Custom Integrated Circuits Conference - CICC 2014","start":{"date-parts":[[2014,9,15]]},"location":"San Jose, CA, USA","end":{"date-parts":[[2014,9,17]]}},"container-title":["Proceedings of the IEEE 2014 Custom Integrated Circuits Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6924030\/6945974\/06946135.pdf?arnumber=6946135","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T22:16:43Z","timestamp":1490307403000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6946135\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/cicc.2014.6946135","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}