{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T08:57:30Z","timestamp":1767085050400,"version":"3.44.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/csr64739.2025.11130154","type":"proceedings-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:27Z","timestamp":1756235067000},"page":"990-995","source":"Crossref","is-referenced-by-count":1,"title":["Atomic Patterns: Field Operation Distinguishability on Cryptographic ASICs"],"prefix":"10.1109","author":[{"given":"Alkistis Aikaterini","family":"Sigourou","sequence":"first","affiliation":[{"name":"IHP - Leibniz Institute for High Performance Microelectronics,Frankfurt (Oder),Germany"}]},{"given":"Zoya","family":"Dyka","sequence":"additional","affiliation":[{"name":"IHP - Leibniz Institute for High Performance Microelectronics,Frankfurt (Oder),Germany"}]},{"given":"Peter","family":"Langendoerfer","sequence":"additional","affiliation":[{"name":"IHP - Leibniz Institute for High Performance Microelectronics,Frankfurt (Oder),Germany"}]},{"given":"Ievgen","family":"Kabin","sequence":"additional","affiliation":[{"name":"IHP - Leibniz Institute for High Performance Microelectronics,Frankfurt (Oder),Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39799-x_31"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1090\/s0025-5718-1987-0866109-5"},{"key":"ref3","article-title":"Introduction to differential power analysis and related attacks","author":"Kocher","year":"1998","journal-title":"Cryptography Research"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17650-0_5"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/tc.2004.13"},{"article-title":"Accelerating the Scalar Multiplication on Elliptic Curve Cryptosystems over Prime Fields","year":"2008","author":"Longa","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12510-2_7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08302-5_12"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/s22083083"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45238-6_30"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43414-7_28"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/581199.581218"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/b97644"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/reconfig.2017.8279800"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.6028\/nist.fips.186-4"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ewdts63723.2024.10873728"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/date.2005.67"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/dtis.2018.8368560"},{"year":"2024","key":"ref19","article-title":"IHP: Leibniz Institute for High Performance Microelectronics"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/tc.2007.70815"},{"key":"ref21","article-title":"Cryptographic hardware accelerator with dummy block addressing for protection against side channel attacks","volume-title":"US20240111908A1","author":"Kabin","year":"2024"}],"event":{"name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2025,8,4]]},"location":"Chania, Crete, Greece","end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129696\/11129957\/11130154.pdf?arnumber=11130154","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T04:50:56Z","timestamp":1756270256000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130154\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/csr64739.2025.11130154","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}