{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T05:47:36Z","timestamp":1746337656813},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,3]]},"DOI":"10.1109\/date.2010.5456966","type":"proceedings-article","created":{"date-parts":[[2013,2,19]],"date-time":"2013-02-19T18:16:33Z","timestamp":1361297793000},"page":"1059-1064","source":"Crossref","is-referenced-by-count":3,"title":["Power Variance Analysis breaks a masked ASIC implementation of AES"],"prefix":"10.1109","author":[{"family":"Yang Li","sequence":"first","affiliation":[]},{"given":"Kazuo","family":"Sakiyama","sequence":"additional","affiliation":[]},{"given":"Lejla","family":"Batina","sequence":"additional","affiliation":[]},{"given":"Daisuke","family":"Nakatsu","sequence":"additional","affiliation":[]},{"given":"Kazuo","family":"Ohta","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"172","article-title":"An Optimized S-Box Circuit Architecture for Low Power AES Design","author":"morioka","year":"2002","journal-title":"Proceedings of CHES &#x2018;02 volume 2523 of Lecture Notes in Computer Science"},{"key":"ref11","first-page":"309","article-title":"Improved Higher-Order Side-Channel Attacks with FPGA Experiments","author":"peeters","year":"2005","journal-title":"CHES volume 3659 of Lecture Notes in Computer Science"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_14"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00862-7_29"},{"key":"ref14","first-page":"253","article-title":"Partition vs. Comparison Side-channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices","author":"standaert","year":"2008","journal-title":"ICISC Volume 5461 of Lecture Notes in Computer Science"},{"key":"ref15","first-page":"134","article-title":"Changing the Odds Against Masked Logic","author":"tiri","year":"2006","journal-title":"Proceedings of SAC'06 volume 4356 of Lecture Notes in Computer Science"},{"key":"ref16","first-page":"1","article-title":"Towards Efficient Second-Order Power Analysis","author":"waddle","year":"2004","journal-title":"CHES volume 3156 of Lecture Notes in Computer Science"},{"year":"0","key":"ref4"},{"key":"ref3","first-page":"157","article-title":"Statistics and Secret Leakage","author":"coron","year":"2000","journal-title":"Proceedings of FC'00 volumn 1962 of Lecture Notes in Computer Science"},{"key":"ref6","first-page":"388","article-title":"Differential Power Analysis","author":"kocher","year":"1999","journal-title":"Proceedings of Crypto '99 Volume 1666 of Lecture Notes in Computer Science"},{"key":"ref5","first-page":"426","article-title":"Mutual Information Analysis","author":"gierlichs","year":"2008","journal-title":"Proceedings of CHES '08 volume 5154 of Lecture Notes in Computer Science"},{"journal-title":"Power Analysis Attacks - Revealing the Secrets of Smart Cards","year":"2007","author":"mangard","key":"ref8"},{"key":"ref7","article-title":"Evaluation of Counteremeansre Implementations based on Boolean Masking to Thwart Side-Channel Attacks","author":"maghrebi","year":"0","journal-title":"SCS 2009"},{"key":"ref2","first-page":"398","article-title":"Towards Sound Approaches to Counteract Power-Analysis Attacks","author":"chari","year":"1999","journal-title":"Proceedings of Crypto '99 Volume 1666 of Lecture Notes in Computer Science"},{"key":"ref1","first-page":"16","article-title":"Correlation Power Analysis with a Leakage Model","author":"brier","year":"2004","journal-title":"CHES volume 3156 of Lecture Notes in Computer Science"},{"key":"ref9","first-page":"238","article-title":"Using Second-Order Power Analysis to Attack DPA Resistant Software","author":"thomas","year":"2000","journal-title":"Proceedings of CHES &#x2018;00 volumn 1965 of Lecture Notes in Computer Science"}],"event":{"name":"2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010)","start":{"date-parts":[[2010,3,8]]},"location":"Dresden","end":{"date-parts":[[2010,3,12]]}},"container-title":["2010 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE 2010)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5450668\/5456897\/05456966.pdf?arnumber=5456966","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T19:30:35Z","timestamp":1489865435000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5456966\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/date.2010.5456966","relation":{},"subject":[],"published":{"date-parts":[[2010,3]]}}}