{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:02:03Z","timestamp":1729674123730,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1109\/emccompo.2015.7358327","type":"proceedings-article","created":{"date-parts":[[2015,12,17]],"date-time":"2015-12-17T21:59:17Z","timestamp":1450389557000},"page":"39-43","source":"Crossref","is-referenced-by-count":2,"title":["Fundamental study on randomized processing in cryptographic IC using variable clock against Correlation Power Analysis"],"prefix":"10.1109","author":[{"given":"Megumi","family":"Saito","sequence":"first","affiliation":[]},{"given":"Takaaki","family":"Mizuki","sequence":"additional","affiliation":[]},{"given":"Hideaki","family":"Sone","sequence":"additional","affiliation":[]},{"given":"Yu-ichi","family":"Hayashi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"66","article-title":"Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules","author":"sugawara","year":"2009","journal-title":"Information Security Applications Lecture Notes in Computer Science 5932"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10838-9_13"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2010.5456906"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1587\/transele.E95.C.1089"},{"journal-title":"Side-channel attack standard evaluation board (SASEBO)","year":"0","key":"ref14"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1007\/3-540-36400-5_30","article-title":"True random number generator embedded in reconfigurable hardware","author":"fischer","year":"2003","journal-title":"Cryptographic Hardware and Embedded Systems-CHES 2002 Springer Berlin Heidelberg"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/968280.968292"},{"key":"ref4","first-page":"251","article-title":"Electromagnetic Analysis: Concrete Results","author":"grandolfi","year":"2001","journal-title":"CHES 2001 LNCS 2162"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"141","DOI":"10.3233\/JCS-2000-82-304","article-title":"Side channel cryptanalysis of product ciphers","volume":"8","author":"kelsey","year":"2000","journal-title":"J Comput Security"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_14"},{"key":"ref5","first-page":"29","article-title":"The EM Sidechannel(s)","volume":"2523","author":"agrawal","year":"2002","journal-title":"CHES 2002 Lecture Notes in Computer Science"},{"key":"ref8","article-title":"Power Analysis Attacks: Revealing the Secrets of Smart Cards","author":"mangard","year":"2007","journal-title":"Springer-Verlag"},{"key":"ref7","first-page":"16","article-title":"Correlation Power Analysis with a Leakage Model","volume":"3156","author":"brier","year":"2004","journal-title":"CHES 2004 Lecture Notes in Computer Science"},{"key":"ref2","article-title":"Differential power analysis","author":"kocher","year":"1999","journal-title":"Advances in Cryptology-CRYPTO85 Proceedings Springer Berlin Heidelberg"},{"key":"ref1","first-page":"104","article-title":"Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems","author":"kocher","year":"1996","journal-title":"Proc 16th Annu Int Cryptology Conf Adv Cryptology LNCS 1109"},{"journal-title":"Advanced Encryption Standard (AES) FIPS PUB 197 NIST","year":"0","key":"ref9"}],"event":{"name":"2015 10th International Workshop on the Electromagnetic Compatibility of Integrated Circuits (EMC Compo)","start":{"date-parts":[[2015,11,10]]},"location":"Edinburgh, United Kingdom","end":{"date-parts":[[2015,11,13]]}},"container-title":["2015 10th International Workshop on the Electromagnetic Compatibility of Integrated Circuits (EMC Compo)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7352268\/7358224\/07358327.pdf?arnumber=7358327","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,2]],"date-time":"2019-09-02T17:12:37Z","timestamp":1567444357000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7358327\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/emccompo.2015.7358327","relation":{},"subject":[],"published":{"date-parts":[[2015,11]]}}}