{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T12:02:03Z","timestamp":1759147323689},"reference-count":8,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/esscir.2004.1356679","type":"proceedings-article","created":{"date-parts":[[2004,11,22]],"date-time":"2004-11-22T16:10:59Z","timestamp":1101139859000},"page":"307-310","source":"Crossref","is-referenced-by-count":27,"title":["Towards an AES crypto-chip resistant to differential power analysis"],"prefix":"10.1109","author":[{"given":"N.","family":"Pramstaller","sequence":"first","affiliation":[]},{"given":"F.K.","family":"Gurkaynak","sequence":"additional","affiliation":[]},{"given":"S.","family":"Haene","sequence":"additional","affiliation":[]},{"given":"H.","family":"Kaeslin","sequence":"additional","affiliation":[]},{"given":"N.","family":"Felber","sequence":"additional","affiliation":[]},{"given":"W.","family":"Fichtner","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","article-title":"Hardware countermeasures against DPA, a statistical analysis of their effectiveness","author":"mangard","year":"2004","journal-title":"Proc of the RSA Conference 2004 Cryptographers' Track CT-RSA 2004"},{"key":"2","first-page":"388","article-title":"Differential power analysis","author":"kocher","year":"1999","journal-title":"Advances in Cryptology CKYPTO 1999 (LNCS-1666)"},{"journal-title":"The Design of Rijndael AES - The Advanced Encryption Standard","year":"2002","author":"daemon","key":"1"},{"key":"7","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1007\/3-540-36400-5_15","article-title":"Simplified adaptive multiplicative masking for AES and its secure implementation","author":"trichina","year":"2003","journal-title":"Cryptographic Hardware and Embedded Systems - CHES 2002"},{"key":"6","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1007\/3-540-44709-1_26","article-title":"An implementation of DES and AES, secure against some attacks","author":"akkar","year":"2001","journal-title":"Cryptographic Hardware and Embedded Systems CHES 2001 (LNCS-2162)"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2004.1286711"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/988952.988963"},{"key":"8","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1007\/3-540-36400-5_16","article-title":"Multiplicative masking and power analysis of AES","author":"golic","year":"2003","journal-title":"Cryptographic Hardware and Embedded Systems CHES 2002 (LNCS-2523)"}],"event":{"name":"30th European Solid-State Circuits Conference","acronym":"ESSCIR-04","location":"Leuven, Belgium"},"container-title":["Proceedings of the 30th European Solid-State Circuits Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9372\/29756\/01356679.pdf?arnumber=1356679","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T12:11:24Z","timestamp":1497615084000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1356679\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/esscir.2004.1356679","relation":{},"subject":[]}}