{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T03:48:19Z","timestamp":1725594499131},"reference-count":10,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1109\/ewdts.2019.8884465","type":"proceedings-article","created":{"date-parts":[[2019,11,5]],"date-time":"2019-11-05T11:34:05Z","timestamp":1572953645000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Caution: GALS-ification as a Means against SCA Attacks"],"prefix":"10.1109","author":[{"given":"Zoya","family":"Dyka","sequence":"first","affiliation":[]},{"given":"Ievgen","family":"Kabin","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Klann","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Vater","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Langendoerfer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/RECONFIG.2018.8641732"},{"journal-title":"Guide to Elliptic Curve Cryptography","year":"2004","author":"hankerson","key":"ref3"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2018.8328695"},{"key":"ref6","first-page":"1","author":"xin","year":"2014","journal-title":"GALS design of ECC against side-channel attacks - A comparative study Proceedings of 24th International Workshop on Power and Timing Modeling Optimization and Simulation (PATMOS)"},{"key":"ref5","first-page":"553","article-title":"Horizontal Collision Correlation Attack on Elliptic Curves","author":"bauer","year":"2013","journal-title":"Sac"},{"key":"ref8","first-page":"76","article-title":"State-of-the-art of Secure ECC Implementations: A Survey on Known Side-channel Attacks and Countermeasures","author":"junfeng","year":"2010","journal-title":"2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866113-7"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1007\/3-540-48059-5_27","article-title":"Fast multiplication on elliptic curves over GF(2m) without precomputation","author":"l\u00f3pez","year":"1999","journal-title":"Cryptographic Hardware and Embedded Systems"},{"key":"ref9","first-page":"129","article-title":"Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA","author":"itoh","year":"2002","journal-title":"Cryptographic Hardware and Embedded Systems - CHES 2002"},{"journal-title":"Digital Signature Standard Request for Comments on the NIST-Recommended Elliptic Curves","article-title":"Federal Information Processing Standard (FIPS)86-4","year":"2015","key":"ref1"}],"event":{"name":"2019 IEEE East-West Design & Test Symposium (EWDTS)","start":{"date-parts":[[2019,9,13]]},"location":"Batumi, Georgia","end":{"date-parts":[[2019,9,16]]}},"container-title":["2019 IEEE East-West Design &amp; Test Symposium (EWDTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8871308\/8884369\/08884465.pdf?arnumber=8884465","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T15:25:23Z","timestamp":1658157923000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8884465\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/ewdts.2019.8884465","relation":{},"subject":[],"published":{"date-parts":[[2019,9]]}}}