{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T14:52:35Z","timestamp":1758811955288,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T00:00:00Z","timestamp":1631232000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T00:00:00Z","timestamp":1631232000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T00:00:00Z","timestamp":1631232000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,10]]},"DOI":"10.1109\/ewdts52692.2021.9581013","type":"proceedings-article","created":{"date-parts":[[2021,10,26]],"date-time":"2021-10-26T17:13:28Z","timestamp":1635268408000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["Simulation of Electromagnetic Emanation of Cryptographic ICs: Tools, Methods, Problems"],"prefix":"10.1109","author":[{"given":"Omar Alejandro","family":"Sosa","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zoya","family":"Dyka","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ievgen","family":"Kabin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Peter","family":"Langendorfer","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"journal-title":"SONNET","year":"2021","key":"ref32"},{"journal-title":"PathWave EM Design (EMPro)","year":"2021","key":"ref31"},{"journal-title":"Clarity 3D solver","year":"2021","key":"ref30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27954-6_15"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2016.7792439"},{"journal-title":"Langer EMV Technik GMBH","year":"0","key":"ref12"},{"journal-title":"Ansys HFSS","year":"2021","key":"ref13"},{"journal-title":"Dassault Systemes SE","year":"0","key":"ref14"},{"journal-title":"IMST GmbH","year":"2021","key":"ref15"},{"key":"ref16","article-title":"Sears and Zemansky&#x2019;s University physics","author":"young","year":"2008","journal-title":"With modern physics"},{"key":"ref17","first-page":"19","author":"gjonaj","year":"2008","journal-title":"Full-wave simulation of integrated circuit packages on a parallel architecture"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-1204(199607)9:4<295::AID-JNM240>3.0.CO;2-8"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17752-1_24"},{"journal-title":"The Finite Element Method in Electromagnetics","year":"2002","author":"jin","key":"ref28"},{"key":"ref4","first-page":"144","article-title":"Power analysis attacks of modular exponentiation in smartcards","author":"messerges","year":"0","journal-title":"CHES 1999"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1109\/TAP.1966.1138693","article-title":"Numerical solution of initial boundary value problems involving Maxwell&#x2019;s equations in Isotropic media","volume":"14","author":"yee","year":"1966","journal-title":"IEEE Antennas Propagat"},{"key":"ref3","first-page":"46","article-title":"Horizontal correlation analysis on exponentiation","author":"clavier","year":"2010","journal-title":"ICICS"},{"key":"ref6","first-page":"286","article-title":"Sliding windows succumbs to Big Mac attack","author":"walter","year":"0","journal-title":"CHES 2001"},{"journal-title":"Field Computation by Moment Methods","year":"1968","author":"harrington","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s12095-014-0111-8"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2018.8328695"},{"key":"ref7","article-title":"EC Scalar multiplication: successful horizontal address bit SCA against atomic patterns","author":"kabin","year":"0","journal-title":"LATS 2021"},{"key":"ref2","first-page":"161","article-title":"La Cryptographie Militaire","volume":"9","author":"kerckhoffs","year":"1883","journal-title":"Journal des sciences militaires"},{"journal-title":"Guide to Elliptic Curve Cryptography","year":"2004","author":"hankerson","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"journal-title":"ANSYS RedHawk-SC","year":"2021","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2017.8203769"},{"journal-title":"Ansys Totem","year":"2021","key":"ref21"},{"key":"ref24","article-title":"Simulation-based verification of EM side-channel attack resilience of embedded cryptographic systems","author":"kumar","year":"2017","journal-title":"The University of Texas at Austin"},{"key":"ref23","article-title":"Project STARSS: Small: simulation-based verification of EM side-channel attack resilience of embedded cryptographic systems","author":"yilmaz","year":"2015","journal-title":"SaTC NFS-1527888"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST47458.2019.9006705"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.29007\/ptmg"}],"event":{"name":"2021 IEEE East-West Design & Test Symposium (EWDTS)","start":{"date-parts":[[2021,9,10]]},"location":"Batumi, Georgia","end":{"date-parts":[[2021,9,13]]}},"container-title":["2021 IEEE East-West Design &amp; Test Symposium (EWDTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9580973\/9580974\/09581013.pdf?arnumber=9581013","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:55:57Z","timestamp":1652187357000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9581013\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,10]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/ewdts52692.2021.9581013","relation":{},"subject":[],"published":{"date-parts":[[2021,9,10]]}}}