{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:53:14Z","timestamp":1729677194009,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/fpt.2017.8280130","type":"proceedings-article","created":{"date-parts":[[2018,2,5]],"date-time":"2018-02-05T17:34:01Z","timestamp":1517852041000},"page":"128-135","source":"Crossref","is-referenced-by-count":5,"title":["Comparing the cost of protecting selected lightweight block ciphers against differential power analysis in low-cost FPGAs"],"prefix":"10.1109","author":[{"given":"William","family":"Diehl","sequence":"first","affiliation":[]},{"given":"Abubakr","family":"Abdulgadir","sequence":"additional","affiliation":[]},{"given":"Jens-Peter","family":"Kaps","sequence":"additional","affiliation":[]},{"given":"Kris","family":"Gaj","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1973.5009159"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28166-7_27"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_11"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-71817-0_10"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/LES.2014.2314961"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_5"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1007\/978-3-642-15031-9_28","article-title":"Provably Secure Higher-Order Masking of AES","volume":"6225","author":"rivain","year":"2010","journal-title":"Cryptographic Hardware and Embedded Systems CHES 2010 12th International Workshop"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","article-title":"PRESENT: An Ultra-Lightweight Block Cipher","author":"bogdanov","year":"2007","journal-title":"9th International Workshop Cryptographic Hardware and Embedded Systems 2007"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23951-9_22"},{"key":"ref12","first-page":"339","article-title":"TWINE: A Lightweight Block Cipher for Multiple Platforms","volume":"7707","author":"suzaki","year":"2012","journal-title":"Sac"},{"journal-title":"CLOC and SILC v3","year":"2016","author":"iwata","key":"ref13"},{"journal-title":"The JAMBU Lightweight Authenticated Encryption Mode v2 1","year":"2016","author":"wu","key":"ref14"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-48405-1_25","article-title":"Differential Power Analysis","author":"kocher","year":"1999","journal-title":"Proceedings of CRYPTO '99-19th International Conference on Cryptology"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-011-0006-y"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-016-0120-y"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.38"},{"journal-title":"Flexible Open-source workBench fOr Side-channel analysis (FOBOS)","year":"2016","author":"kaps","key":"ref28"},{"key":"ref4","article-title":"Report on Lightweight Cryptography (NISTIR 8114)","author":"mckay","year":"2017","journal-title":"National Institute of Standards and Technology (NIST)"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1007\/978-3-662-53008-5_11","article-title":"ParTI-Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks","volume":"9815","author":"schneider","year":"2016","journal-title":"36th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO 2016)"},{"journal-title":"Lightweight Cryptography Internet","article-title":"National Institute of Standards and Technology (NIST)","year":"2017","key":"ref3"},{"key":"ref6","article-title":"Towards a Flexible Opensource Board for Side-channel analysis (FOBOS)","author":"velegalati","year":"2013","journal-title":"Cryptographic architectures embedded in reconfigurable devices CRYPTARCHI 2013"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68914-0_27"},{"key":"ref5","article-title":"A testing methodology for side channel resistance validation","author":"goodwill","year":"2011","journal-title":"NIST Non-invasive Attack Testing Workshop"},{"journal-title":"Advanced encryption standard (AES) Federal information processing standards publication 197","year":"2001","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/11935308_38"},{"journal-title":"Cryptographic Competitions","year":"2016","author":"bernstein","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747946"},{"journal-title":"CAESAR Competition for Authenticated Encryption Security Applicability and Robustness","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/11545262_12"},{"key":"ref22","first-page":"69","article-title":"Pushing the Limits: A Very Compact and a Threshold Implementation of AES","author":"moradi","year":"2011","journal-title":"30th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2011)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06734-6_17"},{"key":"ref24","first-page":"99","article-title":"On 3-Share Threshold Implementations for 4-Bit S-boxes","author":"kutzner","year":"2013","journal-title":"Constructive Side-Channel Analysis and Secure Design 4th International Workshop COSADE 2013"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9086-6"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54669-8_5"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2614504"}],"event":{"name":"2017 International Conference on Field Programmable Technology (ICFPT)","start":{"date-parts":[[2017,12,11]]},"location":"Melbourne, VIC","end":{"date-parts":[[2017,12,13]]}},"container-title":["2017 International Conference on Field Programmable Technology (ICFPT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8269417\/8280101\/08280130.pdf?arnumber=8280130","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,10]],"date-time":"2019-10-10T05:11:01Z","timestamp":1570684261000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8280130\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/fpt.2017.8280130","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}