{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T16:39:45Z","timestamp":1725727185344},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/hldvt.2005.1568839","type":"proceedings-article","created":{"date-parts":[[2006,1,18]],"date-time":"2006-01-18T18:42:54Z","timestamp":1137609774000},"page":"211-218","source":"Crossref","is-referenced-by-count":6,"title":["Security evaluation against electromagnetic analysis at design time"],"prefix":"10.1109","author":[{"family":"Huiyun Li","sequence":"first","affiliation":[]},{"given":"A.T.","family":"Markettos","sequence":"additional","affiliation":[]},{"given":"S.","family":"Moore","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","first-page":"200","article-title":"Electromagnetic analysis (ema): Measures and counter-measures for smart cards","author":"quisquater","year":"2001","journal-title":"E-smart"},{"key":"2","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","article-title":"Differential power analysis","author":"kocher","year":"1999","journal-title":"Proceedings of 19th International Advances in Cryptology Conference CRYPTO '99"},{"year":"1992","author":"van trees","journal-title":"Detection Estimation and Modulation Theory Radar-Sonar Signal Processing and Gaussian Signals in Noise","key":"10"},{"key":"1","first-page":"171","article-title":"Cryptanalysis of Diffie-Hellman, RSA, DSS, and other cryptosystems using timing attacks","author":"kocher","year":"1995","journal-title":"Proceedings of 15th International Advances in Cryptology Conference CRYPTO '95"},{"key":"7","first-page":"481","article-title":"A Power Consumption Randomization Countermeasure for DPA-Resistant Cryptographic Processors","author":"bucci","year":"2004","journal-title":"PATMOS"},{"year":"0","author":"straus","journal-title":"Near and far fields - from statics to radiation","key":"6"},{"key":"5","first-page":"251","article-title":"Electromagnetic analysis: Concrete results","author":"gandolfi","year":"2001","journal-title":"Proc Cryptographic Hardware and Embedded Systems?CHES 2000"},{"key":"4","first-page":"29","article-title":"The EM side-channel(s)","author":"agrawal","year":"2002","journal-title":"Proc Cryptographic Hardware and Embedded Systems?CHES 2000"},{"key":"9","first-page":"137","article-title":"Security evaluation of asynchronous circuits","author":"fournier","year":"2003","journal-title":"Proc Cryptographic Hardware and Embedded Systems?CHES 2000"},{"year":"0","journal-title":"3rd generation smart card","key":"8"},{"key":"11","article-title":"EM Analysis of Rijndael and ECC on a Wireless Java-based PDA","author":"gebotys","year":"2005","journal-title":"Proc Cryptographic Hardware and Embedded Systems?CHES 2000"},{"year":"0","key":"12"}],"event":{"name":"Tenth IEEE International High-Level Design Validation and Test Workshop, 2005.","location":"Napa Valley, CA, USA"},"container-title":["Tenth IEEE International High-Level Design Validation and Test Workshop, 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10490\/33246\/01568839.pdf?arnumber=1568839","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T22:30:12Z","timestamp":1497652212000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1568839\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/hldvt.2005.1568839","relation":{},"subject":[]}}