{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:47:33Z","timestamp":1764175653263},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,6]]},"DOI":"10.1109\/host55342.2024.10545400","type":"proceedings-article","created":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T17:21:52Z","timestamp":1717694512000},"page":"66-69","source":"Crossref","is-referenced-by-count":1,"title":["A Pre-Silicon Physical Design Study Towards Mitigating EMSCA on Cryptographic ICs"],"prefix":"10.1109","author":[{"given":"Mark","family":"Lee","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology,Department of ECE,Atlanta,Georgia,USA"}]},{"given":"Chris","family":"Clark","sequence":"additional","affiliation":[{"name":"Georgia Tech Research Institute,Atlanta,Georgia,USA"}]},{"given":"Saibal","family":"Mukhopadhyay","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology,Department of ECE,Atlanta,Georgia,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2008.4681650"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2004.1268856"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_21"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2018.2875112"},{"key":"ref5","article-title":"Blindsight: Blinding EM Side-Channel Leakage using Built-In Fully Integrated Inductive Voltage Regulator","volume-title":"CoRR","author":"Kar","year":"2018"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2018.2819499"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2019.8740839"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CICC51472.2021.9431438"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3024938"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2019.8740839"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IEDM13553.2020.9372073"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/HOST49136.2021.9702270"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2017.8203769"},{"volume-title":"PrimeTime Static Timing Analysis","author":"Synopsys","key":"ref14"},{"volume-title":"RedHawk-SC","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2287600"}],"event":{"name":"2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","start":{"date-parts":[[2024,5,6]]},"location":"Tysons Corner, VA, USA","end":{"date-parts":[[2024,5,9]]}},"container-title":["2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10545333\/10545347\/10545400.pdf?arnumber=10545400","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,9]],"date-time":"2024-06-09T04:17:58Z","timestamp":1717906678000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10545400\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,6]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/host55342.2024.10545400","relation":{},"subject":[],"published":{"date-parts":[[2024,5,6]]}}}