{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:20:59Z","timestamp":1729617659430,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1109\/hst.2011.5954986","type":"proceedings-article","created":{"date-parts":[[2011,7,20]],"date-time":"2011-07-20T20:53:14Z","timestamp":1311195194000},"page":"1-5","source":"Crossref","is-referenced-by-count":5,"title":["Security challenges and opportunities in adaptive and reconfigurable hardware"],"prefix":"10.1109","author":[{"given":"Victor","family":"Costan","sequence":"first","affiliation":[]},{"given":"Srinivas","family":"Devadas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2005.05.002"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1519138.1519141"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SASP.2008.4570793"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1049\/ip-cdt:20000485"},{"key":"ref14","article-title":"The trusted execution module: Commodity general-purpose trusted computing","author":"costan","year":"2008","journal-title":"CARDIS"},{"key":"ref15","first-page":"789","article-title":"Differential power analysis","author":"kocher","year":"1999","journal-title":"Adv Cryptology"},{"key":"ref16","first-page":"27","article-title":"Using second-order power analysis to attack DPA resistant software","author":"messerges","year":"2000","journal-title":"Workshop on Cryptographic Hardware and Embedded Systems 2000"},{"key":"ref17","first-page":"104","article-title":"Timing Attacks on Diffie-Helman, RSA, DSS and Print Systems","volume":"96","author":"kocher","year":"0","journal-title":"Proc Advances in Cryptology"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2004.1268856"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2009.2034081"},{"key":"ref4","first-page":"9","article-title":"Secure untrusted data repository (SUNDR)","author":"li","year":"0","journal-title":"Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation-Volume 6 table of contents"},{"year":"0","key":"ref3","article-title":"Trusted Platform Module (TPM) Specifications"},{"key":"ref6","article-title":"Physical unclonable functions for device authentication and secret key generation","author":"suh","year":"0","journal-title":"Proceedings of the 44th Conference on Design Automation"},{"key":"ref5","article-title":"A certified digital signature","author":"merkle","year":"1979","journal-title":"Manuscript"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MDT.2010.25","article-title":"Secure and robust error correction for physical unclonable functions","volume":"27","author":"yu","year":"2010","journal-title":"IEEE Design and Test of Computers"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-24676-3_31","article-title":"Fuzzy extractors: how to generate strong keys from biometrics and print noisy data","author":"dodis","year":"2004","journal-title":"Advances in Cryptology - EUROCRYPT 2004"},{"key":"ref2","first-page":"239","article-title":"Multiprocessor support for event-driven programs","author":"zeldovich","year":"0","journal-title":"Proceedings of the USENIX 2003 Annual Technical Conference"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"article-title":"RFC 2104: HMAC: Keyed-Hashing for Message Authentication","year":"1997","author":"krawczyk","key":"ref9"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/11545262_22","article-title":"On second-order differential power analysis","author":"joye","year":"2005","journal-title":"Cryptographic Hardware and Embedded Systems ? CHES 2005"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2004.1286711"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.01.010"}],"event":{"name":"2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","start":{"date-parts":[[2011,6,5]]},"location":"San Diego, CA, USA","end":{"date-parts":[[2011,6,6]]}},"container-title":["2011 IEEE International Symposium on Hardware-Oriented Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5946040\/5954984\/05954986.pdf?arnumber=5954986","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T03:25:42Z","timestamp":1497929142000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5954986\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/hst.2011.5954986","relation":{},"subject":[],"published":{"date-parts":[[2011,6]]}}}