{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T09:16:58Z","timestamp":1773825418561,"version":"3.50.1"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/hst.2018.8383904","type":"proceedings-article","created":{"date-parts":[[2018,6,14]],"date-time":"2018-06-14T19:36:11Z","timestamp":1529004971000},"page":"147-152","source":"Crossref","is-referenced-by-count":14,"title":["Comparison of cost of protection against differential power analysis of selected authenticated ciphers"],"prefix":"10.1109","author":[{"given":"William","family":"Diehl","sequence":"first","affiliation":[]},{"given":"Abubakr","family":"Abdulgadir","sequence":"additional","affiliation":[]},{"given":"Farnoud","family":"Farahmand","sequence":"additional","affiliation":[]},{"given":"Jens-Peter","family":"Kaps","sequence":"additional","affiliation":[]},{"given":"Kris","family":"Gaj","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40026-1_7"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9086-6"},{"key":"ref10","author":"dobraunig","year":"2016","journal-title":"Ascon v1 2"},{"key":"ref11","author":"iwata","year":"2016","journal-title":"CLOC and SILC"},{"key":"ref12","author":"wu","year":"2016","journal-title":"The JAMBU Lightweight Authentication Encryption Mode (v2 1)"},{"key":"ref13","author":"bertoni","year":"2016","journal-title":"CAESAR submission Ketje v2"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2017.06.003"},{"key":"ref15","year":"2017","journal-title":"GMU Source Code of Round 3 and Round 2 CAESAR Candidates AES-GCM AES AES-HLS and Keccak Permutation F"},{"key":"ref16","author":"huang","year":"2017","journal-title":"Round 3 Hardware Submission ACORN"},{"key":"ref17","author":"iwata","year":"2017","journal-title":"HW for CLOC and SILC 64-bit BC"},{"key":"ref18","author":"huang","year":"2017","journal-title":"SIMON-JAMBU"},{"key":"ref19","author":"bertoni","year":"2017","journal-title":"Ketje-Keyak Team"},{"key":"ref28","author":"homsirikamol","year":"2017","journal-title":"Implementers Guide to the CAESAR Hardware API v2 0"},{"key":"ref4","article-title":"George Mason University","year":"2016","journal-title":"Flexible Open-source workBench fOr Side-channel analysis (FOBOS)"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/978-3-642-20465-4_6","article-title":"Pushing the Limits: A Very Compact and a Threshold Implementation of AES","author":"moradi","year":"2011","journal-title":"Advances in Cryptology-Eurocrypt 2011"},{"key":"ref3","article-title":"Test Vector Leakage Assessment (TVLA) Methodology in Practice","author":"cooper","year":"2013","journal-title":"International Cryptographic Module Conference"},{"key":"ref6","year":"2016","journal-title":"Addendum to the CAE-SAR Hardware API v1 0"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68914-0_27"},{"key":"ref5","volume":"2016","author":"homsirikamol","year":"2016","journal-title":"CAESAR Hardware API&#x201D; Cryptology ePrint Archive Report"},{"key":"ref8","article-title":"Recommendation for Block Cipher Modes of Operation: Galois\/Counter Mode (GCM) and GMAC","author":"dworkin","year":"2007","journal-title":"NIST SP 800-38A"},{"key":"ref7","article-title":"George Mason University","year":"2017","journal-title":"Development Package for the CAESAR Hardware API v2 0"},{"key":"ref2","author":"bernstein","year":"2016","journal-title":"Cryptographic Competitions"},{"key":"ref9","author":"wu","year":"2016","journal-title":"ACORN A Lightweight Authenticated Cipher"},{"key":"ref1","year":"2012","journal-title":"CAESAR Competition for Authenticated Encryption Security Applicability and Robustness"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","article-title":"Differential Power Analysis","volume":"99","author":"kocher","year":"1999","journal-title":"Advances in Cryptology-CRYPTO"},{"key":"ref22","article-title":"A Testing Methodology for Side Channel Resistance Validation","author":"goodwill","year":"2011","journal-title":"NIST Non-invasive Attack Testing Workshop"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2017.8280130"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2614504"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-016-0120-y"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/978-3-319-06734-6_17","article-title":"A More Efficient AES Threshold Implementation","author":"bilgin","year":"2014","journal-title":"Progress in Cryptology-AFRICACRYPT 2014"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1007\/11935308_38","article-title":"Threshold Implementations Against Side-Channel Attacks and Glitches","author":"nikova","year":"2006","journal-title":"Information and Communications Security"}],"event":{"name":"2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","location":"Washington, DC","start":{"date-parts":[[2018,4,30]]},"end":{"date-parts":[[2018,5,4]]}},"container-title":["2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8369415\/8383882\/08383904.pdf?arnumber=8383904","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,2]],"date-time":"2018-07-02T21:31:31Z","timestamp":1530567091000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8383904\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/hst.2018.8383904","relation":{},"subject":[],"published":{"date-parts":[[2018,4]]}}}