{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:54:37Z","timestamp":1729612477401,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,12]]},"DOI":"10.1109\/icecs.2009.5411008","type":"proceedings-article","created":{"date-parts":[[2010,2,17]],"date-time":"2010-02-17T20:26:26Z","timestamp":1266438386000},"page":"351-354","source":"Crossref","is-referenced-by-count":1,"title":["Updates on the potential of clock-less logics to strengthen cryptographic circuits against side-channel attacks"],"prefix":"10.1109","author":[{"given":"Sylvain","family":"Guilley","sequence":"first","affiliation":[]},{"given":"Sumanta","family":"Chaudhuri","sequence":"additional","affiliation":[]},{"given":"Laurent","family":"Sauvage","sequence":"additional","affiliation":[]},{"given":"Jean-Luc","family":"Danger","sequence":"additional","affiliation":[]},{"given":"Taha","family":"Beyrouthy","sequence":"additional","affiliation":[]},{"given":"Laurent","family":"Fesquet","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1109\/EDCC-7.2008.11","article-title":"Setup Time Violation Attacks on AES","author":"selmane","year":"2008","journal-title":"EDCC The seventh European Dependable Computing Conference"},{"article-title":"Asynchronous Circuit Design","year":"2003","author":"myers","key":"ref3"},{"key":"ref10","article-title":"Multi-Linear cryptanalysis in Power Analysis Attacks: MLPA","volume":"abs 906 237","author":"roche","year":"2009","journal-title":"CoRR"},{"key":"ref6","first-page":"6","article-title":"Security Evaluation of a Balanced Quasi-Delay Insensitive Library","author":"guilley","year":"2008","journal-title":"DCIS"},{"journal-title":"Proc 2009 Western European Workshop on Research in Cryptology","article-title":"Multi-Linear cryptanalysis in Power Analysis Attacks: MLPA","year":"2009","key":"ref11"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2009.40"},{"key":"ref12","first-page":"2","article-title":"Physically Secure Cryptographic Computations: From Micro to Nano Electronic Devices","author":"quisquater","year":"0","journal-title":"DSN Workshop on Dependable and Secure Nanocomputing (WDSN) IEEE Computer Society June 28 2007 Invited Talk"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ASYNC.2002.1000311"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.109"},{"key":"ref2","first-page":"388","article-title":"Differential Power Analysis","volume":"1666","author":"kocher","year":"1999","journal-title":"Proc CRYPTO '99 LNCS"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/S0141-9331(03)00092-9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1201\/9780849387692"}],"event":{"name":"2009 16th IEEE International Conference on Electronics, Circuits and Systems - (ICECS 2009)","start":{"date-parts":[[2009,12,13]]},"location":"Yasmine Hammamet, Tunisia","end":{"date-parts":[[2009,12,16]]}},"container-title":["2009 16th IEEE International Conference on Electronics, Circuits and Systems - (ICECS 2009)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5403223\/5410749\/05411008.pdf?arnumber=5411008","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T04:57:35Z","timestamp":1497848255000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5411008\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icecs.2009.5411008","relation":{},"subject":[],"published":{"date-parts":[[2009,12]]}}}