{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T11:31:19Z","timestamp":1725449479353},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,9]]},"DOI":"10.1109\/icnss.2011.6060012","type":"proceedings-article","created":{"date-parts":[[2011,11,1]],"date-time":"2011-11-01T20:59:24Z","timestamp":1320181164000},"page":"264-268","source":"Crossref","is-referenced-by-count":0,"title":["Channel state information based key generation vs. side-channel analysis key information leakage"],"prefix":"10.1109","author":[{"family":"Huiyun Li","sequence":"first","affiliation":[]},{"family":"Qi Zhang","sequence":"additional","affiliation":[]},{"family":"Hai Yuan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2009.5384826"},{"key":"ref11","first-page":"388","article-title":"Differential power analysis","author":"kocher","year":"0","journal-title":"Proc 19th International Advances in Cryptology Conference &#x2013;CRYPTO 1999"},{"key":"ref12","first-page":"104","article-title":"Timing attacks on implementations of Diffie&#x2013;Hellman, RSA, DSS, and other systems","author":"kocher","year":"0","journal-title":"Proc 16th International Advances in Cryptology Conference &#x2013; CRYPTO 1996"},{"key":"ref13","first-page":"251","article-title":"Electromagnetic analysis: concrete results","author":"gandolfi","year":"0","journal-title":"Cryptographic Hardware and Embedded Systems CHES 2001"},{"key":"ref14","first-page":"200","article-title":"ElectroMagnetic Analysis (EMA): measures and counter-measures for smart cards","author":"quisquater","year":"0","journal-title":"in Proceedings of e-Smart 2001"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.261613"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055917"},{"key":"ref17","first-page":"171","article-title":"Cryptanalysis of Diffie&#x2013;Hellman, RSA, DSS, and other cryptosystems using timing attacks","author":"kocher","year":"0","journal-title":"Proc 15th International Advances in Cryptology Conference - CRYPTO 1995"},{"key":"ref18","first-page":"280","article-title":"Security evaluation against electromagnetic analysis at design time","author":"li","year":"0","journal-title":"Cryptographic Hardware and Embedded Systems - CHES 2005"},{"key":"ref19","first-page":"29","article-title":"The EM side-channel(s)","author":"agrawal","year":"0","journal-title":"Proc of Cryptographic Hardware and Embedded Systems-CHES 2002"},{"key":"ref4","first-page":"732","article-title":"A secret key agreement scheme with multi-level quantization and parity check using fluctuation of radio channel property","author":"yasukawa","year":"0","journal-title":"Proc IEEE International Symposium on Information Theory 2008"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934929"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2005.858853"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.902666"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2004.830257"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.356"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT.2006.341996"},{"key":"ref2","first-page":"1495","article-title":"A private key agreement scheme based on fluctuations of BER in wireless communications","author":"kitano","year":"0","journal-title":"Proc 9th International Conference on Advanced Communication Technology 2007"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409960"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/26.385951"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2007.378771"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2009.5205823"},{"article-title":"RSSI-receive signal strength indicator, broadband acronyms","year":"0","author":"iyer","key":"ref21"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45539-6_24","article-title":"Information-theoretic key agreement: from weak to strong secrecy for free","author":"maurer","year":"0","journal-title":"Advances in Cryptology-EUROCRYPT 2000"},{"key":"ref23","first-page":"292","article-title":"Resistance against differential power analysis for elliptic curve cryptosystems","author":"coron","year":"0","journal-title":"Cryptographic Hardware and Embedded Systems?CHES 1999"},{"key":"ref26","article-title":"On the Effectiveness of Secret Key Extraction Using Wireless Signal Strength in Real Environments","author":"jana","year":"0","journal-title":"ACM MobiCom 2009"},{"journal-title":"CC1000 - Single Chip Very Low Power RF Transceiver","year":"0","key":"ref25"}],"event":{"name":"2011 5th International Conference on Network and System Security (NSS)","start":{"date-parts":[[2011,9,6]]},"location":"Milan, Italy","end":{"date-parts":[[2011,9,8]]}},"container-title":["2011 5th International Conference on Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6044613\/6059944\/06060012.pdf?arnumber=6060012","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T08:56:13Z","timestamp":1497948973000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6060012\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/icnss.2011.6060012","relation":{},"subject":[],"published":{"date-parts":[[2011,9]]}}}