{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T03:48:30Z","timestamp":1730260110067,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1109\/ictel.2009.5158645","type":"proceedings-article","created":{"date-parts":[[2009,7,7]],"date-time":"2009-07-07T18:18:41Z","timestamp":1246990721000},"page":"208-212","source":"Crossref","is-referenced-by-count":1,"title":["Key dependent operation and algorithm specific complexity of statistical side channel attacks"],"prefix":"10.1109","author":[{"given":"Jens","family":"Rudinger","sequence":"first","affiliation":[]},{"given":"Adolf","family":"Finger","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1016\/j.istr.2006.05.005"},{"key":"ref3","first-page":"388","article-title":"Differential power analysis","volume":"1666","author":"kocher","year":"1999"},{"year":"1999","journal-title":"Tech Rep","article-title":"Key schedule analysis of aes candidates","key":"ref10"},{"key":"ref6","first-page":"151","article-title":"Investigations of power analysis attacks on Smartcards","author":"messerges","year":"1999","journal-title":"USENIX"},{"key":"ref5","first-page":"104","article-title":"Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems","volume":"1109","author":"kocher","year":"1996"},{"year":"2002","author":"daemen","journal-title":"The Design of Rijndael AES&#x2014 The Advanced Encryption Standard","key":"ref8"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/ICN.2007.18"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1007\/3-540-38424-3_1"},{"year":"1999","author":"schneier","journal-title":"The Twofish Encryption Algorithm","key":"ref9"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1007\/3-540-48285-7_33"}],"event":{"name":"2009 International Conference on Telecommunications","start":{"date-parts":[[2009,5,25]]},"location":"Marrakech, Morroco","end":{"date-parts":[[2009,5,27]]}},"container-title":["2009 International Conference on Telecommunications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5089941\/5158601\/05158645.pdf?arnumber=5158645","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T17:27:50Z","timestamp":1489771670000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5158645\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/ictel.2009.5158645","relation":{},"subject":[],"published":{"date-parts":[[2009]]}}}