{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T15:51:05Z","timestamp":1725724265637},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2008,5,1]],"date-time":"2008-05-01T00:00:00Z","timestamp":1209600000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2008,5,1]],"date-time":"2008-05-01T00:00:00Z","timestamp":1209600000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,5]]},"DOI":"10.1109\/iscas.2008.4542133","type":"proceedings-article","created":{"date-parts":[[2008,6,16]],"date-time":"2008-06-16T16:26:17Z","timestamp":1213633577000},"page":"3178-3181","source":"Crossref","is-referenced-by-count":2,"title":["Turning liabilities into assets: Exploiting deep submicron CMOS technology to design secure embedded circuits"],"prefix":"10.1109","author":[{"given":"Patrick","family":"Schaumont","sequence":"first","affiliation":[{"name":"Virginia Tech, Blacksburg, 24061, USA"}]},{"given":"David D.","family":"Hwang","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA 22030, USA"}]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2007.250627"},{"journal-title":"Trust in Integrated Circuits","year":"0","key":"22"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/40.782564"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2005.859470"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/775832.775920"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/54.655183"},{"journal-title":"Security Engineering","year":"2001","author":"anderson","key":"13"},{"key":"14","first-page":"141","article-title":"subthreshold leakage modeling and reduction techniques","author":"kao","year":"2002","journal-title":"IEEE International Conference on Computer-Aided Design"},{"key":"11","article-title":"how to implement high-security in low-cost fpgas","author":"moran","year":"0","journal-title":"Programmable Logic DesignLine CMP Publishers 12\/4\/06"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.136"},{"article-title":"implementation of dpa-resistant circuit for fpga","year":"2007","author":"yu","key":"21"},{"key":"3","article-title":"apple's drm cracked again","author":"bylund","year":"2006","journal-title":"Arstechnica"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2006.243978"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1132469.1132500"},{"key":"1","first-page":"13","article-title":"keeping secrets in hardware: the microsoft xbox case study","author":"huang","year":"2002","journal-title":"CHES 2002"},{"journal-title":"Offline Hardware\/Software Authentication for Reconfigurable Platforms","year":"2006","author":"simpson","key":"10"},{"key":"7","article-title":"semi-invasive attacks - a new approach to hardware security analysis","author":"skorobogatov","year":"2005","journal-title":"Tech Rep UCAM-CL-TR-630"},{"key":"6","article-title":"identity-based encryption from the weil pairing","author":"boneh","year":"2001","journal-title":"Advances in Cryptology - Proceedings of CRYPTO"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2007.52"},{"journal-title":"Keylength com - Cyrptographic Key Length Recommendation","year":"0","author":"giry","key":"4"},{"key":"9","article-title":"rfid-tags for anti-counterfeiting","author":"tuyls","year":"2006","journal-title":"Topics in Cryptology"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.36"}],"event":{"name":"2008 IEEE International Symposium on Circuits and Systems (ISCAS)","start":{"date-parts":[[2008,5,18]]},"location":"Seattle, WA, USA","end":{"date-parts":[[2008,5,21]]}},"container-title":["2008 IEEE International Symposium on Circuits and Systems (ISCAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4534149\/4541329\/04542133.pdf?arnumber=4542133","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,16]],"date-time":"2024-02-16T01:23:24Z","timestamp":1708046604000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4542133\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,5]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/iscas.2008.4542133","relation":{},"subject":[],"published":{"date-parts":[[2008,5]]}}}