{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:07:20Z","timestamp":1730272040065,"version":"3.28.0"},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,5]]},"DOI":"10.1109\/iscas.2009.5118413","type":"proceedings-article","created":{"date-parts":[[2009,7,1]],"date-time":"2009-07-01T14:59:27Z","timestamp":1246460367000},"page":"2918-2921","source":"Crossref","is-referenced-by-count":0,"title":["Evaluation of Simple\/Comparative Power Analysis against an RSA ASIC implementation"],"prefix":"10.1109","author":[{"given":"Atsushi","family":"Miyamoto","sequence":"first","affiliation":[]},{"given":"Naofumi","family":"Homma","sequence":"additional","affiliation":[]},{"given":"Takafumi","family":"Aoki","sequence":"additional","affiliation":[]},{"given":"Akashi","family":"Satoh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/40.502403"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.2307\/2007970"},{"key":"1","first-page":"388","article-title":"differential power analysis, crypto 1999, lecture notes in computer","volume":"1666","author":"kocher","year":"1999","journal-title":"Science"},{"key":"7","first-page":"269","article-title":"the doubling attack -why upwards is better than downawards, ches 2003, lecture notes in computer","volume":"2779","author":"fouque","year":"2003","journal-title":"Science"},{"key":"6","first-page":"228","article-title":"a dpa attack against the modular reduction within a crt implementation of rsa, ches 2002, lecture notes in computer","volume":"2523","author":"boer","year":"2002","journal-title":"Science"},{"year":"0","key":"5"},{"journal-title":"Research Center for Information Security AIST","year":"0","key":"4"},{"key":"9","first-page":"15","article-title":"collision-based power analysis of modular exponentiation using chosen-message pairs, ches 2008, lecture notes in computer","volume":"5154","author":"homma","year":"2008","journal-title":"Science"},{"key":"8","first-page":"183","article-title":"power analysis by exploiting chosen message and internal collisions - vulnerability of checking mechanism for rsa-decryption., mycrypt 2005, lecture notes in computer","volume":"3715","author":"yen","year":"2005","journal-title":"Science"}],"event":{"name":"2009 IEEE International Symposium on Circuits and Systems - ISCAS 2009","start":{"date-parts":[[2009,5,24]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2009,5,27]]}},"container-title":["2009 IEEE International Symposium on Circuits and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5076158\/5117665\/05118413.pdf?arnumber=5118413","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T17:34:31Z","timestamp":1489772071000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5118413\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,5]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/iscas.2009.5118413","relation":{},"subject":[],"published":{"date-parts":[[2009,5]]}}}