{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:52:53Z","timestamp":1729637573400,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/iscas.2015.7169070","type":"proceedings-article","created":{"date-parts":[[2015,7,30]],"date-time":"2015-07-30T17:31:36Z","timestamp":1438277496000},"page":"2009-2012","source":"Crossref","is-referenced-by-count":1,"title":["Challenges in designing trustworthy cryptographic co-processors"],"prefix":"10.1109","author":[{"given":"Ricardo","family":"Graves","sequence":"first","affiliation":[]},{"given":"Giorgio","family":"Di Natale","sequence":"additional","affiliation":[]},{"given":"Lejla","family":"Batina","sequence":"additional","affiliation":[]},{"given":"Shivam","family":"Bhasin","sequence":"additional","affiliation":[]},{"given":"Baris","family":"Ege","sequence":"additional","affiliation":[]},{"given":"Apostolos","family":"Fournaris","sequence":"additional","affiliation":[]},{"given":"Nele","family":"Mentens","sequence":"additional","affiliation":[]},{"given":"Stjepan","family":"Picek","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Regazzoni","sequence":"additional","affiliation":[]},{"given":"Vladimir","family":"Rozic","sequence":"additional","affiliation":[]},{"given":"Nicolas","family":"Sklavos","sequence":"additional","affiliation":[]},{"given":"Bohan","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1109\/SP.2007.36","article-title":"Trojan detection using IC fingerprinting","author":"agrawal","year":"2007","journal-title":"Security and Privacy 2007 SP'07 IEEE Symposium on"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/TVLSI.2010.2093547"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/HASE.2008.37"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1007\/3-540-45418-7_17","article-title":"ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smard Cards","volume":"2140","author":"quisquater","year":"2001","journal-title":"Smart Card Programming and Security (E-smart 2001) Ser LNCS"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/978-3-642-04138-9_8","article-title":"Algebraic side-channel attacks on the AES: Why time also matters in DPA","author":"renauld","year":"2009","journal-title":"Cryptographic Hardware and Embedded Systems-CHES 2009"},{"year":"2001","author":"menezes","article-title":"Handbook of Applied Cryptography","key":"ref12"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/978-3-642-28368-0_18","article-title":"An Updated Survey on Secure ECC Implementations: Attacks, Countermeasures and Cost","volume":"6805","author":"fan","year":"2012","journal-title":"Cryptography and Security From Theory to Applications Ser Lecture Notes in Computer Science"},{"key":"ref14","first-page":"292","article-title":"Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems","author":"coron","year":"1999","journal-title":"Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems ser CHES 1999"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-29656-7","author":"joye","year":"2012","journal-title":"Fault Analysis in Cryptography"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1007\/3-540-38424-3_1"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1007\/3-540-47555-9_7"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1007\/11596219_5"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1007\/1-4020-8147-2_9"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1145\/1558607.1558671"},{"key":"ref4","first-page":"9","article-title":"Physical unclonable functions for device authentication and secret key generation","author":"suh","year":"2007","journal-title":"Proceedings of the 44th Annual Design Automation Conference ACM"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/FDTC.2013.15"},{"key":"ref3","first-page":"167","article-title":"A Closer Look at Security in Random Number Generators Design","author":"fischer","year":"2012","journal-title":"COSADE"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/FDTC.2013.19"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/HST.2011.5954989"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/978-3-642-33027-8_17","article-title":"PUFs: Myth, fact or busted? A security evaluation of physically unclonable functions (PUFs) cast in silicon","author":"katzenbeisser","year":"2012","journal-title":"Cryptographic Hardware and Embedded Systems-CHES 2012"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","article-title":"Differential Power Analysis","author":"kocher","year":"1999","journal-title":"Advances in Cryptology - CRYPTO 99 LNCS 1666"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/JPROC.2005.862424"},{"key":"ref2","first-page":"2005","article-title":"Defense science board task force on high performance microchip supply","author":"defense","year":"2005","journal-title":"Washington DC"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/11605805_1","article-title":"Cache Attacks and Countermeasures: The Case of AES","author":"osvik","year":"2006","journal-title":"Proceedings of the 2006 The Cryptographers' Track at the RSA Conference on Topics in Cryptology ser CT-RSA'06"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1080\/19393555.2014.891283"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1007\/11502760_29","article-title":"DPA attacks and S-boxes","author":"prouff","year":"2005","journal-title":"Fast Software Encryption"},{"key":"ref22","article-title":"A Proposal for: Functionality classes for random number generators","author":"killmann","year":"2011","journal-title":"ser BDI Bonn"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1007\/978-3-642-33027-8_14"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/ISCAS.2009.5118446"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1007\/978-3-662-44709-3_29"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/HST.2013.6581572"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/DATE.2012.6176635"}],"event":{"name":"2015 IEEE International Symposium on Circuits and Systems (ISCAS)","start":{"date-parts":[[2015,5,24]]},"location":"Lisbon, Portugal","end":{"date-parts":[[2015,5,27]]}},"container-title":["2015 IEEE International Symposium on Circuits and Systems (ISCAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7152138\/7168553\/07169070.pdf?arnumber=7169070","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T11:49:08Z","timestamp":1602676148000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7169070"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/iscas.2015.7169070","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}