{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:38:16Z","timestamp":1729611496582,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/iscisc.2016.7736449","type":"proceedings-article","created":{"date-parts":[[2016,11,7]],"date-time":"2016-11-07T21:27:30Z","timestamp":1478554050000},"page":"38-45","source":"Crossref","is-referenced-by-count":0,"title":["A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption"],"prefix":"10.1109","author":[{"given":"Morteza","family":"Safaeipour","sequence":"first","affiliation":[]},{"given":"Mahmoud","family":"Salmasizadeh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1007\/978-3-540-74735-2_31"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1007\/978-3-319-16763-3_3"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1007\/978-3-319-16763-3_4"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1007\/978-3-642-34961-4_14"},{"key":"ref14","article-title":"The SIMON and SPECK families of lightweight block ciphers","author":"beaulieu","year":"2013","journal-title":"IACR Cryptology ePrint Archive Report"},{"year":"0","journal-title":"Rev 1142EAVR02\/03","article-title":"ATmega163L Datasheet","key":"ref15"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1007\/3-540-48059-5_15"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1007\/3-540-48405-1_26","article-title":"Towards sound approaches to counteract power-analysis attacks","author":"chari","year":"1999","journal-title":"InAdvances in Cryptology?CRYPTO'99"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1007\/978-1-4419-8080-9"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/1878921.1878933"},{"key":"ref8","first-page":"1","article-title":"Formally proved security of assembly code against power analysis: a case study on balanced logic","author":"rauzy","year":"2015","journal-title":"Journal of Cryptographic Engineering"},{"year":"0","author":"hoogvorst","article-title":"Software implementation of dual-rail representation","key":"ref7"},{"key":"ref2","volume":"31","author":"mangard","year":"2008","journal-title":"Power Analysis Attacks Revealing the Secrets of Smart Cards"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","article-title":"differential power analysis","volume":"1666","author":"kocher","year":"1999","journal-title":"Advances in Cryptology-CRYPTO'99"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1007\/BFb0052352"}],"event":{"name":"2016 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC)","start":{"date-parts":[[2016,9,7]]},"location":"Tehran","end":{"date-parts":[[2016,9,8]]}},"container-title":["2016 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7604981\/7736436\/07736449.pdf?arnumber=7736449","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T03:01:52Z","timestamp":1498359712000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7736449\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/iscisc.2016.7736449","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}