{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T05:23:44Z","timestamp":1755926624556},"reference-count":9,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T00:00:00Z","timestamp":1635811200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T00:00:00Z","timestamp":1635811200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T00:00:00Z","timestamp":1635811200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,2]]},"DOI":"10.1109\/isi53945.2021.9624778","type":"proceedings-article","created":{"date-parts":[[2021,11,30]],"date-time":"2021-11-30T18:55:42Z","timestamp":1638298542000},"page":"1-6","source":"Crossref","is-referenced-by-count":9,"title":["A Systematic Evaluation of EM and Power Side-Channel Analysis Attacks on AES Implementations"],"prefix":"10.1109","author":[{"given":"Vishnuvardhan","family":"Iyer","sequence":"first","affiliation":[]},{"given":"Meizhi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jaydeep","family":"Kulkarni","sequence":"additional","affiliation":[]},{"given":"Ali E.","family":"Yilmaz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/WMCaS.2019.8732510"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/JSSC.2018.2875112"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/IMS19712.2021.9575028"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/ACCESS.2020.3025022"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1007\/978-3-319-64647-3_3"},{"key":"ref7","article-title":"An adaptive measurement protocol for fine-grained electromagnetic side-channel analysis of cryptographic modules","author":"iyer","year":"2019","journal-title":"M S thesis"},{"year":"2008","author":"mangard","journal-title":"Power Analysis Attacks","key":"ref2"},{"year":"2002","author":"mohan","journal-title":"POWER ELECTRONICS Converters Applications and Design","key":"ref9"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/CICC51472.2021.9431524"}],"event":{"name":"2021 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2021,11,2]]},"location":"San Antonio, TX, USA","end":{"date-parts":[[2021,11,3]]}},"container-title":["2021 IEEE International Conference on Intelligence and Security Informatics (ISI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9624673\/9624675\/09624778.pdf?arnumber=9624778","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:53:48Z","timestamp":1652187228000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9624778\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,2]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/isi53945.2021.9624778","relation":{},"subject":[],"published":{"date-parts":[[2021,11,2]]}}}