{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:42:49Z","timestamp":1730274169382,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/isicir.2014.7029532","type":"proceedings-article","created":{"date-parts":[[2015,2,10]],"date-time":"2015-02-10T14:52:27Z","timestamp":1423579947000},"page":"21-24","source":"Crossref","is-referenced-by-count":3,"title":["Investigating measurement methods for high-resolution electromagnetic field side-channel analysis"],"prefix":"10.1109","author":[{"given":"Robert","family":"Specht","sequence":"first","affiliation":[{"name":"Fraunhofer Institute AISEC Munich, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Johann","family":"Heyszl","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute AISEC Munich, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Georg","family":"Sigl","sequence":"additional","affiliation":[{"name":"Technische Univerit\u00e4t M\u00fcnchen Munich, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"journal-title":"Power Analysis Attacks Revealing the Secrets of Smart Cards","year":"2007","author":"mangard","key":"13"},{"key":"11","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/978-3-642-27954-6_15","article-title":"Localized electromagnetic analysis of cryptographic implementations","author":"heyszl","year":"2012","journal-title":"Topics in Cryptology-CT-RSA 2012"},{"key":"12","article-title":"Clustering algorithms for non-profiled single-execution attacks on exponentiations","author":"heyszl","year":"2013","journal-title":"CARDIS 2013"},{"key":"3","article-title":"The em side-channel(s)","author":"agrawal","year":"2002","journal-title":"CHES"},{"journal-title":"Differential power analysis","year":"1999","author":"kocher","key":"2"},{"journal-title":"Timing Attacks on Implementations of Diffie-Hellman RSA DSS and Other Systems","year":"1996","author":"kocher","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2005.12.013"},{"key":"7","first-page":"573","volume":"20","author":"dehbaoui","year":"2012","journal-title":"Enhancing Electromagnetic Analysis Using Magnitude Squared Incoherence"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2009.5090745"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1502781.1502785"},{"key":"4","article-title":"Strengths and limitations of high-resolution electromagnetic field measurements for side-channel analysis","author":"heyszl","year":"2012","journal-title":"CARDIS"},{"key":"9","article-title":"Electromagnetic sidechannel attack against 28-nm fpga device","author":"hori","year":"2012","journal-title":"Pre-proceedings of WISA"},{"journal-title":"Enhancing Electromagnetic Side-channel Analysis in An Operational Environment","year":"2013","author":"montminy","key":"8"}],"event":{"name":"2014 International Symposium on Integrated Circuits (ISIC)","start":{"date-parts":[[2014,12,10]]},"location":"Singapore","end":{"date-parts":[[2014,12,12]]}},"container-title":["2014 International Symposium on Integrated Circuits (ISIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7005969\/7029433\/07029532.pdf?arnumber=7029532","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T09:56:12Z","timestamp":1623146172000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7029532\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/isicir.2014.7029532","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}