{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:42:53Z","timestamp":1730274173233,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/isicir.2014.7029537","type":"proceedings-article","created":{"date-parts":[[2015,2,10]],"date-time":"2015-02-10T09:52:27Z","timestamp":1423561947000},"page":"34-37","source":"Crossref","is-referenced-by-count":0,"title":["Constructive side-channel analysis for secure hardware design"],"prefix":"10.1109","author":[{"given":"Alexander","family":"Herrmann","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marc","family":"Stottinger","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"13","first-page":"30","article-title":"A stochastic model for differential side channel cryptanalysis","author":"schindler","year":"2005","journal-title":"CHES"},{"key":"14","first-page":"215","article-title":"On the relationship between correlation power analysis and the stochastic approach: An ASIC designer","author":"de santis","year":"2013","journal-title":"INDOCRYPT"},{"key":"11","first-page":"443","article-title":"A unified framework for the analysis of side-channel key recovery attacks","author":"standaert","year":"2009","journal-title":"Eurocrypt"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1109\/FPT.2010.5681772"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1109\/DSD.2011.103"},{"key":"2","first-page":"248","article-title":"Strengths and limitations of high-resolution electromagnetic field measurements for side-channel analysis","author":"heyszl","year":"2012","journal-title":"CARDIS"},{"key":"1","first-page":"50","article-title":"Learning from electromagnetic emanations-a case study for imdpl","author":"kirschbaum","year":"2011","journal-title":"COSADE"},{"key":"10","first-page":"16","article-title":"Correlation power analysis with a leakage model","author":"brier","year":"2004","journal-title":"CHES"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1007\/s13389-011-0010-2"},{"year":"2007","author":"mangard","journal-title":"Power Analysis Attacks-revealing the Secrets of Smart Cards","key":"6"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1109\/TC.2012.154"},{"key":"4","first-page":"125","article-title":"Correlation-enhanced power analysis collision attack","author":"moradi","year":"2010","journal-title":"CHES"},{"key":"9","first-page":"76","article-title":"Pinpointing the side-channel leakage of masked AES hardware implementations CHES","volume":"4249","author":"mangard","year":"2006","journal-title":"LNCS"},{"key":"8","first-page":"13","article-title":"Template attacks","author":"chari","year":"2002","journal-title":"CHES"}],"event":{"name":"2014 International Symposium on Integrated Circuits (ISIC)","start":{"date-parts":[[2014,12,10]]},"location":"Singapore","end":{"date-parts":[[2014,12,12]]}},"container-title":["2014 International Symposium on Integrated Circuits (ISIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7005969\/7029433\/07029537.pdf?arnumber=7029537","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T21:27:40Z","timestamp":1490304460000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7029537\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/isicir.2014.7029537","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}