{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T17:41:00Z","timestamp":1764783660349,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/isvdat.2014.6881059","type":"proceedings-article","created":{"date-parts":[[2014,8,22]],"date-time":"2014-08-22T16:38:16Z","timestamp":1408725496000},"page":"1-6","source":"Crossref","is-referenced-by-count":9,"title":["Power analysis attack using neural networks with wavelet transform as pre-processor"],"prefix":"10.1109","author":[{"given":"P.","family":"Saravanan","sequence":"first","affiliation":[]},{"given":"P.","family":"Kalpana","sequence":"additional","affiliation":[]},{"given":"V.","family":"Preethisri","sequence":"additional","affiliation":[]},{"given":"V.","family":"Sneha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2007.10.023"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ECCTD.2009.5275004"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2004.832943"},{"key":"15","first-page":"251","article-title":"Electromagnetic analysis: Concrete results","volume":"2162","author":"gandolfi","year":"2001","journal-title":"CHES"},{"key":"16","doi-asserted-by":"crossref","DOI":"10.1201\/9781584887461","author":"walker","year":"2008","journal-title":"A Primer on Wavelets and Their Scientific Applications"},{"key":"13","first-page":"104","article-title":"Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems","author":"kocher","year":"1996","journal-title":"Advances in Cryptology-proceedings of Crypto 96"},{"key":"14","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1007\/3-540-45418-7_17","article-title":"Electromagnetic analysis (EMA): Measures and counter-measures for smart cards","volume":"lncs 2140","author":"quisquater","year":"2001","journal-title":"Proc Smart Card Programming and Security"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2012.6393559"},{"key":"12","first-page":"32","article-title":"Wavelet transform based preprocessing for side channel analysis","author":"debande","year":"2012","journal-title":"Microarchitecture Workshops IEEE Computer Society"},{"key":"3","first-page":"16","article-title":"Correlation power analysis with a leakage model","author":"brier","year":"2004","journal-title":"CHES 2004 LNCS 3156"},{"key":"2","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","article-title":"Differential power analysis","author":"kocher","year":"1999","journal-title":"Advances in Cryptology - CRYPTO 99 LNCS 1666"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6783-0"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2012.6415612"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-011-0023-x"},{"key":"6","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1007\/3-540-57332-1_36","article-title":"Cryptography and machine learning","author":"rivest","year":"1993","journal-title":"Advances in Cryptology Asiacrypt"},{"journal-title":"Machine Learning","year":"1997","author":"mitchell","key":"5"},{"key":"4","first-page":"250","article-title":"EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA","volume":"3659","author":"gebotys","year":"2005","journal-title":"Proceedings of CHES 2005 LNCS"},{"key":"9","article-title":"Novel applications of wavelet transforms based side-channel analysis","author":"souissi","year":"2011","journal-title":"Non-Invasive Attack Testing Workshop"},{"key":"8","first-page":"586","article-title":"Innovative method of the power analysis","volume":"22","author":"martinasek","year":"2013","journal-title":"Radio Engineering"}],"event":{"name":"2014 18th International Symposium on VLSI Design and Test (VDAT)","start":{"date-parts":[[2014,7,16]]},"location":"Coimbatore","end":{"date-parts":[[2014,7,18]]}},"container-title":["18th International Symposium on VLSI Design and Test"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6873898\/6881034\/06881059.pdf?arnumber=6881059","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,12]],"date-time":"2019-04-12T05:27:50Z","timestamp":1555046870000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6881059\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/isvdat.2014.6881059","relation":{},"subject":[],"published":{"date-parts":[[2014,7]]}}}