{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T04:07:18Z","timestamp":1751083638809,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/isvdat.2015.7208064","type":"proceedings-article","created":{"date-parts":[[2015,8,20]],"date-time":"2015-08-20T17:53:11Z","timestamp":1440093191000},"page":"1-6","source":"Crossref","is-referenced-by-count":11,"title":["An improved AES Hardware Trojan benchmark to validate Trojan detection schemes in an ASIC design flow"],"prefix":"10.1109","author":[{"given":"K Sudeendra","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Rakesh","family":"Chanamala","sequence":"additional","affiliation":[]},{"given":"Sauvagya Ranjan","family":"Sahoo","sequence":"additional","affiliation":[]},{"given":"K. K.","family":"Mahapatra","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"51","article-title":"Hardware trojan detection using path delay fingerprint","author":"jin","year":"2008","journal-title":"Proc IEEE Int Workshop Hardware-Oriented Security Trust"},{"key":"ref3","article-title":"Power Analysis attacks-revealing secrets of smart cards","author":"mangard","year":"2007","journal-title":"Springer Science"},{"key":"ref10","first-page":"382","article-title":"Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering","author":"lin","year":"2009","journal-title":"4th international Workshop on Cryptographic Hardware and Embedded Systems (CHES"},{"key":"ref6","article-title":"Hardware Trojan Detection by Multiple Parameter Side-Channel Analysis","volume":"62","author":"narasimahan","year":"2013","journal-title":"IEEE Transactions on Computers"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-010-0115-0"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2012.6224318"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2011.5954998"},{"year":"0","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.7"},{"key":"ref9","first-page":"467","article-title":"Analysis of data-leak hardware Trojans in AES cryptographic circuits","author":"trey","year":"0","journal-title":"2013 IEEE International Conference on Technologies for Homeland Security (HST) HST"},{"journal-title":"Defense Science Board US DoD","article-title":"Report of the Defense Science Board Task Force on High Performance Microchip Supply","year":"2005","key":"ref1"}],"event":{"name":"2015 19th International Symposium on VLSI Design and Test (VDAT)","start":{"date-parts":[[2015,6,26]]},"location":"Ahmedabad, India","end":{"date-parts":[[2015,6,29]]}},"container-title":["2015 19th International Symposium on VLSI Design and Test"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7166536\/7208044\/07208064.pdf?arnumber=7208064","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T18:26:08Z","timestamp":1490379968000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7208064\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/isvdat.2015.7208064","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}