{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T09:01:13Z","timestamp":1767085273966,"version":"3.30.2"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,8,28]],"date-time":"2024-08-28T00:00:00Z","timestamp":1724803200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,8,28]],"date-time":"2024-08-28T00:00:00Z","timestamp":1724803200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,8,28]]},"DOI":"10.1109\/pst62714.2024.10788048","type":"proceedings-article","created":{"date-parts":[[2024,12,16]],"date-time":"2024-12-16T19:15:09Z","timestamp":1734376509000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["Hardware Implementation of a Hybrid Dynamic Gold Code-Based Countermeasure Against Side-Channel Attacks"],"prefix":"10.1109","author":[{"given":"Thai-Ha","family":"Tran","sequence":"first","affiliation":[{"name":"Univ. of Electro-Communications,Dept. of Computer and Network Engr.,Tokyo,Japan"}]},{"given":"Duc-Thuan","family":"Dam","sequence":"additional","affiliation":[{"name":"Univ. of Electro-Communications,Dept. of Computer and Network Engr.,Tokyo,Japan"}]},{"given":"Binh","family":"Kieu-Do-Nguyen","sequence":"additional","affiliation":[{"name":"Univ. of Electro-Communications,Dept. of Computer and Network Engr.,Tokyo,Japan"}]},{"given":"Van-Phuc","family":"Hoang","sequence":"additional","affiliation":[{"name":"Institute of System Integration, Le Quy Don Technical Univ.,Hanoi,Vietnam"}]},{"given":"Trong-Thuc","family":"Hoang","sequence":"additional","affiliation":[{"name":"Univ. of Electro-Communications,Dept. of Computer and Network Engr.,Tokyo,Japan"}]},{"given":"Cong-Kha","family":"Pham","sequence":"additional","affiliation":[{"name":"Univ. of Electro-Communications,Dept. of Computer and Network Engr.,Tokyo,Japan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2016.2566262"},{"key":"ref2","first-page":"1","article-title":"RFTC: Runtime Frequency Tuning Countermeasure Using FPGA Dynamic Reconfiguration to Mitigate Power Analysis Attacks","volume-title":"Proc. of ACMIIEEE Design Auto. Conf. (DAC)","author":"Jayasinghe","year":"2019"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/FPL50879.2020.00041"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD45719.2019.8942112"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30122-3_3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3583781.3590295"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-75343-6"},{"volume-title":"Wireless Communication Systems in Matlab: Second Edition","year":"2020","author":"Srinivasan","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2046250"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2019.2926555"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.15803\/ijnc.11.2_154"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2004.831584"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2023.3237957"},{"issue":"22","key":"ref14","volume-title":"NIST special publication 800\u201322: A statistical test suite for the validation of random number generators and pseudo random number generators for cryptographic applications","volume":"800","author":"Rukhin","year":"2010"},{"key":"ref15","article-title":"AIS 31: Functionality classes and evaluation methodology for true (physical) random number generators, version 3.1","author":"Killmann","year":"2001","journal-title":"BSI, Bonn"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10970-7_9"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2023.3339810"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2022.i4.589-613"}],"event":{"name":"2024 21st Annual International Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2024,8,28]]},"location":"Sydney, Australia","end":{"date-parts":[[2024,8,30]]}},"container-title":["2024 21st Annual International Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10788036\/10788037\/10788048.pdf?arnumber=10788048","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,17]],"date-time":"2024-12-17T05:51:14Z","timestamp":1734414674000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10788048\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,28]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/pst62714.2024.10788048","relation":{},"subject":[],"published":{"date-parts":[[2024,8,28]]}}}