{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:40:40Z","timestamp":1761648040323,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1109\/reconfig.2012.6416743","type":"proceedings-article","created":{"date-parts":[[2013,1,30]],"date-time":"2013-01-30T17:52:35Z","timestamp":1359568355000},"page":"1-6","source":"Crossref","is-referenced-by-count":10,"title":["Efficient and side-channel resistant authenticated encryption of FPGA bitstreams"],"prefix":"10.1109","author":[{"given":"Andrey","family":"Bogdanov","sequence":"first","affiliation":[]},{"given":"Amir","family":"Moradi","sequence":"additional","affiliation":[]},{"given":"Tolga","family":"Yalcin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"125","article-title":"Correlation-enhanced power analysis collision attack","volume":"6225","author":"moradi","year":"2010","journal-title":"CHES 2010"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68914-0_27"},{"key":"18","first-page":"157","article-title":"Successfully attacking masked aes hardware implementations","volume":"3659","author":"mangard","year":"2005","journal-title":"CHES 2005"},{"journal-title":"Power Analysis Attacks Revealing the Secrets of Smart Cards","year":"2007","author":"mangard","key":"15"},{"key":"16","first-page":"413","article-title":"A side-channel analysis resistant description of the aes sbox","volume":"3557","author":"oswald","year":"2005","journal-title":"FSE 2005"},{"key":"13","first-page":"111","author":"moradi","year":"2011","journal-title":"On the Vulnerability of FPGA Bitstream Encryption Against Power Analysis AttacksExtracting Keys From Xilinx Virtex-II FPGAs"},{"key":"14","first-page":"1","article-title":"Black-box side-channel attacks highlight the importance of countermeasures-an analysis of the xilinx virtex-4 and virtex-5 bitstream encryption mechanism","volume":"7178","author":"moradi","year":"2012","journal-title":"CT-RSA 2012 LNCS"},{"key":"11","first-page":"73","volume":"4419","author":"drimer","year":"2007","journal-title":"Authentication of FPGA Bitstreams Why and How ARC 2007 LNCS"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1950413.1950432"},{"key":"21","first-page":"218","article-title":"Secure hardware implementations of non-linear functions in the presence of glitches","volume":"5461","author":"nikova","year":"2008","journal-title":"ICISC 2008"},{"key":"20","first-page":"529","article-title":"Threshold implementations against side-channel attacks and glitches","volume":"4307","author":"nikova","year":"2006","journal-title":"ICIC 2006"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9085-7"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9086-6"},{"key":"24","first-page":"76","article-title":"Threshold Implementations of all 3x3 and 4x4 S-boxes","volume":"7428","author":"bilgin","year":"2012","journal-title":"CHES 2012 LNCS"},{"key":"25","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/978-3-642-20465-4_6","article-title":"Pushing the limits: A very compact and a threshold implementation of aes","volume":"6632","author":"moradi","year":"2011","journal-title":"EUROCRYPT 2011"},{"key":"26","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1007\/978-3-642-29011-4_26","article-title":"Statistical tools flavor side-channel collision attacks","volume":"7237","author":"moradi","year":"2012","journal-title":"EUROCRYPT 2012 LNCS"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/502010.502011"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68351-3_5"},{"key":"29","article-title":"The pelican mac function","author":"daemen","year":"2005","journal-title":"Cryptology ePrint Archive"},{"key":"3","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1504\/IJWMC.2011.044106","article-title":"Grain-128a: A new version of grain-128 with optional authentication","volume":"5","author":"gren","year":"2011","journal-title":"IJWMC"},{"year":"0","key":"2"},{"journal-title":"Security for Volatile FPGAs","year":"2009","author":"drimer","key":"10"},{"key":"1","article-title":"Efficient lightweight aes-based authenticated encryption","author":"bogdanov","year":"2012","journal-title":"Directions in Authenticated Ciphers (DIAC 2012)"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.1145\/1754386.1754389","article-title":"SARFUM: Security architecture for remote fpga update and monitoring","volume":"3","author":"badrignans","year":"2010","journal-title":"ACM Transactions on Reconfigurable Technology and Systems"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2008.4629951"},{"key":"5","first-page":"19","article-title":"The hummingbird-2 lightweight authenticated encryption algorithm","volume":"7055","author":"engels","year":"2011","journal-title":"RFIDSec 2011 LNCS"},{"key":"4","first-page":"66","author":"dworkin","year":"2001","journal-title":"Recommendation for Block Cipher Modes of Operation Methods and Techniques"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00641-8_8"},{"key":"8","first-page":"261","article-title":"Bitstream ecnryption and authentication using aes-gcm in dynamically reconfigurable systems","volume":"5312","author":"hori","year":"2008","journal-title":"IWSEC 2008 LNCS"}],"event":{"name":"2012 International Conference on Reconfigurable Computing and FPGAs (ReConFig 2012)","start":{"date-parts":[[2012,12,5]]},"location":"Cancun, Mexico","end":{"date-parts":[[2012,12,7]]}},"container-title":["2012 International Conference on Reconfigurable Computing and FPGAs"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6410219\/6416717\/06416743.pdf?arnumber=6416743","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T02:42:23Z","timestamp":1498012943000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6416743\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/reconfig.2012.6416743","relation":{},"subject":[],"published":{"date-parts":[[2012,12]]}}}