{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T19:05:31Z","timestamp":1757703931056,"version":"3.44.0"},"reference-count":7,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/reconfig48160.2019.8994807","type":"proceedings-article","created":{"date-parts":[[2020,2,14]],"date-time":"2020-02-14T03:23:28Z","timestamp":1581650608000},"page":"1-5","source":"Crossref","is-referenced-by-count":7,"title":["On the Influence of the FPGA Compiler Optimization Options on the Success of the Horizontal Attack"],"prefix":"10.1109","author":[{"given":"Ievgen","family":"Kabin","sequence":"first","affiliation":[{"name":"IHP-Leibniz-Institut fiir innovative Mikroelektronik,Frankfurt (Oder),Germany"}]},{"given":"Alejandro","family":"Sosa","sequence":"additional","affiliation":[{"name":"IHP-Leibniz-Institut fiir innovative Mikroelektronik,Frankfurt (Oder),Germany"}]},{"given":"Zoya","family":"Dyka","sequence":"additional","affiliation":[{"name":"IHP-Leibniz-Institut fiir innovative Mikroelektronik,Frankfurt (Oder),Germany"}]},{"given":"Dan","family":"Klann","sequence":"additional","affiliation":[{"name":"IHP-Leibniz-Institut fiir innovative Mikroelektronik,Frankfurt (Oder),Germany"}]},{"given":"Peter","family":"Langendoerfer","sequence":"additional","affiliation":[{"name":"BTU Cottbus-Senftenberg,Cottbus,Germany"}]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47238-6_12"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1007\/3-540-48059-5_27","article-title":"Fast Multiplication on Elliptic Curves Over GF(2m) without precomputation","volume":"1717","author":"l\u00f3pez","year":"1999","journal-title":"Cryptographic Hardware and Embedded Systems"},{"journal-title":"Hardwarebee List of FPGA Companies","year":"2018","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/RECONFIG.2018.8641732"},{"journal-title":"User Guide UG1192 (v2 2)","article-title":"Xilinx Design Flow for Intel FPGA and SoC Users","year":"2018","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2018.8328695"},{"key":"ref1","article-title":"Horizontal Attacks against ECC: from Simulations to ASIC","author":"kabin","year":"2019","journal-title":"Proc of International workshop on Information & Operational Technology (IT & OT) security systems (IOSec"}],"event":{"name":"2019 International Conference on ReConFigurable Computing and FPGAs (ReConFig)","start":{"date-parts":[[2019,12,9]]},"location":"Cancun, Mexico","end":{"date-parts":[[2019,12,11]]}},"container-title":["2019 International Conference on ReConFigurable Computing and FPGAs (ReConFig)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8974168\/8994692\/08994807.pdf?arnumber=8994807","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T18:14:25Z","timestamp":1757096065000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8994807\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":7,"URL":"https:\/\/doi.org\/10.1109\/reconfig48160.2019.8994807","relation":{},"subject":[],"published":{"date-parts":[[2019,12]]}}}