{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T04:15:24Z","timestamp":1751602524245,"version":"3.41.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/samos.2017.8344636","type":"proceedings-article","created":{"date-parts":[[2018,4,23]],"date-time":"2018-04-23T23:33:43Z","timestamp":1524526423000},"page":"246-252","source":"Crossref","is-referenced-by-count":1,"title":["Location-based leakages: New directions in modeling and exploiting"],"prefix":"10.1109","author":[{"given":"Christos","family":"Andrikos","sequence":"first","affiliation":[]},{"given":"Giorgos","family":"Rassias","sequence":"additional","affiliation":[]},{"given":"Liran","family":"Lerman","sequence":"additional","affiliation":[]},{"given":"Kostas","family":"Papagiannopoulos","sequence":"additional","affiliation":[]},{"given":"Lejla","family":"Batina","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1007\/978-3-642-01001-9_26","article-title":"A unified framework for the analysis of side-channel key recovery attacks","author":"standaert","year":"2009","journal-title":"Advances in Cryptology-EUROCRYPT 2009 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques"},{"key":"ref11","first-page":"13","article-title":"Template attacks","author":"chari","year":"2002","journal-title":"4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1007\/11545262_3","article-title":"A stochastic model for differential side channel cryptanalysis","author":"schindler","year":"2005","journal-title":"7th International Workshop on Cryptographic Hardware and Embedded Systems CHES 2005"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2005.12.013"},{"key":"ref14","first-page":"529","article-title":"Threshold implementations against side-channel attacks and glitches","author":"nikova","year":"2006","journal-title":"Information and Communications Security 8th International Conference ICICS 2006"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1007\/978-3-642-15031-9_28","article-title":"Provably secure higher-order masking of AES","author":"rivain","year":"2010","journal-title":"Cryptographic Hardware and Embedded Systems CHES 2010 12th International Workshop"},{"journal-title":"Detection Estimation and Modulation Theory Part IV Optimum Array Processing","year":"0","author":"maurine","key":"ref16"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1002\/0471221104","author":"van trees","year":"2002","journal-title":"Detection Estimation and Modulation Theory Part IV Optimum Array Processing"},{"key":"ref18","first-page":"13","author":"chari","year":"2003","journal-title":"Template Attacks"},{"key":"ref19","first-page":"253","article-title":"Efficient template attacks","author":"choudary","year":"2013","journal-title":"Smart Card Research and Advanced Application Conference-CARDIS 2013"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISICIR.2014.7029532"},{"key":"ref3","first-page":"231","article-title":"Localized electromagnetic analysis of cryptographic implementations","author":"heyszl","year":"2012","journal-title":"Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2012.6176671"},{"key":"ref5","first-page":"41","author":"schl\u00f6sser","year":"2012","journal-title":"Simple Photonic Emission Analysis of AES"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-011-0010-2"},{"key":"ref7","first-page":"272","article-title":"Dissecting leakage resilient prfs with multivariate localized EM attacks-A practical security evaluation on FPGA","volume":"2017","author":"unterstein","year":"2017","journal-title":"COSADE"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-014-0078-6"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","article-title":"Differential power analysis","author":"kocher","year":"1999","journal-title":"Advances in Cryptology-CRYPTO '99 19th Annual International Cryptology Conference"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MICROW.2012.12"}],"event":{"name":"2017 International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS)","start":{"date-parts":[[2017,7,17]]},"location":"Pythagorion, Greece","end":{"date-parts":[[2017,7,20]]}},"container-title":["2017 International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8337645\/8344598\/08344636.pdf?arnumber=8344636","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T22:02:46Z","timestamp":1751580166000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8344636\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/samos.2017.8344636","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}