{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:40:56Z","timestamp":1730299256395,"version":"3.28.0"},"reference-count":5,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T00:00:00Z","timestamp":1718582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T00:00:00Z","timestamp":1718582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,17]]},"DOI":"10.1109\/svcc61185.2024.10637361","type":"proceedings-article","created":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T17:53:34Z","timestamp":1724349214000},"page":"1-3","source":"Crossref","is-referenced-by-count":0,"title":["Side-Channel Protected PIPO Implementation in Hardware"],"prefix":"10.1109","author":[{"given":"Jaeseung","family":"Han","sequence":"first","affiliation":[{"name":"Kookmin University,Department of Financial Information Security,Seoul,Republic of Korea"}]},{"given":"Yeon-Jae","family":"Kim","sequence":"additional","affiliation":[{"name":"LIGNex1,Cyber Warfare Team,Seongnam,Republic of Korea"}]},{"given":"Dong-Guk","family":"Han","sequence":"additional","affiliation":[{"name":"Kookmin University,Department of Information Security, Cryptology, and Mathematics,Seoul,Republic of Korea"}]}],"member":"263","reference":[{"key":"ref1","first-page":"529","article-title":"Threshold implementations against side-channel attacks and glitches","volume-title":"Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings","volume":"4307","author":"Nikova"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2996366.2996426"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i1.305-342"},{"key":"ref4","first-page":"99","article-title":"PIPO: A lightweight block cipher with efficient higher-order masking software implementations","volume-title":"Information Security and Cryptology - ICISC 2020 - 23rd International Conference, Seoul, South Korea, December 2-4, 2020, Proceedings","volume":"12593","author":"Kim"},{"key":"ref5","first-page":"187","article-title":"Masking at gate level in the presence of glitches","volume-title":"Cryptographic Hardware and Embedded Systems CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings","volume":"3659","author":"Fischer","year":"2005"}],"event":{"name":"2024 Silicon Valley Cybersecurity Conference (SVCC)","start":{"date-parts":[[2024,6,17]]},"location":"Seoul, Korea, Republic of","end":{"date-parts":[[2024,6,19]]}},"container-title":["2024 Silicon Valley Cybersecurity Conference (SVCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10637325\/10637304\/10637361.pdf?arnumber=10637361","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T08:54:45Z","timestamp":1725440085000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10637361\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,17]]},"references-count":5,"URL":"https:\/\/doi.org\/10.1109\/svcc61185.2024.10637361","relation":{},"subject":[],"published":{"date-parts":[[2024,6,17]]}}}