{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:11:06Z","timestamp":1773155466929,"version":"3.50.1"},"reference-count":34,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001381","name":"National Research Foundation Singapore Under Its Campus for Research Excellence and Technological Enterprise (CREATE) Programme With the Technical University of Munich at TUMCREATE","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst."],"published-print":{"date-parts":[[2020,10]]},"DOI":"10.1109\/tcad.2019.2960337","type":"journal-article","created":{"date-parts":[[2019,12,17]],"date-time":"2019-12-17T21:07:18Z","timestamp":1576616838000},"page":"2166-2177","source":"Crossref","is-referenced-by-count":2,"title":["A First Study of Compressive Sensing for Side-Channel Leakage Sampling"],"prefix":"10.1109","volume":"39","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9679-6223","authenticated-orcid":false,"given":"Changhai","family":"Ou","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0795-4977","authenticated-orcid":false,"given":"Chengju","family":"Zhou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8346-2635","authenticated-orcid":false,"given":"Siew-Kei","family":"Lam","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.05.007"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85053-3_26"},{"key":"ref31","first-page":"407","article-title":"First principal components analysis: A new side channel distinguisher","author":"souissi","year":"2010","journal-title":"Proc Int Conf Inf Secur Cryptol (ICISC)"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/11602897_15"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2012.2218810"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-43283-0_10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.871582"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49890-3_10"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/11545262_19"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29485-8_13"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_25"},{"key":"ref16","first-page":"334","article-title":"The widths of certain finite dimensional sets and classes of smooth functions","volume":"41","author":"kashin","year":"1977","journal-title":"Izvestia"},{"key":"ref17","first-page":"388","article-title":"Differential power analysis","author":"kocher","year":"1999","journal-title":"Proc 19th Annu Int Cryptol Conf Adv Cryptol (CRYPTO)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_31"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/78.258082"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s00365-007-9003-x"},{"key":"ref4","first-page":"1","article-title":"Kernel discriminant analysis for information extraction in the presence of masking","author":"cagli","year":"2016","journal-title":"Proc Revised Select Papers 15th Int Conf Smart Card Res Adv Appl (CARDIS)"},{"key":"ref27","first-page":"440","article-title":"Practical template attacks","author":"rechberger","year":"2004","journal-title":"Proc 5th Int Workshop Inf Security Appl (WISA)"},{"key":"ref3","first-page":"15","article-title":"Enhancing dimensionality reduction methods for side-channel attacks","author":"cagli","year":"2015","journal-title":"Proc Revised Select Papers 14th Int Conf Smart Card Res Adv Appl (CARDIS)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.862083"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2015.2413384"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s10208-004-0162-x"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1137\/S003614450037906X"},{"key":"ref7","first-page":"13","article-title":"Template attacks","author":"chari","year":"2002","journal-title":"Proc Revised Papers 4th Int Workshop Cryptograph Hardw Embedded Syst (CHES)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2016006"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3322465"},{"key":"ref20","author":"mangard","year":"2007","journal-title":"Power Analysis Attacks&#x2014;Revealing the Secrets of Smart Cards"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1859204.1859229"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"209","DOI":"10.46586\/tches.v2018.i1.209-237","article-title":"Leakage detection with the $\\chi^{2}$ -test","volume":"2018","author":"moradi","year":"2018","journal-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems"},{"key":"ref24","first-page":"82","article-title":"Enhancing simple power-analysis attacks on elliptic curve cryptosystems","author":"oswald","year":"2002","journal-title":"Proc 9th Int Workshop Cryptograph Hardw Embed Syst (CHES)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2010.2042412"},{"key":"ref26","first-page":"1","article-title":"Power-based side-channel instruction-level disassembler","author":"park","year":"2018","journal-title":"Proc 55th Annu Design Autom Conf (DAC)"},{"key":"ref25","first-page":"1112","article-title":"Manifold learning towards masking implementations: A first study","volume":"2017","author":"ou","year":"2017","journal-title":"IACR Cryptology ePrint"}],"container-title":["IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/43\/9204502\/08935387.pdf?arnumber=8935387","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T14:06:16Z","timestamp":1651068376000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8935387\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10]]},"references-count":34,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tcad.2019.2960337","relation":{},"ISSN":["0278-0070","1937-4151"],"issn-type":[{"value":"0278-0070","type":"print"},{"value":"1937-4151","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10]]}}}