{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T10:55:01Z","timestamp":1766400901312},"reference-count":35,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2014,2,1]],"date-time":"2014-02-01T00:00:00Z","timestamp":1391212800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Circuits Syst. I"],"published-print":{"date-parts":[[2014,2]]},"DOI":"10.1109\/tcsi.2013.2278350","type":"journal-article","created":{"date-parts":[[2013,8,23]],"date-time":"2013-08-23T18:02:36Z","timestamp":1377280956000},"page":"429-442","source":"Crossref","is-referenced-by-count":51,"title":["Effectiveness of Leakage Power Analysis Attacks on DPA-Resistant Logic Styles Under Process Variations"],"prefix":"10.1109","volume":"61","author":[{"given":"Massimo","family":"Alioto","sequence":"first","affiliation":[]},{"given":"Simone","family":"Bongiovanni","sequence":"additional","affiliation":[]},{"given":"Milena","family":"Djukanovic","sequence":"additional","affiliation":[]},{"given":"Giuseppe","family":"Scotti","sequence":"additional","affiliation":[]},{"given":"Alessandro","family":"Trifiletti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","year":"0"},{"key":"ref32","first-page":"443","article-title":"A unified framework for the analysis of Side-Channel key recovery attacks","author":"standaert","year":"2009","journal-title":"Proc EUROCRYPT 2009 LNCS 5479 Springer 2009"},{"key":"ref31","first-page":"129","article-title":"A formal study of power variability issues and side-channel attacks for nanoscale devices","author":"renauld","year":"2011","journal-title":"Proc EUROCRYPT 2011 LNCS 6632 Springer"},{"key":"ref30","first-page":"354","article-title":"Prototype IC with WDDL and differential Routing?DPA resistance assessment","volume":"3659","author":"tiri","year":"2005","journal-title":"Proc CHES '05 ser LNCS Springer"},{"key":"ref35","first-page":"13","article-title":"Template attacks, proc. of ches '02 lncs","volume":"2523","author":"chari","year":"2002","journal-title":"Proc CHES '02 LNCS"},{"key":"ref34","first-page":"426","article-title":"Mutual information Analysis?a generic Side-Channel distinguisher","volume":"5154","author":"gierlichs","year":"2008","journal-title":"Proc CHES '08 LNCS"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2010.2046505"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1629911.1629977"},{"key":"ref12","year":"0","journal-title":"Int Tech Roadmap for Semiconductors (2008)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2003.821546"},{"key":"ref14","first-page":"252","article-title":"Leakage-based differential power analysis (LDPA) on sub-90nm CMOS cryptosystems","author":"lin","year":"2008","journal-title":"Proc IEEE Int Symp Circuits Syst (ISCAS)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2003.1253591"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2009.2015327"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2009.1"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1228784.1228808"},{"key":"ref19","first-page":"355","article-title":"Leakage power analysis of cryptographic devices implemented in nanometer CMOS technologies","author":"giancane","year":"2007","journal-title":"Konferencija 9-a 07 Konferenciju za Elektroniku Telekomunikacije Racunarstvo Automatiku I Nuklearnu Tehniku Herceg Novi"},{"key":"ref4","first-page":"388","article-title":"Differential power analysis","author":"kocher","year":"1999","journal-title":"Proc Crypto'99"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/BF02294164"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.2005.193806"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/370155.370308"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2005.855939"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2004.1268856"},{"key":"ref29","article-title":"Serpent: A proposal for the advanced encryption standard","author":"anderson","year":"1998","journal-title":"Nat Inst Standards Technol"},{"key":"ref8","first-page":"403","article-title":"A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards","author":"tiri","year":"2002","journal-title":"Proceedings of the 28th European Solid-State Circuits Conference ESSCIRC"},{"key":"ref7","first-page":"172","article-title":"Masked Dual-Rail Pre-charge logic: DPA resistance without routing constraints","volume":"3659","author":"popp","year":"2005","journal-title":"Proc CHES'05"},{"key":"ref2","author":"mangard","year":"2007","journal-title":"Power Analysis Attacks Revealing the Secrets of Smart Cards"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2002.1004593"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1007\/11894063_19","article-title":"Three-Phase Dual-Rail Pre-Charge logic","author":"bucci","year":"2006","journal-title":"Proc Cryptographic Hardware and Embedded Syst ?CHES 2006 8th Int Workshop Lecture Notes in Computer Sci Springer"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICM.2009.5418592"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCEE.2009.28"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2009.2019411"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2011.5937998"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICECS.2009.5410929"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177732503"},{"key":"ref25","author":"rabaey","year":"2003","journal-title":"Digital Integrated CircuitsA Design Perspective"}],"container-title":["IEEE Transactions on Circuits and Systems I: Regular Papers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8919\/6722960\/06585802.pdf?arnumber=6585802","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:32:00Z","timestamp":1642005120000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6585802\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2]]},"references-count":35,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tcsi.2013.2278350","relation":{},"ISSN":["1549-8328","1558-0806"],"issn-type":[{"value":"1549-8328","type":"print"},{"value":"1558-0806","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,2]]}}}