{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T10:26:11Z","timestamp":1773051971533,"version":"3.50.1"},"reference-count":24,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2021YFB3100903"],"award-info":[{"award-number":["2021YFB3100903"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006606","name":"Natural Science Foundation of Tianjin","doi-asserted-by":"publisher","award":["22JCQNJC00970"],"award-info":[{"award-number":["22JCQNJC00970"]}],"id":[{"id":"10.13039\/501100006606","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Circuits Syst. I"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1109\/tcsi.2023.3288600","type":"journal-article","created":{"date-parts":[[2023,7,7]],"date-time":"2023-07-07T19:09:05Z","timestamp":1688756945000},"page":"5025-5035","source":"Crossref","is-referenced-by-count":22,"title":["Side Channel Security Oriented Evaluation and Protection on Hardware Implementations of Kyber"],"prefix":"10.1109","volume":"70","author":[{"given":"Yiqiang","family":"Zhao","sequence":"first","affiliation":[{"name":"School of Microelectronics, Tianjin University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-1823-1642","authenticated-orcid":false,"given":"Shijian","family":"Pan","sequence":"additional","affiliation":[{"name":"School of Microelectronics, Tianjin University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7118-9379","authenticated-orcid":false,"given":"Haocheng","family":"Ma","sequence":"additional","affiliation":[{"name":"School of Microelectronics, Tianjin University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4505-7495","authenticated-orcid":false,"given":"Ya","family":"Gao","sequence":"additional","affiliation":[{"name":"School of Microelectronics, Tianjin University, Tianjin, China"}]},{"given":"Xintong","family":"Song","sequence":"additional","affiliation":[{"name":"School of Microelectronics, Tianjin University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1443-9279","authenticated-orcid":false,"given":"Jiaji","family":"He","sequence":"additional","affiliation":[{"name":"School of Microelectronics, Tianjin University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8791-0597","authenticated-orcid":false,"given":"Yier","family":"Jin","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3422178"},{"key":"ref2","volume-title":"CRYSTALS-Kyber Algorithm Specifications and Supporting Documentation","author":"Avanzi","year":"2020"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_25"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2020.i3.307-335"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2021.3122997"},{"key":"ref6","volume-title":"Power analysis attack on Kyber","author":"Karlov","year":"2021"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30530-7_7"},{"key":"ref8","volume-title":"Drop by drop you break the rock-exploiting generic vulnerabilities in lattice-based PKE\/KEMs using EM-based physical attacks","author":"Ravi","year":"2020"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3029521"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i2.328-356"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/tc.2021.3112052"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3179683"},{"key":"ref13","first-page":"527","article-title":"PQC-SEP: Power side-channel evaluation platform for post-quantum cryptography algorithms","volume":"2022","author":"Park","year":"2022","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17259-6_18"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i4.173-214"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2022.i1.414-460"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-66626-2_7"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90553-8_3"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICFPT56656.2022.9974404"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD53106.2021.00094"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3587037"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78375-8_12"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i1.142-174"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-17234-2_15"}],"container-title":["IEEE Transactions on Circuits and Systems I: Regular Papers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8919\/10363413\/10175157.pdf?arnumber=10175157","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T02:00:40Z","timestamp":1705024840000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10175157\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12]]},"references-count":24,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tcsi.2023.3288600","relation":{},"ISSN":["1549-8328","1558-0806"],"issn-type":[{"value":"1549-8328","type":"print"},{"value":"1558-0806","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12]]}}}