{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T20:32:03Z","timestamp":1740169923939,"version":"3.37.3"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2017,7,1]],"date-time":"2017-07-01T00:00:00Z","timestamp":1498867200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"VLSI-SOC","award":["2015"],"award-info":[{"award-number":["2015"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Topics Comput."],"published-print":{"date-parts":[[2017,7,1]]},"DOI":"10.1109\/tetc.2016.2551044","type":"journal-article","created":{"date-parts":[[2016,4,5]],"date-time":"2016-04-05T16:08:25Z","timestamp":1459872505000},"page":"317-328","source":"Crossref","is-referenced-by-count":2,"title":["Timing Attack and Countermeasure on NEMS Relay Based Design of Block Ciphers"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1833-4725","authenticated-orcid":false,"given":"Bodhisatwa","family":"Mazumdar","sequence":"first","affiliation":[]},{"given":"Samah Mohamed","family":"Saeed","sequence":"additional","affiliation":[]},{"given":"Sk Subidh","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Ozgur","family":"Sinanoglu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1049\/ip-cdt:19960789"},{"year":"2015","author":"banciu","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2009.5272349"},{"year":"0","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/11847083_13"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.1991.185307"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/EDAC.1991.206358"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.1993.580029"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1687399.1687490"},{"key":"ref11","first-page":"306","article-title":"Design and analysis of hybrid nems-cmos circuits for ultra low-power applications","author":"dadgour","year":"0","journal-title":"Proc ACM\/IEEE Des Autom Conf"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IEDM.2011.6131645"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/92.920820"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1978.1675141"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1109\/TCAD.2012.2232707","article-title":"Combinational logic design using six-terminal nem relays","volume":"32","author":"lee","year":"2013","journal-title":"IEEE Trans Comput -Aided Des Integr Circuits Syst"},{"key":"ref16","first-page":"688","article-title":"Symbolic manipulation of Boolean functions using a graphical representation","author":"bryant","year":"0","journal-title":"Proc Conf Des Autom"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/LICS.1990.113767"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/43.238030"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IEDM.2009.5424383"},{"key":"ref28","first-page":"69","article-title":"Pushing the limits: A very compact and a threshold implementation of AES","author":"moradi","year":"0","journal-title":"Proc 30th Annu Int Conf Theory Appl Cryptographic Tech Adv Cryptol"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ATS.2014.69"},{"journal-title":"The Design of Rijndael AES - The Advanced Encryption Standard","year":"2002","author":"daemen","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2010.2074370"},{"key":"ref6","first-page":"104","article-title":"Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems","author":"kocher","year":"0","journal-title":"Proc Annu Int Cryptol Conf Adv Cryptol"},{"key":"ref29","first-page":"39","article-title":"Camellia: A 128-bit block cipher suitable for multiple platforms - design and analysis","author":"aoki","year":"0","journal-title":"Proc 7th Ann Int l Workshop Selected Areas in Cryptography"},{"key":"ref5","first-page":"388","article-title":"Differential power analysis","author":"kocher","year":"0","journal-title":"Proc Annu Int Cryptol Conf Adv Cryptol"},{"key":"ref8","first-page":"145","article-title":"Side-channel attacks from static power: When should we care?","author":"pozo","year":"0","journal-title":"Proc Des Autom Test Europe Conf Exhib"},{"key":"ref7","first-page":"29","article-title":"The EM side-channel(s)","author":"agrawal","year":"0","journal-title":"Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2008.4681660"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/VLSI-SoC.2015.7314427"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TNANO.2013.2252923"},{"journal-title":"Micro-Relay Technology for Energy-Efficient Integrated Circuits","year":"2014","author":"chen","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2093145.2093147"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2010.2063411"},{"year":"2012","author":"somenzi","key":"ref24"},{"year":"2013","author":"wolf","key":"ref23"},{"year":"0","key":"ref26","article-title":"National institute of standards and technology, advanced encryption standard, NIST FIPS PUB 197, 2001"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2013.2252951"}],"container-title":["IEEE Transactions on Emerging Topics in Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245516\/8023987\/07447781.pdf?arnumber=7447781","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:41:34Z","timestamp":1641987694000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7447781\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,1]]},"references-count":37,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tetc.2016.2551044","relation":{},"ISSN":["2168-6750"],"issn-type":[{"type":"electronic","value":"2168-6750"}],"subject":[],"published":{"date-parts":[[2017,7,1]]}}}