{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:48:41Z","timestamp":1762004921437,"version":"3.37.3"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T00:00:00Z","timestamp":1512086400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. VLSI Syst."],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/tvlsi.2017.2715188","type":"journal-article","created":{"date-parts":[[2017,7,3]],"date-time":"2017-07-03T18:09:20Z","timestamp":1499105360000},"page":"3268-3280","source":"Crossref","is-referenced-by-count":11,"title":["Using Scan Side Channel to Detect IP Theft"],"prefix":"10.1109","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1603-1365","authenticated-orcid":false,"given":"Leonid","family":"Azriel","sequence":"first","affiliation":[]},{"given":"Ran","family":"Ginosar","sequence":"additional","affiliation":[]},{"given":"Shay","family":"Gueron","sequence":"additional","affiliation":[]},{"given":"Avi","family":"Mendelson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007616604496"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139814782"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/780542.780574"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-0000(03)00047-3"},{"journal-title":"Bitcoin Double SHA256 Project","year":"2016","author":"peng","key":"ref37"},{"journal-title":"Developer Guide&#x2014;Bitcoin","year":"2016","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/T-C.1973.223640"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/54.867894"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2010.5513117"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2007.911623"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2004.828122"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14712-8_17"},{"journal-title":"Machine Learning","year":"1997","author":"mitchell","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/VLSID.2012.88"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/NEWCAS.2011.5981325"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2011.5955005"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2013.2257903"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70215"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_2"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/378239.378568"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2014.2304492"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2011.2135868"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2007.22"},{"journal-title":"The Complexity of Boolean Functions","year":"1987","author":"wegener","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2163307"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2012.6224313"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/4.826826"},{"journal-title":"Intellectual Property Protection in VLSI Design","year":"2004","author":"qu","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CICC.1998.694985"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2006.1628506"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2013.2274619"},{"article-title":"Exploiting the scan side channel for reverse engineering of a VLSI device","year":"2016","author":"azriel","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ETS.2005.36"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ASQED.2009.5206228"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3060403.3060464"},{"key":"ref26","first-page":"235","article-title":"Secure hash standard","author":"pub","year":"1995"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2013.264"}],"container-title":["IEEE Transactions on Very Large Scale Integration (VLSI) Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/92\/8118264\/07967626.pdf?arnumber=7967626","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:25:29Z","timestamp":1642004729000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7967626\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":37,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tvlsi.2017.2715188","relation":{},"ISSN":["1063-8210","1557-9999"],"issn-type":[{"type":"print","value":"1063-8210"},{"type":"electronic","value":"1557-9999"}],"subject":[],"published":{"date-parts":[[2017,12]]}}}