{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:44:13Z","timestamp":1725486253059},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1109\/uic-atc.2017.8397603","type":"proceedings-article","created":{"date-parts":[[2018,6,28]],"date-time":"2018-06-28T18:34:27Z","timestamp":1530210867000},"page":"1-4","source":"Crossref","is-referenced-by-count":0,"title":["Whitenoise encryption implementation with increased robustness to side-channel attacks"],"prefix":"10.1109","author":[{"given":"Mihai","family":"Sima","sequence":"first","affiliation":[]},{"given":"Andre","family":"Brisson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Power Analysis Attacks Revealing the Secrets of Smart Cards","year":"2010","author":"mangard","key":"ref10"},{"journal-title":"On Studying Whitenoise Stream-Cipher Robustness against Power Analysis Attacks","year":"2012","author":"zakeri","key":"ref11"},{"key":"ref12","first-page":"403","article-title":"A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards","author":"tiri","year":"2002","journal-title":"Proceedings of the 28th European Solid-State Circuits Conference ESSCIRC"},{"key":"ref13","first-page":"252","article-title":"Leakage-Based Differential Power Analysis (LDPA) on Sub-90nm CMOS Cryptosystems","author":"lin","year":"2008","journal-title":"Proc IEEE Int Symp on Circuits and Systems (ISCAS 2008)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2009.2019411"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2013.2278350"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/11894063_21","article-title":"Security Evaluation of DPA Countermeasures Using Dual-Rail Pre-charge Logic Style","author":"suzuki","year":"2006","journal-title":"Proc Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES 2006)"},{"key":"ref17","first-page":"35","article-title":"Power-Analysis Attacks on an FPGA-First Experimental Results","author":"\u00f6rs","year":"2003","journal-title":"Proceedings of the 5th International Workshop on Cryptographic Hardware and Embedded Systems (CHES)"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1007\/978-3-540-30117-2_11","article-title":"Power Analysis Attacks Against FPGA Implementations of the DES","author":"standaert","year":"2004","journal-title":"Proc 14th Intl Conf on Field Programmable Logic and Applications (FPL 2004)"},{"key":"ref19","first-page":"2933","article-title":"Differential Power Analysis of a SHACAL-2 Hardware Implementation","author":"lu","year":"2008","journal-title":"Proc IEEE Int Symp on Circuits and Systems (ISCAS 2008)"},{"key":"ref4","article-title":"Evaluation of Whitenoise Cryptosystem. Part 1: Encryption Algorithm","author":"traor\u00e9","year":"2003","journal-title":"Technical Report ECE03-3"},{"journal-title":"PIC10F200\/202\/204\/206 6-Bit 8-Pin Flash Microcontrollers","year":"2014","key":"ref3"},{"journal-title":"Dynamic Distributed Key System and Method for Identity Management Authentication Servers Data Security and Preventing Man-in-the-Middle Attacks","year":"2009","author":"boren","key":"ref6"},{"journal-title":"A Security Evaluation of Whitenoise","year":"2003","author":"wagner","key":"ref5"},{"key":"ref8","first-page":"388","article-title":"Differential Power Analysis","author":"kocher","year":"1999","journal-title":"Proc 19th Annual Int Cryptology Conf (CRYPTO '99)"},{"journal-title":"Dynamic Identity Verification and Authentication Dynamic Distributed Key Infrastructures Dynamic Distributed Key Systems and Method for Identity Management Authentication Servers Data Security and Preventing Man-in-the-Middle Attacks Side Channel Attacks Botnet Attacks and Credit Card and Financial Transaction Fraud Mitigating Biometric False Positives and False Negatives and Controlling Life of Accessible Data in the Cloud","year":"2013","author":"brisson","key":"ref7"},{"key":"ref2","article-title":"Whitenoise Laboratories-An Overview","author":"coram-mekkey","year":"2015","journal-title":"White Paper"},{"key":"ref1","article-title":"The Whitenoise Algorithm-A Visual Look","author":"brisson","year":"2011","journal-title":"Technical Report"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2005.113"},{"key":"ref21","first-page":"134","article-title":"Changing the Odds Against Masked Logic","author":"tiri","year":"2006","journal-title":"Proc 13th Int Workshop on Selected Areas in Cryptography (SAC 2006)"}],"event":{"name":"2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI)","start":{"date-parts":[[2017,8,4]]},"location":"San Francisco, CA","end":{"date-parts":[[2017,8,8]]}},"container-title":["2017 IEEE SmartWorld, Ubiquitous Intelligence &amp; Computing, Advanced &amp; Trusted Computed, Scalable Computing &amp; Communications, Cloud &amp; Big Data Computing, Internet of People and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8386711\/8397387\/08397603.pdf?arnumber=8397603","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T08:10:54Z","timestamp":1643184654000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8397603\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/uic-atc.2017.8397603","relation":{},"subject":[],"published":{"date-parts":[[2017,8]]}}}