{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:32:21Z","timestamp":1730302341766,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,16]],"date-time":"2021-09-16T00:00:00Z","timestamp":1631750400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,16]],"date-time":"2021-09-16T00:00:00Z","timestamp":1631750400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,16]],"date-time":"2021-09-16T00:00:00Z","timestamp":1631750400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,16]]},"DOI":"10.1109\/vdat53777.2021.9601132","type":"proceedings-article","created":{"date-parts":[[2021,11,10]],"date-time":"2021-11-10T23:41:04Z","timestamp":1636587664000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["A Randomized Montgomery Powering Ladder Exponentiation for Side-Channel Attack Resilient RSA and Leakage Assessment"],"prefix":"10.1109","author":[{"given":"Venkata Reddy","family":"Kolagatla","sequence":"first","affiliation":[]},{"given":"Mervin","family":"J","sequence":"additional","affiliation":[]},{"given":"Shabbir","family":"Darbar","sequence":"additional","affiliation":[]},{"given":"David","family":"Selvakumar","sequence":"additional","affiliation":[]},{"given":"Sankha","family":"Saha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"291","article-title":"The Montgomery Powering Ladder","volume":"2523","author":"joye","year":"2002","journal-title":"Proc CHES &#x2018;02"},{"key":"ref11","first-page":"303","article-title":"DPA Countermeasures by Improving the Window Method","author":"itoh","year":"2002","journal-title":"Proc CHES &#x2018;02"},{"key":"ref12","first-page":"1","article-title":"A secure exponentiation algorithm resistant to a combined attack on RSA implementation","volume":"91","author":"kim","year":"2014","journal-title":"Int&#x2019;l Journal of Computer Mathematics"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2016.0508"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1080\/23335777.2019.1637944"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1080\/10798587.2015.1118909"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICADE.2012.6330119"},{"key":"ref17","article-title":"Efficient side-channel testing for public key algorithms: RSA case study","author":"jaffe","year":"2011","journal-title":"Non-Invasive Attack Testing Workshop NIST Computer Security Division"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"800","DOI":"10.1016\/j.procs.2020.04.087","article-title":"A Low Latency Montgomery Modular Exponentiation","volume":"171","author":"venkata reddy","year":"2020","journal-title":"Proc Comp Sc"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISEMC.2010.5711254"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SBAC-PAD.2007.28"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_9"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICM.2012.6471439"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/12.869328"},{"journal-title":"Handbook of Applied Cryptography","year":"1996","author":"menezes","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48059-5_25"}],"event":{"name":"2021 25th International Symposium on VLSI Design and Test (VDAT)","start":{"date-parts":[[2021,9,16]]},"location":"Surat, India","end":{"date-parts":[[2021,9,18]]}},"container-title":["2021 25th International Symposium on VLSI Design and Test (VDAT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9600867\/9600899\/09601132.pdf?arnumber=9601132","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:50:51Z","timestamp":1652201451000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9601132\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,16]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/vdat53777.2021.9601132","relation":{},"subject":[],"published":{"date-parts":[[2021,9,16]]}}}