{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T11:53:16Z","timestamp":1725450796734},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/iscas.2014.6865614","type":"proceedings-article","created":{"date-parts":[[2014,7,30]],"date-time":"2014-07-30T17:16:29Z","timestamp":1406740589000},"page":"2233-2236","source":"Crossref","is-referenced-by-count":3,"title":["Method for designing multi-channel RNS architectures to prevent power analysis SCA"],"prefix":"10.1109","author":[{"given":"Hector","family":"Pettenghi","sequence":"first","affiliation":[]},{"given":"Jude Angelo","family":"Ambrose","sequence":"additional","affiliation":[]},{"given":"Ricardo","family":"Chaves","sequence":"additional","affiliation":[]},{"given":"Leonel","family":"Sousa","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36400-5_11"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2012.2220460"},{"journal-title":"Inc UMC High Density Standards Cells Library-0 13?m CMOS Process v2 3","year":"2010","key":"16"},{"journal-title":"Residue Arithmetic and its Applications to Computer Technology","year":"1967","author":"szabo","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/12.16508"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.1994.409201"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2004.840400"},{"key":"3","article-title":"Power analysis breaks elliptic curve cryptosystems even secure against the timing attack","author":"okeya","year":"2000","journal-title":"INDOCRYPT"},{"journal-title":"Resistance against differential power analysis for elliptic curve cryptosystems","year":"1999","author":"coron","key":"2"},{"key":"1","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-48405-1_25","article-title":"Differential power analysis","author":"kocher","year":"1999","journal-title":"Lecture Notes in Computer Science"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cdt:20060059"},{"key":"7","article-title":"Combining leak-resistant arithmetic for elliptic curves defined over Fp and RNS representation","author":"bajard","year":"2010","journal-title":"IACR ePrint Archive"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxr119"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1093\/ietfec\/e89-a.1.231"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2010.5456907"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cds.2012.0367"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2009.5396175"}],"event":{"name":"2014 IEEE International Symposium on Circuits and Systems (ISCAS)","start":{"date-parts":[[2014,6,1]]},"location":"Melbourne VIC, Australia","end":{"date-parts":[[2014,6,5]]}},"container-title":["2014 IEEE International Symposium on Circuits and Systems (ISCAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6852006\/6865048\/06865614.pdf?arnumber=6865614","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T13:37:35Z","timestamp":1498138655000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6865614\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/iscas.2014.6865614","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}