{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:44:24Z","timestamp":1750308264225,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,9,22]],"date-time":"2004-09-22T00:00:00Z","timestamp":1095811200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,9,22]]},"DOI":"10.1145\/1023833.1023874","type":"proceedings-article","created":{"date-parts":[[2004,10,7]],"date-time":"2004-10-07T17:39:48Z","timestamp":1097170788000},"page":"303-311","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Java cryptography on KVM and its performance and security optimization using HW\/SW co-design techniques"],"prefix":"10.1145","author":[{"given":"Yusuke","family":"Matsuoka","sequence":"first","affiliation":[{"name":"University of California, Los Angeles, CA"}]},{"given":"Patrick","family":"Schaumont","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, CA"}]},{"given":"Kris","family":"Tiri","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, CA"}]},{"given":"Ingrid","family":"Verbauwhede","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, CA"}]}],"member":"320","published-online":{"date-parts":[[2004,9,22]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"228","volume-title":"Automation and Test in Europe Conference and Exhibition","author":"Renaudin M.","unstructured":"M. Renaudin , F. Bouesse , Ph. Proust , J. P. Tual , L. Sourgen , F. Germain , \" High Security Smartcards\" , Proceedings of the Design , Automation and Test in Europe Conference and Exhibition Volume I (DATE'04) pp. 228 -- 233 ]] M. Renaudin, F. Bouesse, Ph. Proust, J. P. Tual, L. Sourgen, F. Germain, \"High Security Smartcards\", Proceedings of the Design, Automation and Test in Europe Conference and Exhibition Volume I (DATE'04) pp. 228--233]]"},{"key":"e_1_3_2_1_2_1","first-page":"0","article-title":"Applied Cryptography","volume":"1996","author":"Schneier Bruce","unstructured":"Bruce Schneier , \" Applied Cryptography \", John Wiley & Sons , 1996 ISBN 0 - 471 -12845-7]] Bruce Schneier, \"Applied Cryptography\", John Wiley & Sons, 1996 ISBN 0-471-12845-7]]","journal-title":"John Wiley & Sons"},{"key":"e_1_3_2_1_3_1","unstructured":"J2ME Building Blocks for Mobile Devices - White Paper on KVM and the Connected Limited Device Configuration (CLDC) http:\/\/java.sun.com\/products\/cldc\/wp\/KVMwp.pdf]]  J2ME Building Blocks for Mobile Devices - White Paper on KVM and the Connected Limited Device Configuration (CLDC) http:\/\/java.sun.com\/products\/cldc\/wp\/KVMwp.pdf]]"},{"key":"e_1_3_2_1_4_1","unstructured":"J2ME CLDC 1.1 http:\/\/java.sun.com\/products\/cldc\/index.jsp]]  J2ME CLDC 1.1 http:\/\/java.sun.com\/products\/cldc\/index.jsp]]"},{"key":"e_1_3_2_1_5_1","unstructured":"Java Devices http:\/\/www.microjava.com\/devices]]  Java Devices http:\/\/www.microjava.com\/devices]]"},{"key":"e_1_3_2_1_6_1","unstructured":"Japan NTT DoCoMo's i-mode Article http:\/\/www.peterindia.net\/i-ModeView.html]]  Japan NTT DoCoMo's i-mode Article http:\/\/www.peterindia.net\/i-ModeView.html]]"},{"key":"e_1_3_2_1_7_1","unstructured":"The Bouncy Castle Lightweight API Release 1.20 http:\/\/www.bouncycastle.org\/download\/lcrypto-j2me-120.tar.gz]]  The Bouncy Castle Lightweight API Release 1.20 http:\/\/www.bouncycastle.org\/download\/lcrypto-j2me-120.tar.gz]]"},{"key":"e_1_3_2_1_8_1","unstructured":"IAIK JCE and iSaSiLk APIs http:\/\/jce.iaik.tugraz.at\/download\/evaluation\/index.php]]  IAIK JCE and iSaSiLk APIs http:\/\/jce.iaik.tugraz.at\/download\/evaluation\/index.php]]"},{"key":"e_1_3_2_1_9_1","unstructured":"Intel SA-1110 Processor http:\/\/www.intel.com\/design\/edk\/product\/strongarm_edk.htm]]  Intel SA-1110 Processor http:\/\/www.intel.com\/design\/edk\/product\/strongarm_edk.htm]]"},{"key":"e_1_3_2_1_10_1","unstructured":"The eCos OS http:\/\/sources.redhat.com\/ecos]]  The eCos OS http:\/\/sources.redhat.com\/ecos]]"},{"key":"e_1_3_2_1_11_1","unstructured":"Michael Yuan \"Enterprise J2ME: Developing Mobile Java Applications\" http:\/\/www.enterprisej2me.com\/pages\/enterprisej2me\/book.php]]   Michael Yuan \"Enterprise J2ME: Developing Mobile Java Applications\" http:\/\/www.enterprisej2me.com\/pages\/enterprisej2me\/book.php]]"},{"key":"e_1_3_2_1_12_1","unstructured":"The GEZEL Design Environment http:\/\/www.ee.ucla.edu\/~schaum\/gezel\/]]  The GEZEL Design Environment http:\/\/www.ee.ucla.edu\/~schaum\/gezel\/]]"},{"key":"e_1_3_2_1_13_1","unstructured":"KPIT Cummins GNU Tools & Support http:\/\/www.kpitgnutools.com\/]]  KPIT Cummins GNU Tools & Support http:\/\/www.kpitgnutools.com\/]]"},{"key":"e_1_3_2_1_14_1","unstructured":"Advanced Encryption Standard http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf]]  Advanced Encryption Standard http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf]]"},{"key":"e_1_3_2_1_15_1","unstructured":"Java 2 Platform Security Architecture http:\/\/java.sun.com\/j2se\/1.4.2\/docs\/guide\/security\/]]  Java 2 Platform Security Architecture http:\/\/java.sun.com\/j2se\/1.4.2\/docs\/guide\/security\/]]"},{"key":"e_1_3_2_1_16_1","unstructured":"Java Cryptography Architecture http:\/\/java.sun.com\/j2se\/1.4.2\/docs\/guide\/security\/CryptoSpec.html]]  Java Cryptography Architecture http:\/\/java.sun.com\/j2se\/1.4.2\/docs\/guide\/security\/CryptoSpec.html]]"},{"key":"e_1_3_2_1_17_1","first-page":"55","volume-title":"EUROSMART Security Conference (2000)","author":"Hess E.","unstructured":"E. Hess , N. Janssen , B. Meyer , T. Schuetze , \" Information Leakage Attacks Against Smart Card Implementations of Cryptographic Algorithms and Countermeasures \"a Survey\" , EUROSMART Security Conference (2000) pp. 55 -- 64 ]] E. Hess, N. Janssen, B. Meyer, T. Schuetze, \"Information Leakage Attacks Against Smart Card Implementations of Cryptographic Algorithms and Countermeasures \"a Survey\", EUROSMART Security Conference (2000) pp.55--64]]"},{"key":"e_1_3_2_1_18_1","first-page":"388","volume-title":"Proc. of Advances in Cryptology (1999)","author":"Kocher P.","unstructured":"P. Kocher , J. Jaffe , B. Jun , \" Differential Power Analysis\" , Proc. of Advances in Cryptology (1999) pp. 388 -- 397 ]] P. Kocher, J. Jaffe, B. Jun, \"Differential Power Analysis\", Proc. of Advances in Cryptology (1999) pp.388--397]]"},{"key":"e_1_3_2_1_19_1","unstructured":"GEZEL User Manual http:\/\/www.ee.ucla.edu\/~schaum\/gezel\/gzldata\/gezelum.pdf]]  GEZEL User Manual http:\/\/www.ee.ucla.edu\/~schaum\/gezel\/gzldata\/gezelum.pdf]]"},{"key":"e_1_3_2_1_20_1","first-page":"246","volume-title":"Design Automation and Test in Europe Conference (DATE 2004)","author":"Tiri K.","unstructured":"K. Tiri , I. Verbauwhede , \" A Logic Level Design Methodology for a Secure DPA Resistant ASIC or FPGA Implementation \", Design Automation and Test in Europe Conference (DATE 2004) pp. 246 -- 251 ]] K. Tiri, I. Verbauwhede, \"A Logic Level Design Methodology for a Secure DPA Resistant ASIC or FPGA Implementation\", Design Automation and Test in Europe Conference (DATE 2004) pp.246--251]]"},{"key":"e_1_3_2_1_21_1","first-page":"125","volume-title":"Workshop on Cryptographic Hardware and Embedded Systems (CHES 2003)","author":"Tiri K.","unstructured":"K. Tiri , I. Verbauwhede , \" Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology \", Workshop on Cryptographic Hardware and Embedded Systems (CHES 2003) pp. 125 -- 136 ]] K. Tiri, I. Verbauwhede, \"Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology\", Workshop on Cryptographic Hardware and Embedded Systems (CHES 2003) pp.125--136]]"},{"key":"e_1_3_2_1_22_1","unstructured":"SH-Mobile Application Processor http:\/\/www.renesas.com\/eng\/products\/mpumcu\/shmobile\/index.html]]  SH-Mobile Application Processor http:\/\/www.renesas.com\/eng\/products\/mpumcu\/shmobile\/index.html]]"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/996566.996771"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/962758.963491"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/972627.972632"}],"event":{"name":"CASES04: 2004 International Conference on Compilers, Architectures and Synthesis for Embedded Systems","sponsor":["SIGBED ACM Special Interest Group on Embedded Systems","SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing"],"location":"Washington DC USA","acronym":"CASES04"},"container-title":["Proceedings of the 2004 international conference on Compilers, architecture, and synthesis for embedded systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1023833.1023874","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1023833.1023874","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:23:53Z","timestamp":1750267433000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1023833.1023874"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,9,22]]},"references-count":25,"alternative-id":["10.1145\/1023833.1023874","10.1145\/1023833"],"URL":"https:\/\/doi.org\/10.1145\/1023833.1023874","relation":{},"subject":[],"published":{"date-parts":[[2004,9,22]]},"assertion":[{"value":"2004-09-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}