{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:41:59Z","timestamp":1750308119433,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,9,18]],"date-time":"2005-09-18T00:00:00Z","timestamp":1127001600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,9,18]]},"DOI":"10.1145\/1086228.1086268","type":"proceedings-article","created":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T17:34:39Z","timestamp":1131384879000},"page":"214-217","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Power consumption profile analysis for security attack simulation in smart cards at high abstraction level"],"prefix":"10.1145","author":[{"given":"K.","family":"Rothbart","sequence":"first","affiliation":[{"name":"Graz University of Technology, Inffeldgassse, Graz, AUSTRIA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"U.","family":"Neffe","sequence":"additional","affiliation":[{"name":"Graz University of Technology, Inffeldgassse, Graz, AUSTRIA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ch.","family":"Steger","sequence":"additional","affiliation":[{"name":"Graz University of Technology, Inffeldgassse, Graz, AUSTRIA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"R.","family":"Weiss","sequence":"additional","affiliation":[{"name":"Graz University of Technology, Inffeldgassse, Graz, AUSTRIA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"E.","family":"Rieger","sequence":"additional","affiliation":[{"name":"Philips Austria GmbH. Styria, Gratkorn, Austria"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"A.","family":"Muehlberger","sequence":"additional","affiliation":[{"name":"Philips Austria GmbH. Styria, Gratkorn, Austria"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2005,9,18]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","volume-title":"Second USENIX Workshop on Electronic Commerce, Nov '96","author":"Anderson R.","year":"1996","unstructured":"R. Anderson , M. Kuhn , \" Tamper resistance - A cautionary note,\" Second USENIX Workshop on Electronic Commerce, Nov '96 . 1996 . pp. 1 -- 11 . R. Anderson, M. Kuhn, \"Tamper resistance - A cautionary note,\" Second USENIX Workshop on Electronic Commerce, Nov '96. 1996. pp. 1--11."},{"key":"e_1_3_2_1_2_1","volume-title":"www.systemc.org","author":"Open","year":"2003","unstructured":"Open SystemC Initiative (OSCI), \"System C 2.0 Language Reference Manual\", Revision 1.0 , www.systemc.org , 2003 . Open SystemC Initiative (OSCI), \"SystemC 2.0 Language Reference Manual\", Revision 1.0, www.systemc.org, 2003."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/40.977754"},{"key":"e_1_3_2_1_4_1","volume-title":"Japan","author":"Gressus Y.","year":"2001","unstructured":"Y. Gressus , \"New methodologies in smart card security design,\" Smart Card Security Conference , Japan , 2001 . Y. Gressus, \"New methodologies in smart card security design,\" Smart Card Security Conference, Japan, 2001."},{"key":"e_1_3_2_1_5_1","volume-title":"CHES 2003, 5th International Workshop , Sept. 2003, Proceedings","volume":"151","author":"Fournier J. J. A.","year":"2003","unstructured":"J. J. A. Fournier , S. Moore , H. Li , R. Mullins , G. Taylor , \" Security Evaluation of Asynchronous Circuits ,\" Cryptographic Hardware and Embedded Systems - CHES 2003, 5th International Workshop , Sept. 2003, Proceedings , volume 2779-LNCS, pages 137-- 151 . Springer-Verlag , 2003 . J. J. A. Fournier, S. Moore, H. Li, R. Mullins, G. Taylor, \"Security Evaluation of Asynchronous Circuits,\" Cryptographic Hardware and Embedded Systems - CHES 2003, 5th International Workshop , Sept. 2003, Proceedings, volume 2779-LNCS, pages 137--151. Springer-Verlag, 2003."},{"key":"e_1_3_2_1_6_1","first-page":"37","volume-title":"- in: Tagungsband","author":"Neffe U.","year":"2003","unstructured":"U. Neffe , K. Rothbart , C. Steger , R. WeiB, E. Rieger , A. Muhlberger , \" System Design Based on Different Levels of Abstraction for Power-Aware Smart Cards,\" Austrochip 2003 , - in: Tagungsband ( 2003 ). Page(s): 37 -- 40 . U. Neffe, K. Rothbart, C. Steger, R. WeiB, E. Rieger, A. Muhlberger, \"System Design Based on Different Levels of Abstraction for Power-Aware Smart Cards,\" Austrochip 2003, - in: Tagungsband (2003). Page(s): 37--40."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ATS.2004.48"},{"key":"e_1_3_2_1_8_1","first-page":"103","volume-title":"6th IEEE Latin-American Test Workshop (LATW'2005)","author":"Rothbart K.","year":"2005","unstructured":"K. Rothbart , U. Neffe , Ch. Steger , R. Weiss , E. Rieger , A. Muehlberger , \" A Smart Card Test Environment Using Multi-Level Fault Injection in SystemC\" , 6th IEEE Latin-American Test Workshop (LATW'2005) Digest of Papers, March- April , 2005 , pp. 103 -- 108 K. Rothbart, U. Neffe, Ch. Steger, R. Weiss, E. Rieger, A. Muehlberger, \"A Smart Card Test Environment Using Multi-Level Fault Injection in SystemC\", 6th IEEE Latin-American Test Workshop (LATW'2005) Digest of Papers, March-April, 2005, pp. 103--108"},{"key":"e_1_3_2_1_9_1","unstructured":"MIPS Technologies Inc. MIPS32 4KSTM Processor Core Family Software User's Manual. www.mips.com 2001.  MIPS Technologies Inc. MIPS32 4KSTM Processor Core Family Software User's Manual. www.mips.com 2001."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/968880.969255"},{"key":"e_1_3_2_1_11_1","unstructured":"Sun Microsystems Inc. \"Java Card\u2122 virtual machine specification \" http:\/\/java.sun.com\/products\/javacard\/ 2001.  Sun Microsystems Inc. \"Java Card\u2122 virtual machine specification \" http:\/\/java.sun.com\/products\/javacard\/ 2001."}],"event":{"name":"EMSOFT05: Fifth ACM International Conference on Embedded Software 2005","sponsor":["ACM Association for Computing Machinery","SIGBED ACM Special Interest Group on Embedded Systems"],"location":"Jersey City NJ USA","acronym":"EMSOFT05"},"container-title":["Proceedings of the 5th ACM international conference on Embedded software"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1086228.1086268","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1086228.1086268","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:19Z","timestamp":1750262899000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1086228.1086268"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,9,18]]},"references-count":11,"alternative-id":["10.1145\/1086228.1086268","10.1145\/1086228"],"URL":"https:\/\/doi.org\/10.1145\/1086228.1086268","relation":{},"subject":[],"published":{"date-parts":[[2005,9,18]]},"assertion":[{"value":"2005-09-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}