{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:15Z","timestamp":1750307535285,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,7,26]],"date-time":"2009-07-26T00:00:00Z","timestamp":1248566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0627529"],"award-info":[{"award-number":["CNS-0627529"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,7,26]]},"DOI":"10.1145\/1629911.1629977","type":"proceedings-article","created":{"date-parts":[[2009,10,13]],"date-time":"2009-10-13T15:11:11Z","timestamp":1255446671000},"page":"238-243","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Analysis and mitigation of process variation impacts on Power-Attack Tolerance"],"prefix":"10.1145","author":[{"given":"Lang","family":"Lin","sequence":"first","affiliation":[{"name":"University of Massachusetts Amherst, MA"}]},{"given":"Wayne","family":"Burleson","sequence":"additional","affiliation":[{"name":"University of Massachusetts Amherst, MA"}]}],"member":"320","published-online":{"date-parts":[[2009,7,26]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"388","article-title":"Differential Power Analysis","volume":"1666","author":"Kocher P.","year":"1999","journal-title":"CRYPTO, LNCS"},{"key":"e_1_3_2_1_2_1","first-page":"222","article-title":"Hardware Countermeasures Against DPA -- A Statistical Analysis of Their Effectiveness","volume":"2964","author":"Mangard S.","year":"2004","journal-title":"CT-RSA, LNCS"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2005.855939"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065579.1065640"},{"key":"e_1_3_2_1_5_1","first-page":"252","volume-title":"IEEE ISCAS","author":"Lin L.","year":"2008"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2002.803949"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1278480.1278485"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.36"},{"key":"e_1_3_2_1_9_1","first-page":"125","article-title":"Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology","volume":"2779","author":"Tiri K.","year":"2003","journal-title":"CHES, LNCS"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1289816.1289831"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/871506.871549"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/871506.871530"},{"key":"e_1_3_2_1_13_1","unstructured":"International Technology Roadmap for Semiconductors 2006 http:\/\/public.itrs.net.  International Technology Roadmap for Semiconductors 2006 http:\/\/public.itrs.net."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED.2006.91"},{"key":"e_1_3_2_1_15_1","unstructured":"W. Mendenhall and T. Sincich \"Statistics for engineering and the sciences \" 5th edition by Prentice Hall 2007.   W. Mendenhall and T. Sincich \"Statistics for engineering and the sciences \" 5th edition by Prentice Hall 2007."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLSID.2007.131"},{"key":"e_1_3_2_1_17_1","first-page":"841","article-title":"Channel engineering for the reduction of random-dopant-placement-induced threshold voltage fluctuation","author":"Takeuchi K.","year":"1997","journal-title":"IEEE IEDM"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/774572.774578"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/996566.996661"}],"event":{"name":"DAC '09: The 46th Annual Design Automation Conference 2009","sponsor":["EDAC Electronic Design Automation Consortium","SIGDA ACM Special Interest Group on Design Automation","IEEE-CAS Circuits & Systems"],"location":"San Francisco California","acronym":"DAC '09"},"container-title":["Proceedings of the 46th Annual Design Automation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1629911.1629977","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1629911.1629977","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:23:16Z","timestamp":1750249396000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1629911.1629977"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7,26]]},"references-count":19,"alternative-id":["10.1145\/1629911.1629977","10.1145\/1629911"],"URL":"https:\/\/doi.org\/10.1145\/1629911.1629977","relation":{},"subject":[],"published":{"date-parts":[[2009,7,26]]},"assertion":[{"value":"2009-07-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}