{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:30:09Z","timestamp":1750307409100,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,5,16]],"date-time":"2010-05-16T00:00:00Z","timestamp":1273968000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,5,16]]},"DOI":"10.1145\/1785481.1785587","type":"proceedings-article","created":{"date-parts":[[2010,5,18]],"date-time":"2010-05-18T13:46:25Z","timestamp":1274190385000},"page":"459-464","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Low-power side-channel attack-resistant asynchronous S-box design for AES cryptosystems"],"prefix":"10.1145","author":[{"given":"Jun","family":"Wu","sequence":"first","affiliation":[{"name":"Missouri University of Science &amp; Technology, Rolla, MO, USA"}]},{"given":"Yong-Bin","family":"Kim","sequence":"additional","affiliation":[{"name":"Northeastern University, Boston, MA, USA"}]},{"given":"Minsu","family":"Choi","sequence":"additional","affiliation":[{"name":"Missouri University of Science &amp; Technology, Rolla, MO, USA"}]}],"member":"320","published-online":{"date-parts":[[2010,5,16]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"NIST \"Advanced Encryption Standard (AES) FIPS PUBS 197 National Institute of Standards and Technology\" NIST Nov 2001  NIST \"Advanced Encryption Standard (AES) FIPS PUBS 197 National Institute of Standards and Technology\" NIST Nov 2001"},{"volume-title":"28th European Solid-State Circuits Conference","year":"2002","author":"Tiri K.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/968878.969036"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11545262_13"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"S. Mangard \"Hardware Countermeasures against DPA A Statistical Analysis of Their Effectiveness\" Proceeding of Cryptographic-CT-RSA pp. 222--235 Springer 2004  S. Mangard \"Hardware Countermeasures against DPA A Statistical Analysis of Their Effectiveness\" Proceeding of Cryptographic-CT-RSA pp. 222--235 Springer 2004","DOI":"10.1007\/978-3-540-24660-2_18"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30574-3_24"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/785168.785357"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855016"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1005-8885(08)60412-4"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECS.2008.4674829"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/11545262_26"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11545262_12"},{"key":"e_1_3_2_1_14_1","first-page":"29","volume-title":"LNCS","volume":"2271","author":"Johannes W.","year":"2002"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/784892.784966"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mejo.2007.08.004"}],"event":{"name":"GLSVLSI '10: Great Lakes Symposium on VLSI 2010","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE CEDA","IEEE CASS"],"location":"Providence Rhode Island USA","acronym":"GLSVLSI '10"},"container-title":["Proceedings of the 20th symposium on Great lakes symposium on VLSI"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1785481.1785587","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1785481.1785587","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:39:31Z","timestamp":1750246771000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1785481.1785587"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,5,16]]},"references-count":15,"alternative-id":["10.1145\/1785481.1785587","10.1145\/1785481"],"URL":"https:\/\/doi.org\/10.1145\/1785481.1785587","relation":{},"subject":[],"published":{"date-parts":[[2010,5,16]]},"assertion":[{"value":"2010-05-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}