{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:22:04Z","timestamp":1750306924283,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,11,5]],"date-time":"2012-11-05T00:00:00Z","timestamp":1352073600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,11,5]]},"DOI":"10.1145\/2429384.2429415","type":"proceedings-article","created":{"date-parts":[[2013,1,22]],"date-time":"2013-01-22T15:29:29Z","timestamp":1358868569000},"page":"163-167","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Utilizing random noise in cryptography"],"prefix":"10.1145","author":[{"given":"Hui","family":"Geng","sequence":"first","affiliation":[{"name":"Missouri University of Science and Technology, Rolla, MO"}]},{"given":"Jun","family":"Wu","sequence":"additional","affiliation":[{"name":"Missouri University of Science and Technology, Rolla, MO"}]},{"given":"Jianming","family":"Liu","sequence":"additional","affiliation":[{"name":"Missouri University of Science and Technology, Rolla, MO"}]},{"given":"Minsu","family":"Choi","sequence":"additional","affiliation":[{"name":"Missouri University of Science and Technology, Rolla, MO"}]},{"given":"Yiyu","family":"Shi","sequence":"additional","affiliation":[{"name":"Missouri University of Science and Technology, Rolla, MO"}]}],"member":"320","published-online":{"date-parts":[[2012,11,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.1978.1089771"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.4441"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_4_1","first-page":"650","article-title":"Two implementation methods of a 1024-bit RSA crypto-processor based on modified Montgomery algorithm","author":"Taek-Won K.","year":"2001","unstructured":"Taek-Won , K. , \" Two implementation methods of a 1024-bit RSA crypto-processor based on modified Montgomery algorithm ,\" in Proc. of the IEEE International Symposium on Circuits and Systems , pp. 650 -- 653 , 2001 Taek-Won, K., \"Two implementation methods of a 1024-bit RSA crypto-processor based on modified Montgomery algorithm,\" in Proc. of the IEEE International Symposium on Circuits and Systems, pp. 650--653, 2001","journal-title":"Proc. of the IEEE International Symposium on Circuits and Systems"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICICTA.2008.398"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNC.2007.391"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Zhao J. Han J. Zeng X. Li L. and Deng Y. \"Differential power analysis and differential fault attack resistant AES algorithm and its VLSI implementation \" in Proc. of the International Conference on Solid-State and Integrated-Circuit Technology pp. 2220--2223 20--23 Oct. 2008 Zhao J. Han J. Zeng X. Li L. and Deng Y. \"Differential power analysis and differential fault attack resistant AES algorithm and its VLSI implementation \" in Proc. of the International Conference on Solid-State and Integrated-Circuit Technology pp. 2220--2223 20--23 Oct. 2008","DOI":"10.1109\/ICSICT.2008.4735012"},{"key":"e_1_3_2_1_9_1","first-page":"388","volume-title":"Differential Power Analysis,\" in Proc. of the Annual International Cryptology Conference on Advances in Cryptology","author":"Kocher P.","year":"1999","unstructured":"Kocher , P. , Jaffe , J. , and Jun , B. , \" Differential Power Analysis,\" in Proc. of the Annual International Cryptology Conference on Advances in Cryptology , pp. 388 -- 397 , 1999 Kocher, P., Jaffe, J., and Jun, B., \"Differential Power Analysis,\" in Proc. of the Annual International Cryptology Conference on Advances in Cryptology, pp. 388--397, 1999"},{"key":"e_1_3_2_1_10_1","first-page":"151","volume-title":"Investigations of Power Analysis Attacks on Smartcards,\" in Proc. of the USENIX Workshop on Smartcard Technology","author":"Messerges T. S.","year":"2006","unstructured":"Messerges , T. S. , Dabbish , E. A. , and Sloan , R. H , \" Investigations of Power Analysis Attacks on Smartcards,\" in Proc. of the USENIX Workshop on Smartcard Technology , pp. 151 -- 161 ., 2006 Messerges, T. S., Dabbish, E. A., and Sloan, R. H, \"Investigations of Power Analysis Attacks on Smartcards,\" in Proc. of the USENIX Workshop on Smartcard Technology, pp. 151--161., 2006"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/4.933467"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.107"},{"key":"e_1_3_2_1_13_1","first-page":"389","volume-title":"Towards Sound Approaches to Counteract Power-Analysis Attacks,\" in Proc. of the Annual International Cryptology Conference on Advances in Cryptology","author":"Chari S.","year":"1999","unstructured":"Chari , S. , Jutla , C. , Rao , J. R. , and Rohatgi , P. , \" Towards Sound Approaches to Counteract Power-Analysis Attacks,\" in Proc. of the Annual International Cryptology Conference on Advances in Cryptology , pp. 389 -- 412 , 1999 Chari, S., Jutla, C., Rao, J. R., and Rohatgi, P., \"Towards Sound Approaches to Counteract Power-Analysis Attacks,\" in Proc. of the Annual International Cryptology Conference on Advances in Cryptology, pp. 389--412, 1999"},{"key":"e_1_3_2_1_14_1","first-page":"144","volume-title":"Defense against Side-Channel Power Analysis Attacks on Microelectronic Systems,\" in Proc. of the National Aerospace and Electronics Conference","author":"Sundaresan V.","year":"2008","unstructured":"Sundaresan , V. , Rammohan , S. , and Vemuri , R. , \" Defense against Side-Channel Power Analysis Attacks on Microelectronic Systems,\" in Proc. of the National Aerospace and Electronics Conference , pp. 144 -- 150 , 2008 Sundaresan, V., Rammohan, S., and Vemuri, R., \"Defense against Side-Channel Power Analysis Attacks on Microelectronic Systems,\" in Proc. of the National Aerospace and Electronics Conference, pp. 144--150, 2008"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/11751595_6"},{"key":"e_1_3_2_1_16_1","volume-title":"Optimization and Simulation. 14th International Workshop, PATMOS 2994","author":"Bucci M.","year":"2004","unstructured":"M. Bucci , M. Guglielmo , R. Luzzi and A. Trifiletti , \" A power consumption randomization countermeasure for dpa-resistant cryptographic processors,\" Integrated Circuit and System Design, Power and Timing Modeling , Optimization and Simulation. 14th International Workshop, PATMOS 2994 , 2004 M. Bucci, M. Guglielmo, R. Luzzi and A. Trifiletti, \"A power consumption randomization countermeasure for dpa-resistant cryptographic processors,\" Integrated Circuit and System Design, Power and Timing Modeling, Optimization and Simulation. 14th International Workshop, PATMOS 2994, 2004"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2005.241"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLSID.2007.79"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/795676.797166"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.104"},{"key":"e_1_3_2_1_21_1","volume-title":"Power Analysis Attacks-Revealing the Secrets of Smart Cards","author":"Mangard E.","year":"2007","unstructured":"S. Mangard , E. Oswald , and T. Popp , Power Analysis Attacks-Revealing the Secrets of Smart Cards . Springer , March 12, 2007 . S. Mangard, E. Oswald, and T. Popp, Power Analysis Attacks-Revealing the Secrets of Smart Cards. Springer, March 12, 2007."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2012.2200399"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICYCS.2008.230"},{"key":"e_1_3_2_1_24_1","unstructured":"http:\/\/www.xilinx.com\/support\/documentation\/sw_manuals\/xilinx13_2\/is_ehelp_start.htm http:\/\/www.xilinx.com\/support\/documentation\/sw_manuals\/xilinx13_2\/is_ehelp_start.htm"},{"key":"e_1_3_2_1_25_1","unstructured":"http:\/\/www.risec.aist.go.jp\/project\/sasebo\/download\/SASEBO-GII_Spec_Ver1.01_English.pdf http:\/\/www.risec.aist.go.jp\/project\/sasebo\/download\/SASEBO-GII_Spec_Ver1.01_English.pdf"},{"key":"e_1_3_2_1_26_1","unstructured":"CMOS Power Consumption and Cpd Calculation; http:\/\/www.ti.com\/lit\/an\/scaa035b\/scaa035b.pdf CMOS Power Consumption and Cpd Calculation; http:\/\/www.ti.com\/lit\/an\/scaa035b\/scaa035b.pdf"},{"key":"e_1_3_2_1_27_1","unstructured":"P. Alfke \"Efficient shift register lfsr counter and long pseudo-randomsequence generators \" 1996 P. Alfke \"Efficient shift register lfsr counter and long pseudo-randomsequence generators \" 1996"}],"event":{"name":"ICCAD '12: The International Conference on Computer-Aided Design","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE CEDA"],"location":"San Jose California","acronym":"ICCAD '12"},"container-title":["Proceedings of the International Conference on Computer-Aided Design"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2429384.2429415","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2429384.2429415","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:35:25Z","timestamp":1750235725000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2429384.2429415"}},"subtitle":["where is the tofu?"],"short-title":[],"issued":{"date-parts":[[2012,11,5]]},"references-count":27,"alternative-id":["10.1145\/2429384.2429415","10.1145\/2429384"],"URL":"https:\/\/doi.org\/10.1145\/2429384.2429415","relation":{},"subject":[],"published":{"date-parts":[[2012,11,5]]},"assertion":[{"value":"2012-11-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}