{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T02:45:16Z","timestamp":1771037116054,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,2,11]],"date-time":"2013-02-11T00:00:00Z","timestamp":1360540800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,2,11]]},"DOI":"10.1145\/2435264.2435282","type":"proceedings-article","created":{"date-parts":[[2013,2,12]],"date-time":"2013-02-12T14:15:17Z","timestamp":1360678517000},"page":"91-100","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":83,"title":["Side-channel attacks on the bitstream encryption mechanism of Altera Stratix II"],"prefix":"10.1145","author":[{"given":"Amir","family":"Moradi","sequence":"first","affiliation":[{"name":"Ruhr University Bochum, Bochum, Germany"}]},{"given":"David","family":"Oswald","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Bochum, Germany"}]},{"given":"Christof","family":"Paar","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Bochum, Germany"}]},{"given":"Pawel","family":"Swierczynski","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Bochum, Germany"}]}],"member":"320","published-online":{"date-parts":[[2013,2,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Defense Science Board. http:\/\/www.acq.osd.mil\/dsb\/.  Defense Science Board. http:\/\/www.acq.osd.mil\/dsb\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Hex-Rays SA. http:\/\/www.hex-rays.com.  Hex-Rays SA. http:\/\/www.hex-rays.com."},{"key":"e_1_3_2_1_3_1","unstructured":"On-line CRC calculation and free library. http:\/\/www.lammertbies.nl\/comm\/info\/crc-calculation.html.  On-line CRC calculation and free library. http:\/\/www.lammertbies.nl\/comm\/info\/crc-calculation.html."},{"key":"e_1_3_2_1_4_1","volume-title":"Altera","author":"Device Handbook Stratix II","year":"2007","unstructured":"Stratix II Device Handbook , Volume 1. Technical report , Altera , 2007 . http:\/\/www.altera.com\/literature\/hb\/stx2\/stratix2_handbook.pdf. Stratix II Device Handbook, Volume 1. Technical report, Altera, 2007. http:\/\/www.altera.com\/literature\/hb\/stx2\/stratix2_handbook.pdf."},{"key":"e_1_3_2_1_5_1","volume-title":"Altera","author":"AN","year":"2009","unstructured":"AN 341 : Using the Design Security Feature in Stratix II and Stratix II GX Devices. Technical report , Altera , 2009 . http:\/\/www.altera.com\/literature\/an\/an341.pdf. AN 341: Using the Design Security Feature in Stratix II and Stratix II GX Devices. Technical report, Altera, 2009. http:\/\/www.altera.com\/literature\/an\/an341.pdf."},{"key":"e_1_3_2_1_6_1","unstructured":"AIST. Side-channel Attack Standard Evaluation Board SASEBO-B Specification 2008. http:\/\/www.risec.aist.go.jp\/project\/sasebo\/download\/SASEBO-B\\_Spec\\_Ver1.0\\_English.pdf.  AIST. Side-channel Attack Standard Evaluation Board SASEBO-B Specification 2008. http:\/\/www.risec.aist.go.jp\/project\/sasebo\/download\/SASEBO-B\\_Spec\\_Ver1.0\\_English.pdf."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1854099.1854126"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85174-5_12"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2005.6"},{"key":"e_1_3_2_1_11_1","series-title":"LNCS","first-page":"388","volume-title":"CRYPTO 99","author":"Kocher P.","year":"1999","unstructured":"P. Kocher , J. Jaffe , and B. Jun . Differential Power Analysis . In CRYPTO 99 , volume 1666 of LNCS , pages 388 -- 397 . Springer , 1999 . P. Kocher, J. Jaffe, and B. Jun. Differential Power Analysis. In CRYPTO 99, volume 1666 of LNCS, pages 388--397. Springer, 1999."},{"key":"e_1_3_2_1_12_1","volume-title":"Xilinx","author":"Krueger R.","year":"2004","unstructured":"R. Krueger . Application Note XAPP766: Using High Security Features in Virtex-II Series FPGAs. Technical report , Xilinx , 2004 . http:\/\/www.xilinx.com\/support\/documentation\/application_notes\/xapp766.pdf. R. Krueger. Application Note XAPP766: Using High Security Features in Virtex-II Series FPGAs. Technical report, Xilinx, 2004. http:\/\/www.xilinx.com\/support\/documentation\/application_notes\/xapp766.pdf."},{"key":"e_1_3_2_1_13_1","volume-title":"Power Analysis Attacks: Revealing the Secrets of Smart Cards","author":"Mangard S.","year":"2007","unstructured":"S. Mangard , E. Oswald , and T. Popp . Power Analysis Attacks: Revealing the Secrets of Smart Cards . Springer , 2007 . S. Mangard, E. Oswald, and T. Popp. Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer, 2007."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046722"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27954-6_1"},{"key":"e_1_3_2_1_16_1","unstructured":"NIST. FIPS 197 Advanced Encryption Standard (AES). http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf.  NIST. FIPS 197 Advanced Encryption Standard (AES). http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf."},{"key":"e_1_3_2_1_17_1","unstructured":"NIST. Recommendation for Block 2001 Edition Cipher Modes of Operation 2001. http:\/\/csrc.nist.gov\/publications\/nistpubs\/800--38a\/sp800--38a.pdf.  NIST. Recommendation for Block 2001 Edition Cipher Modes of Operation 2001. http:\/\/csrc.nist.gov\/publications\/nistpubs\/800--38a\/sp800--38a.pdf."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/2044928.2044947"},{"key":"e_1_3_2_1_19_1","first-page":"114","volume-title":"RFIDSec 2008","author":"Plos T.","year":"2008","unstructured":"T. Plos , M. Hutter , and M. Feldhofer . Evaluation of Side-Channel Preprocessing Techniques on Cryptographic-Enabled HF and UHF RFID-Tag Prototypes . In RFIDSec 2008 , pages 114 -- 127 , 2008 . T. Plos, M. Hutter, and M. Feldhofer. Evaluation of Side-Channel Preprocessing Techniques on Cryptographic-Enabled HF and UHF RFID-Tag Prototypes. In RFIDSec 2008, pages 114--127, 2008."},{"key":"e_1_3_2_1_21_1","volume-title":"XCell Journal","author":"Tseng C. W.","year":"2005","unstructured":"C. W. Tseng . Lock Your Designs with the Virtex-4 Security Solution . XCell Journal , Xilinx , Spring 2005 . C. W. Tseng. Lock Your Designs with the Virtex-4 Security Solution. XCell Journal, Xilinx, Spring 2005."}],"event":{"name":"FPGA '13: The 2013 ACM\/SIGDA International Symposium on Field Programmable Gate Arrays","location":"Monterey California USA","acronym":"FPGA '13","sponsor":["SIGDA ACM Special Interest Group on Design Automation"]},"container-title":["Proceedings of the ACM\/SIGDA international symposium on Field programmable gate arrays"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2435264.2435282","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2435264.2435282","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:18:56Z","timestamp":1750234736000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2435264.2435282"}},"subtitle":["facilitating black-box analysis using software reverse-engineering"],"short-title":[],"issued":{"date-parts":[[2013,2,11]]},"references-count":20,"alternative-id":["10.1145\/2435264.2435282","10.1145\/2435264"],"URL":"https:\/\/doi.org\/10.1145\/2435264.2435282","relation":{},"subject":[],"published":{"date-parts":[[2013,2,11]]},"assertion":[{"value":"2013-02-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}