{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T02:28:25Z","timestamp":1772159305982,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,15]],"date-time":"2014-06-15T00:00:00Z","timestamp":1402790400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,15]]},"DOI":"10.1145\/2611765.2611770","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T18:18:31Z","timestamp":1401473911000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Seasoning effect based side channel attacks to AES implementation with phase change memory"],"prefix":"10.1145","author":[{"given":"Lei","family":"Xu","sequence":"first","affiliation":[{"name":"University of Houston, Houston, Texas"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Weidong","family":"Shi","sequence":"additional","affiliation":[{"name":"University of Houston, Houston, Texas"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nicholas","family":"Desalvo","sequence":"additional","affiliation":[{"name":"University of Houston, Houston, Texas"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2014,6,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Fips pub 197: Advanced encryption standard November 2001.  Fips pub 197: Advanced encryption standard November 2001."},{"key":"e_1_3_2_1_2_1","unstructured":"D. J. Bernstein. Cache-timing attacks on AES 2004. URL: http:\/\/cr.yp.to\/papers.html#cachetiming.  D. J. Bernstein. Cache-timing attacks on AES 2004. URL: http:\/\/cr.yp.to\/papers.html#cachetiming."},{"key":"e_1_3_2_1_3_1","series-title":"LNCS","first-page":"16","volume-title":"M. Joye and J.-J","author":"Brier E.","year":"2004"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/LED.2009.2038242"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"K.\n       \n      Gandolfi C.\n       \n      Mourtel and \n      \n      \n      F.\n       \n      Olivier\n      \n  \n  . \n  Electromagnetic analysis: Concrete results. In \u00c7etin K. Ko\u00e7 D. Naccache and C. Paar editors Cryptographic Hardware and Embedded Systems - CHES\n   \n  2001 volume \n  2162\n   of \n  LNCS pages \n  251\n  --\n  261\n  . \n  Springer 2001.   K. Gandolfi C. Mourtel and F. Olivier. Electromagnetic analysis: Concrete results. In \u00c7etin K. Ko\u00e7 D. Naccache and C. Paar editors Cryptographic Hardware and Embedded Systems - CHES 2001 volume 2162 of LNCS pages 251--261. Springer 2001.","DOI":"10.1007\/3-540-44709-1_21"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"T. S.\n       \n      Messerges E. A.\n       \n      Dabbish and \n      \n      \n      R. H.\n       \n      Sloan\n      \n  \n  . \n  Power analysis attacks of modular exponentiation in smartcards. In \u00c7etin K. Ko&ccirc; and C. Paar editors Cryptographic Hardware and Embedded Systems - CHES\n   \n  1999 volume \n  1717\n   of \n  LNCS pages \n  144\n  --\n  157\n  . \n  Springer 1999.   T. S. Messerges E. A. Dabbish and R. H. Sloan. Power analysis attacks of modular exponentiation in smartcards. In \u00c7etin K. Ko&ccirc; and C. Paar editors Cryptographic Hardware and Embedded Systems - CHES 1999 volume 1717 of LNCS pages 144--157. Springer 1999.","DOI":"10.1007\/3-540-48059-5_14"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2002.1004593"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"M. orris Dworkin. NIST SP 800-38A Recommendation for Block Cipher Modes of Operation 2011.  M. orris Dworkin. NIST SP 800-38A Recommendation for Block Cipher Modes of Operation 2011.","DOI":"10.6028\/NIST.SP.800-38F"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.21.1450"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1149\/1.2409482"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11545262_23"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1147\/rd.524.0465"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_8"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1063\/1.2821845"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/11545262_3"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/LED.2007.907288"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sse.2010.11.022"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.microrel.2012.01.002"}],"event":{"name":"HASP '14: The Third Workshop on Hardware and Architectural Support for Security and Privacy","location":"Minneapolis Minnesota USA","acronym":"HASP '14","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the Third Workshop on Hardware and Architectural Support for Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2611765.2611770","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2611765.2611770","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:01:34Z","timestamp":1750230094000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2611765.2611770"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,15]]},"references-count":19,"alternative-id":["10.1145\/2611765.2611770","10.1145\/2611765"],"URL":"https:\/\/doi.org\/10.1145\/2611765.2611770","relation":{},"subject":[],"published":{"date-parts":[[2014,6,15]]},"assertion":[{"value":"2014-06-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}