{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T04:56:51Z","timestamp":1764133011401,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T00:00:00Z","timestamp":1477267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Foundation for Polish Science"},{"name":"German Research Foundation","award":["Emmy Noether Program FA 1320\/1-1"],"award-info":[{"award-number":["Emmy Noether Program FA 1320\/1-1"]}]},{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","award":["280141"],"award-info":[{"award-number":["280141"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Belgian Fund for Scientific Research"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978419","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T12:46:35Z","timestamp":1477399595000},"page":"142-153","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Private Circuits III"],"prefix":"10.1145","author":[{"given":"Stefan","family":"Dziembowski","sequence":"first","affiliation":[{"name":"University of Warsaw, Warsaw, Poland"}]},{"given":"Sebastian","family":"Faust","sequence":"additional","affiliation":[{"name":"Ruhr-University Bochum, Bochum, Germany"}]},{"given":"Fran\u00e7ois-Xavier","family":"Standaert","sequence":"additional","affiliation":[{"name":"Universite catholique de Louvain, Louvain-la-Neuve, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2061228"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2008.4505310"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.36"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_17"},{"key":"e_1_3_2_1_6_1","volume-title":"PROOFS.","author":"Bayer C.","year":"2013","unstructured":"C. Bayer and J.-P. Seifert . \"Trojan-resilient circuits\". In: PROOFS. 2013 . C. Bayer and J.-P. Seifert. \"Trojan-resilient circuits\". In: PROOFS. 2013."},{"key":"e_1_3_2_1_7_1","first-page":"8","author":"Bhunia S.","year":"2014","unstructured":"S. Bhunia , M. S. Hsiao , M. Banga , and S. Narasimhan . \"Hardware Trojan attacks: threat analysis and countermeasures\". In: Proceedings of the IEEE 8 ( 2014 ). S. Bhunia, M. S. Hsiao, M. Banga, and S. Narasimhan. \"Hardware Trojan attacks: threat analysis and countermeasures\". In: Proceedings of the IEEE 8 (2014).","journal-title":"Proceedings of the IEEE"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85174-5_13"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/646762.706179"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s001450010016"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2041225.2041252"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1038\/nnano.2007.411"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/646764.703964"},{"key":"e_1_3_2_1_14_1","volume-title":"Summer School","author":"Cramer R.","year":"1998","unstructured":"R. Cramer . \"Introduction to Secure Computation\". In : Lectures on Data Security, Modern Cryptology in Theory and Practice , Summer School , Aarhus, Denmark , July 1998 . 1998. R. Cramer. \"Introduction to Secure Computation\". In: Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998. 1998."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978419"},{"key":"e_1_3_2_1_16_1","first-page":"B5","author":"Fox G.","year":"2001","unstructured":"G. Fox , F Chu , and T Davenport . \"Current and future ferroelectric nonvolatile memory technology\". In : Journal of Vacuum Science & Technology B5 ( 2001 ). G. Fox, F Chu, and T Davenport. \"Current and future ferroelectric nonvolatile memory technology\". In: Journal of Vacuum Science & Technology B5 (2001).","journal-title":"Journal of Vacuum Science & Technology"},{"key":"e_1_3_2_1_17_1","first-page":"1","author":"Grosso V.","year":"2014","unstructured":"V. Grosso , F. Standaert , and S. Faust . \"Masking vs. multiparty computation: how large is the gap for AES?\" In: J. Cryptographic Engineering 1 ( 2014 ). V. Grosso, F. Standaert, and S. Faust. \"Masking vs. multiparty computation: how large is the gap for AES?\" In: J. Cryptographic Engineering 1 (2014).","journal-title":"J. Cryptographic Engineering"},{"key":"e_1_3_2_1_18_1","volume-title":"LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations","author":"Grosso V.","year":"2014","unstructured":"V. Grosso , G. Leurent , F. Standaert , and K. Varici . \" LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations \". In : FSE. 2014 . V. Grosso, G. Leurent, F. Standaert, and K. Varici. \"LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations\". In: FSE. 2014."},{"key":"e_1_3_2_1_20_1","volume-title":"USENIX Security Symposium.","author":"Imeson F.","year":"2013","unstructured":"F. Imeson , A. Emtenan , S. Garg , and M. V. Tripunitara . \" Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation \". In: USENIX Security Symposium. 2013 . F. Imeson, A. Emtenan, S. Garg, and M. V. Tripunitara. \"Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation\". In: USENIX Security Symposium. 2013."},{"key":"e_1_3_2_1_21_1","volume-title":"Private Circuits: Securing Hardware against Probing Attacks","author":"Ishai Y.","year":"2003","unstructured":"Y. Ishai , A. Sahai , and D. Wagner . \" Private Circuits: Securing Hardware against Probing Attacks \". In : CRYPTO. 2003 . Y. Ishai, A. Sahai, and D. Wagner. \"Private Circuits: Securing Hardware against Probing Attacks\". In: CRYPTO. 2003."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_19"},{"key":"e_1_3_2_1_23_1","volume-title":"CRYPTO.","author":"Kocher P. C.","year":"1996","unstructured":"P. C. Kocher . \"Timing Attacks on Implementations of Die-Hellman, RSA, DSS, and Other Systems\". In: CRYPTO. 1996 . P. C. Kocher. \"Timing Attacks on Implementations of Die-Hellman, RSA, DSS, and Other Systems\". In: CRYPTO. 1996."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/2008684.2008693"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.200"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-76464-1"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.7"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.27"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Vienna Austria","acronym":"CCS'16"},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978419","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978419","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:49:54Z","timestamp":1750218594000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978419"}},"subtitle":["Hardware Trojan-Resilience via Testing Amplification"],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":27,"alternative-id":["10.1145\/2976749.2978419","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978419","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}