{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T05:17:42Z","timestamp":1755926262521,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,11,5]],"date-time":"2018-11-05T00:00:00Z","timestamp":1541376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100011002","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61774091"],"award-info":[{"award-number":["61774091"]}],"id":[{"id":"10.13039\/501100011002","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,11,5]]},"DOI":"10.1145\/3240765.3240804","type":"proceedings-article","created":{"date-parts":[[2018,11,6]],"date-time":"2018-11-06T13:36:57Z","timestamp":1541511417000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Electromagnetic equalizer"],"prefix":"10.1145","author":[{"given":"Chenguang","family":"Wang","sequence":"first","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Yici","family":"Cai","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Haoyi","family":"Wang","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Qiang","family":"Zhou","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2018,11,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","unstructured":"Charles J. Alpert Dinesh P. Mehta and Sachin S. Sapatnekar (Eds.). 2008. Handbook of Algorithms for Physical Design Automation. CRC Press.","DOI":"10.5555\/1521436"},{"key":"e_1_3_2_1_2_1","volume-title":"HFSS","author":"ANSYS","year":"2018","unstructured":"ANSYS HFSS 2018. https:\/\/www.ansys.com\/products\/electronics\/ansys-hfss"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Eric Brier Christophe Clavier and Francis Olivier. 2004. Correlation Power Analysis with a Leakage Model. In Cryptographic Hardware and Embedded Systems CHES. 16--29.","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3060403.3060501"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/2971808.2971995"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2423274"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings. 167--180","author":"Lopes Gouv\u00eaa Conrado Porto","year":"2015","unstructured":"Conrado Porto Lopes Gouv\u00eaa and Julio L\u00f3pez Hernandez. 2015. Implementing GCM on ARMv8. In Topics in Cryptology - CT-RSA 2015, The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20--24, 2015. Proceedings. 167--180."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","unstructured":"Wei He Eduardo de la Torre and Teresa Riesgo. 2012. An Interleaved EPE-Immune PA-DPL Structure for Resisting Concentrated EM Side Channel Attacks on FPGA Implementation. In Constructive Side-Channel Analysis and Secure Design COSADE. 39--53. 10.1007\/978-3-642-29912-4_4","DOI":"10.1007\/978-3-642-29912-4_4"},{"key":"e_1_3_2_1_9_1","volume-title":"Blindsight: Blinding EM Side-Channel Leakage using Built-In Fully Integrated Inductive Voltage Regulator. CoRR abs\/1802.09096","author":"Kar Monodeep","year":"2018","unstructured":"Monodeep Kar, Arvind Singh, Sanu Mathew, Santosh Ghosh, Anand Rajan, Vivek De, Raheem Beyah, and Saibal Mukhopadhyay. 2018. Blindsight: Blinding EM Side-Channel Leakage using Built-In Fully Integrated Inductive Voltage Regulator. CoRR abs\/1802.09096 (2018)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2017.7870301"},{"key":"e_1_3_2_1_11_1","volume-title":"Implications of Distributed On-Chip Power Delivery on EM Side-Channel Attacks. In IEEE International Conference on Computer Design, ICCD. 329--336","author":"Khan Ahmed Waheed","year":"2017","unstructured":"Ahmed Waheed Khan, Tanya Wanchoo, Gokhan Mumcu, and Sel\u00e7uk K\u00f6se. 2017. Implications of Distributed On-Chip Power Delivery on EM Side-Channel Attacks. In IEEE International Conference on Computer Design, ICCD. 329--336."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","unstructured":"Paul C. Kocher Joshua Jaffe and Benjamin Jun. 1999. Differential Power Analysis. In Advances in Cryptology - CRYPTO. 388--397.","DOI":"10.5555\/646764.703989"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11545262_21"},{"key":"e_1_3_2_1_14_1","volume-title":"Dan Page, and Michael Tunstall.","author":"Longo Jake","year":"2015","unstructured":"Jake Longo, Elke De Mulder, Dan Page, and Michael Tunstall. 2015. SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip. In Cryptographic Hardware and Embedded Systems - CHES 2015 - 17th International Workshop, Saint-Malo, France, September 13--16, 2015, Proceedings. 620--640."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2483028.2483120"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1208234"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747923"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2014.6865692"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLSISOC.2010.5642612"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2005.850863"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/646803.705980"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1611334"},{"key":"e_1_3_2_1_23_1","first-page":"1283","article-title":"A Primer on Hardware Security","volume":"102","author":"Rostami Masoud","year":"2014","unstructured":"Masoud Rostami, Farinaz Koushanfar, and Ramesh Karri. 2014. A Primer on Hardware Security: Models, Methods, and Metrics. Proc. IEEE 102, 8 (2014), 1283--1295.","journal-title":"Models, Methods, and Metrics. Proc. IEEE"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.862437"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-014-0078-6"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2009.2034081"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2017.54"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2463209.2488830"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744866"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2014.2300139"}],"event":{"name":"ICCAD '18: IEEE\/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN","sponsor":["IEEE-EDS Electronic Devices Society","IEEE CAS","IEEE CEDA"],"location":"San Diego California","acronym":"ICCAD '18"},"container-title":["Proceedings of the International Conference on Computer-Aided Design"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3240765.3240804","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3240765.3240804","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:33Z","timestamp":1750208253000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3240765.3240804"}},"subtitle":["an active countermeasure against EM side-channel attack"],"short-title":[],"issued":{"date-parts":[[2018,11,5]]},"references-count":30,"alternative-id":["10.1145\/3240765.3240804","10.1145\/3240765"],"URL":"https:\/\/doi.org\/10.1145\/3240765.3240804","relation":{},"subject":[],"published":{"date-parts":[[2018,11,5]]},"assertion":[{"value":"2018-11-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}