{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:16:38Z","timestamp":1750220198081,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T00:00:00Z","timestamp":1652745600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","award":["695305 and 788980"],"award-info":[{"award-number":["695305 and 788980"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003246","name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["NWA.1215.18.014"],"award-info":[{"award-number":["NWA.1215.18.014"]}],"id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Cybersecurity Research Flanders","award":["VR20192203"],"award-info":[{"award-number":["VR20192203"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,17]]},"DOI":"10.1145\/3528416.3530992","type":"proceedings-article","created":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T02:16:59Z","timestamp":1651717019000},"page":"258-262","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Energy and side-channel security evaluation of near-threshold cryptographic circuits in 28nm FD-SOI technology"],"prefix":"10.1145","author":[{"given":"Arthur","family":"Beckers","sequence":"first","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]},{"given":"Roel","family":"Uytterhoeven","sequence":"additional","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]},{"given":"Thomas","family":"Vandenabeele","sequence":"additional","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]},{"given":"Jo","family":"Vliegen","sequence":"additional","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]},{"given":"Lennert","family":"Wouters","sequence":"additional","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]},{"given":"Joan","family":"Daemen","sequence":"additional","affiliation":[{"name":"Radboud University, Nijmegen, The Netherlands"}]},{"given":"Wim","family":"Dehaene","sequence":"additional","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]},{"given":"Benedikt","family":"Gierlichs","sequence":"additional","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]},{"given":"Nele","family":"Mentens","sequence":"additional","affiliation":[{"name":"Leiden University, Leiden, The Netherlands and KU Leuven, Leuven, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2022,5,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Towards low energy stream ciphers. IACR Transactions on Symmetric Cryptology","author":"Banik Subhadeep","year":"2018","unstructured":"Subhadeep Banik, Vasily Mikhalev, Frederik Armknecht, Takanori Isobe, Willi Meier, Andrey Bogdanov, Yuhei Watanabe, and Francesco Regazzoni. 2018. Towards low energy stream ciphers. IACR Transactions on Symmetric Cryptology (2018), 1--19."},{"key":"e_1_3_2_1_2_1","volume-title":"Gilles Van Assche, and Ronny VanKeer","author":"Bertoni Guido","year":"2016","unstructured":"Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van Assche, and Ronny VanKeer. 2016. CAESAR submission: Ketje v2. Candidate of CAESAR Competition (2016)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-65411-5_2"},{"key":"e_1_3_2_1_4_1","volume-title":"International Cryptographic Module Conference. http:\/\/icmc-2013","author":"Cooper Jeremy","year":"2013","unstructured":"Jeremy Cooper, Elke DeMulder, Gilbert Goodwill, Joshua Jaffe, Gary Kenworthy, and Pankaj Rohatgi. 2013. Test Vector Leakage Assessment (TVLA) methodology in practice. International Cryptographic Module Conference. http:\/\/icmc-2013.org\/wp\/wp-content\/uploads\/2013\/09\/goodwillkenworthtestvector.pdf."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2018.00090"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDMR.2018.2886463"},{"key":"e_1_3_2_1_7_1","unstructured":"Gilbert Goodwill Benjamin Jun Josh Jaffe and Pankaj Rohatgi. 2011. A testing methodology for side channel resistance validation. NIST non-invasive attack testing workshop. http:\/\/csrc.nist.gov\/news_events\/non-invasive-attack-testing-workshop\/papers\/08_Goodwill.pdf."},{"key":"e_1_3_2_1_8_1","volume-title":"Side-channel analysis of a learning parity with physical noise processor. Journal of Cryptographic Engineering","author":"Kamel Dina","year":"2020","unstructured":"Dina Kamel, Davide Bellizia, Olivier Bronchain, and Fran\u00e7ois-Xavier Standaert. 2020. Side-channel analysis of a learning parity with physical noise processor. Journal of Cryptographic Engineering (2020), 1--9."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2019.06.006"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESSCIRC.2018.8494259"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/PATMOS.2018.8464160"},{"volume-title":"Subthreshold design for ultra low-power systems","author":"Wang Alice","key":"e_1_3_2_1_12_1","unstructured":"Alice Wang, Benton H Calhoun, and Anantha P Chandrakasan. 2006. Subthreshold design for ultra low-power systems. Vol. 95. Springer."}],"event":{"name":"CF '22: 19th ACM International Conference on Computing Frontiers","sponsor":["SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing"],"location":"Turin Italy","acronym":"CF '22"},"container-title":["Proceedings of the 19th ACM International Conference on Computing Frontiers"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3528416.3530992","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3528416.3530992","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:42Z","timestamp":1750186962000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3528416.3530992"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,17]]},"references-count":12,"alternative-id":["10.1145\/3528416.3530992","10.1145\/3528416"],"URL":"https:\/\/doi.org\/10.1145\/3528416.3530992","relation":{},"subject":[],"published":{"date-parts":[[2022,5,17]]},"assertion":[{"value":"2022-05-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}