{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T13:04:20Z","timestamp":1749128660080,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.23919\/date.2018.8342178","type":"proceedings-article","created":{"date-parts":[[2018,4,23]],"date-time":"2018-04-23T19:20:11Z","timestamp":1524511211000},"page":"1117-1122","source":"Crossref","is-referenced-by-count":14,"title":["Confident leakage assessment \u2014 A side-channel evaluation framework based on confidence intervals"],"prefix":"10.23919","author":[{"given":"Florian","family":"Bache","sequence":"first","affiliation":[]},{"given":"Christina","family":"Plump","sequence":"additional","affiliation":[]},{"given":"Tim","family":"Guneysu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"287","article-title":"Towards sound and optimal leakage detection procedure","volume":"2017","author":"zhang","year":"2017","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref11","first-page":"570","volume":"xii","author":"r\u00fcger","year":"2002","journal-title":"Test- und Scha&#x00E4;tztheorie Vol 2 Statistische Tests Lehr- und Handbucher der Statistik"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2307\/2283989"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_19"},{"journal-title":"Side-channel AttacK User Reference Architecture","year":"0","key":"ref14"},{"key":"ref15","first-page":"486","article-title":"Domain-oriented masking: Compact masked hardware implementations with arbitrary protection order","volume":"2016","author":"gro\u00df","year":"2016","journal-title":"IACR Cryptology ePrint Archive"},{"journal-title":"DOM protected hardware implementation of AES","year":"2017","author":"gro\u00df","key":"ref16"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_9"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34961-4_44"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47989-6_37"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s12095-014-0104-7"},{"journal-title":"Leakage assessment methodology - A clear roadmap for side-channel evaluations","year":"2015","author":"schneider","key":"ref8"},{"key":"ref7","article-title":"A testing methodology for side channel resistance validation","author":"goodwill","year":"2011","journal-title":"NIST Non-invasive Attack Testing Workshop"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45418-7_17"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"key":"ref9","first-page":"138","article-title":"How (not) to use welch's t-test in side-channel security evaluations","volume":"2017","author":"standaert","year":"2017","journal-title":"IACR Cryptology ePrint Archive"}],"event":{"name":"2018 Design, Automation & Test in Europe Conference & Exhibition (DATE)","start":{"date-parts":[[2018,3,19]]},"location":"Dresden, Germany","end":{"date-parts":[[2018,3,23]]}},"container-title":["2018 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8337149\/8341968\/08342178.pdf?arnumber=8342178","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,8]],"date-time":"2018-05-08T14:25:09Z","timestamp":1525789509000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8342178\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":16,"URL":"https:\/\/doi.org\/10.23919\/date.2018.8342178","relation":{},"subject":[],"published":{"date-parts":[[2018,3]]}}}