{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T14:09:05Z","timestamp":1726409345330},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319120119"},{"type":"electronic","value":"9783319120126"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-12012-6_2","type":"book-chapter","created":{"date-parts":[[2014,10,31]],"date-time":"2014-10-31T15:09:45Z","timestamp":1414768185000},"page":"13-20","source":"Crossref","is-referenced-by-count":0,"title":["Analysis of Secret Key Revealing Trojan Using Path Delay Analysis for Some Cryptocores"],"prefix":"10.1007","author":[{"given":"Krishnendu","family":"Guha","sequence":"first","affiliation":[]},{"given":"Romio Rosan","family":"Sahani","sequence":"additional","affiliation":[]},{"given":"Moumita","family":"Chakraborty","sequence":"additional","affiliation":[]},{"given":"Amlan","family":"Chakrabarti","sequence":"additional","affiliation":[]},{"given":"Debasri","family":"Saha","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"2_CR1","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MDT.2010.7","volume":"27","author":"M. Tehranipoor","year":"2010","unstructured":"Tehranipoor, M., Koushanfar, F.: A survey of hardware Trojan taxonomy and detection. IEEE Design and Test of Computers\u00a027(1), 10\u201325 (2010)","journal-title":"IEEE Design and Test of Computers"},{"issue":"3","key":"2_CR2","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MDT.2012.2196252","volume":"30","author":"S. Bhunia","year":"2013","unstructured":"Bhunia, S., Abramovici, M., Agrawal, D., Hsiao, M.S., Plusquellic, J., Tehranipoor, M.: Protection Against Hardware Trojan Attacks: Towards a Comprehensive Solution. IEEE Design and Test of Computers\u00a030(3), 6\u201317 (2013)","journal-title":"IEEE Design and Test of Computers"},{"issue":"1","key":"2_CR3","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MDT.2010.21","volume":"27","author":"Y. Jin","year":"2010","unstructured":"Jin, Y., Makris, Y.: Hardware Trojans in Wireless Cryptographic ICs. IEEE Design and Test of Computers\u00a027(1), 26\u201335 (2010)","journal-title":"IEEE Design and Test of Computers"},{"issue":"2","key":"2_CR4","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/MDT.2013.2247460","volume":"30","author":"R.S. Chakraborty","year":"2013","unstructured":"Chakraborty, R.S., Saha, I., Palchaudhuri, A., Naik, G.K.: Hardware Trojan Insertion by Direct Modification of FPGA Configuration Bitstream. IEEE Design and Test of Computers\u00a030(2), 45\u201354 (2013)","journal-title":"IEEE Design and Test of Computers"},{"issue":"12","key":"2_CR5","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1109\/TVLSI.2009.2029117","volume":"18","author":"R. Rad","year":"2010","unstructured":"Rad, R., Plusquellic, J., Tehranipoor, M.: A Sensitivity Analysis of Power Signal Methods for Detecting Hardware Trojans Under Real Process and Environmental Conditions. IEEE Transactions on Very Large Scale Integration (VLSI) Systems\u00a018(12), 1735\u20131744 (2010)","journal-title":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Wang, L., Xie, H., Luo, H.: Malicious Circuitry Detection Using Transient Power Analysis for IC Security. In: International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering (QR2MSE), pp. 1164\u20131167 (2013)","DOI":"10.1109\/QR2MSE.2013.6625774"},{"issue":"4","key":"2_CR7","doi-asserted-by":"publisher","first-page":"893","DOI":"10.1109\/TIFS.2010.2061228","volume":"5","author":"J. Aarestad","year":"2010","unstructured":"Aarestad, J., Acharyya, D., Rad, R., Plusquellic, J.: Detecting Trojans through leakage current analysis using multiple supply pad. IEEE Transactions on Information Forensics and Security\u00a05(4), 893\u2013904 (2010)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"2_CR8","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/TVLSI.2010.2093547","volume":"20","author":"H. Salmani","year":"2012","unstructured":"Salmani, H., Tehranipoor, M., Plusquellic, J.: A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time. IEEE Transactions on Very Large Scale Integration (VLSI) Systems\u00a020(1), 112\u2013125 (2012)","journal-title":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems"},{"issue":"11","key":"2_CR9","doi-asserted-by":"publisher","first-page":"2183","DOI":"10.1109\/TC.2012.200","volume":"62","author":"S. Narasimhan","year":"2013","unstructured":"Narasimhan, S., Du, D., Chakraborty, R.S., Paul, S., Wolff, F.G., Papachristou, C.A., Roy, K., Bhunia, S.: Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis. IEEE Transactions on Computers\u00a062(11), 2183\u20132195 (2013)","journal-title":"IEEE Transactions on Computers"},{"issue":"6","key":"2_CR10","doi-asserted-by":"publisher","first-page":"1049","DOI":"10.1109\/TVLSI.2011.2147341","volume":"20","author":"S. Wei","year":"2012","unstructured":"Wei, S., Potkonjak, M.: Scalable Hardware Trojan Diagnosis. IEEE Transactions on Very Large Scale Integration (VLSI) Systems\u00a020(6), 1049\u20131057 (2012)","journal-title":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Bhasin, S., Danger, J., Guilley, S., Thuy, X., Sauvage, L.: Hardware Trojan Horses in Cryptographic IP Cores. In: Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 15\u201329 (2013)","DOI":"10.1109\/FDTC.2013.15"},{"issue":"1","key":"2_CR12","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/TIFS.2011.2164908","volume":"7","author":"H. Salmani","year":"2012","unstructured":"Salmani, H., Tehranipoor, M.: Layout-Aware Switching Activity Localization to Enhance Hardware Trojan Detection. IEEE Transactions on Information Forensics and Security\u00a07(1), 76\u201387 (2012)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2_CR13","unstructured":"Forouzan, B., Mukhopadhyay, D.: Cryptography and Network Security, 2nd edn. McGraw Hill, ISBN: 978-0-07-070208-0"},{"key":"2_CR14","unstructured":"Stallings, W.: Cryptography and Network Security, 3rd edn. Prentice Hall (2003) ISBN: 0-13-11 1502-2"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12012-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T04:49:17Z","timestamp":1675831757000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12012-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319120119","9783319120126"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12012-6_2","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]}}}