{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T12:27:17Z","timestamp":1725625637090},"reference-count":25,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2018,4,1]],"date-time":"2018-04-01T00:00:00Z","timestamp":1522540800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100002701","name":"Ministry of Education","doi-asserted-by":"publisher","award":["2017R1D1A1B03034950"],"id":[{"id":"10.13039\/501100002701","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003621","name":"Ministry of Science, ICT and Future Planning","doi-asserted-by":"publisher","award":["2016R1A2B4011069"],"id":[{"id":"10.13039\/501100003621","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers & Electrical Engineering"],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1016\/j.compeleceng.2018.02.030","type":"journal-article","created":{"date-parts":[[2018,3,8]],"date-time":"2018-03-08T09:34:15Z","timestamp":1520501655000},"page":"566-578","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":21,"special_numbering":"C","title":["IoT application protection against power analysis attack"],"prefix":"10.1016","volume":"67","author":[{"given":"Jaegeun","family":"Moon","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9713-1757","authenticated-orcid":false,"given":"Im Y.","family":"Jung","sequence":"additional","affiliation":[]},{"given":"Jong Hyuk","family":"Park","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.compeleceng.2018.02.030_bib0001","series-title":"Encyclopedia of cryptography and security","first-page":"347","article-title":"Lattice based cryptography","author":"Micciancio","year":"2005"},{"issue":"4","key":"10.1016\/j.compeleceng.2018.02.030_bib0002","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1561\/0400000074","article-title":"A decade of lattice cryptography","volume":"10","author":"Peikert","year":"2016","journal-title":"Found Trends\u00ae Theor Comput Sci"},{"key":"10.1016\/j.compeleceng.2018.02.030_bib0003","series-title":"Proceedings of the twenty-eighth annual ACM symposium on theory of computing","first-page":"99","article-title":"Generating hard instances of lattice problems","author":"Ajtai","year":"1996"},{"issue":"6","key":"10.1016\/j.compeleceng.2018.02.030_bib0004","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1145\/1568318.1568324","article-title":"On lattices, learning with errors, random linear codes, and cryptography","volume":"56","author":"Regev","year":"2009","journal-title":"J ACM (JACM)"},{"issue":"6","key":"10.1016\/j.compeleceng.2018.02.030_bib0005","doi-asserted-by":"crossref","first-page":"1803","DOI":"10.1137\/080733954","article-title":"Lossy trapdoor functions and their applications","volume":"40","author":"Peikert","year":"2011","journal-title":"SIAM J Comput"},{"key":"10.1016\/j.compeleceng.2018.02.030_bib0006","series-title":"Annual international cryptology conference","first-page":"554","article-title":"A framework for efficient and composable oblivious transfer","author":"Peikert","year":"2008"},{"key":"10.1016\/j.compeleceng.2018.02.030_bib0007","series-title":"Annual international conference on the theory and applications of cryptographic techniques","first-page":"523","article-title":"Bonsai trees, or how to delegate a lattice basis","author":"Cash","year":"2010"},{"issue":"2","key":"10.1016\/j.compeleceng.2018.02.030_bib0008","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1137\/120868669","article-title":"Efficient fully homomorphic encryption from (standard) LWE","volume":"43","author":"Brakerski","year":"2014","journal-title":"SIAM J Comput"},{"key":"10.1016\/j.compeleceng.2018.02.030_bib0009","series-title":"Annual international conference on the theory and applications of cryptographic techniques","first-page":"1","article-title":"On ideal lattices and learning with errors over rings","author":"Lyubashevsky","year":"2010"},{"key":"10.1016\/j.compeleceng.2018.02.030_bib0010","series-title":"International conference on security, privacy, and applied cryptography engineering","first-page":"323","article-title":"Ring-LWE: applications to cryptography and their efficient realization","author":"Roy","year":"2016"},{"key":"10.1016\/j.compeleceng.2018.02.030_bib0011","series-title":"IACR cryptology ePrint archive","first-page":"78","article-title":"Implementation and comparison of lattice-based identification protocols on smart cards and microcontrollers","author":"Boorghany","year":"2014"},{"key":"10.1016\/j.compeleceng.2018.02.030_bib0012","series-title":"International conference on cryptology and information security in Latin America","first-page":"346","article-title":"High-performance ideal lattice-based cryptography on 8-bit ATxmega microcontrollers","author":"P\u00f6ppelmann","year":"2015"},{"issue":"1","key":"10.1016\/j.compeleceng.2018.02.030_bib0013","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s13389-011-0006-y","article-title":"Introduction to differential power analysis","volume":"1","author":"Kocher","year":"2011","journal-title":"J Cryptogr Eng"},{"key":"10.1016\/j.compeleceng.2018.02.030_bib0014","series-title":"Advances in cryptology\u2014CRYPTO\u201999","first-page":"789","article-title":"Differential power analysis","author":"Kocher","year":"1999"},{"key":"10.1016\/j.compeleceng.2018.02.030_bib0015","series-title":"Emerging trends and applications in computer science (NCETACS)","first-page":"1","article-title":"Embedded security for internet of things","author":"Ukil","year":"2011"},{"key":"10.1016\/j.compeleceng.2018.02.030_bib0016","series-title":"Hardware-oriented security and trust (AsianHOST)","first-page":"1","article-title":"Chosen ciphertext simple power analysis on software 8-bit implementation of ring-LWE encryption","author":"Park","year":"2016"},{"key":"10.1016\/j.compeleceng.2018.02.030_bib0017","doi-asserted-by":"crossref","first-page":"773","DOI":"10.1038\/nphoton.2012.259","article-title":"Experimental realization of Shor's quantum factoring algorithm using qubit recycling","volume":"6","author":"Mart\u00b4\u0131n-L\u00b4opez","year":"2012","journal-title":"Nat Photon"},{"issue":"4","key":"10.1016\/j.compeleceng.2018.02.030_bib0018","first-page":"317","article-title":"Shor's discrete logarithm quantum algorithm for elliptic curves","volume":"3","author":"Proos","year":"2004","journal-title":"Quant Phys"},{"key":"10.1016\/j.compeleceng.2018.02.030_bib0019","series-title":"Proceedings of the 2nd ACM international workshop on IoT privacy, trust, and security","first-page":"2","article-title":"High-performance and lightweight lattice-based public-key encryption","author":"Buchmann","year":"2016"},{"key":"10.1016\/j.compeleceng.2018.02.030_bib0020","unstructured":"Vscrypto, A post-quantum fork of OpenSSL 1.0.2e containing a practical ring-LWE key exchange implementation. https:\/\/github.com\/vscrypto\/openssl-ringlwe."},{"key":"10.1016\/j.compeleceng.2018.02.030_bib0021","author":"P\u00f6ppelmann"},{"key":"10.1016\/j.compeleceng.2018.02.030_bib0022","unstructured":"Takagi N. Studies on hardware algorithms for arithmetic operations with a redundant binary representation, 1988."},{"key":"10.1016\/j.compeleceng.2018.02.030_bib0023","unstructured":"Hagai Bar-El. Introduction to side channel attacks. advanced embedded security, white paper, Discretix Technologies Ltd."},{"key":"10.1016\/j.compeleceng.2018.02.030_bib0024","series-title":"Side channel attacks and countermeasures for embedded systems","author":"de Haas","year":"2007"},{"key":"10.1016\/j.compeleceng.2018.02.030_bib0025","series-title":"Advances in cryptology\u2014CRYPTO'98","first-page":"13","article-title":"A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack","author":"Cramer","year":"1998"}],"container-title":["Computers & Electrical Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790617319596?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790617319596?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2022,6,25]],"date-time":"2022-06-25T04:22:16Z","timestamp":1656130936000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0045790617319596"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":25,"alternative-id":["S0045790617319596"],"URL":"https:\/\/doi.org\/10.1016\/j.compeleceng.2018.02.030","relation":{},"ISSN":["0045-7906"],"issn-type":[{"value":"0045-7906","type":"print"}],"subject":[],"published":{"date-parts":[[2018,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"IoT application protection against power analysis attack","name":"articletitle","label":"Article Title"},{"value":"Computers & Electrical Engineering","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.compeleceng.2018.02.030","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2018 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}