{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T18:24:07Z","timestamp":1725733447753},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,12]]},"DOI":"10.1109\/acsac.2009.14","type":"proceedings-article","created":{"date-parts":[[2010,1,20]],"date-time":"2010-01-20T20:56:45Z","timestamp":1264021005000},"page":"43-50","source":"Crossref","is-referenced-by-count":11,"title":["Evaluation of a DPA-Resistant Prototype Chip"],"prefix":"10.1109","author":[{"given":"Mario","family":"Kirschbaum","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Popp","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/978-3-540-74735-2_6","article-title":"Evaluation of the Masked Logic Style MDPL on a Prototype Chip","author":"popp","year":"2007","journal-title":"Cryptographic Hardware and Embedded Systems - CHES 2007 9th International Workshop Vienna Austria September 10-13 2007 Proceedings volume 4727 of Lecture Notes in Computer Science"},{"key":"ref11","first-page":"172","article-title":"Masked Dual-Rail Pre-Charge Logic: DPA-Resistance without Routing Constraints","author":"popp","year":"2005","journal-title":"Cryptographic Hardware and Embedded Systems - CHES 2005 7th International Workshop Edinburgh UK August 29 - September 1 2005 Proceedings volume 3659 of Lecture Notes in Computer Science"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/978-3-540-74735-2_7","article-title":"Masking and Dual-Rail Logic Dont Add Up","author":"schaumont","year":"2007","journal-title":"Cryptographic Hardware and Embedded Systems - CHES 2007 9th International Workshop Vienna Austria September 10-13 2007 Proceedings volume 4727 of Lecture Notes in Computer Science"},{"key":"ref13","first-page":"255","article-title":"Security Evaluation of DPA Countermeasures Using Dual-Rail Pre-charge Logic Style","author":"suzuki","year":"2006","journal-title":"Cryptographic Hardware and Embedded Systems - CHES 2006 8th International Workshop Yokohama Japan October 10-13 2006 Proceedings volume 4249 of Lecture Notes in Computer Science"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1093\/ietfec\/e90-a.1.160"},{"key":"ref15","first-page":"134","article-title":"Changing the Odds against Masked Logic","author":"tiri","year":"2007","journal-title":"Selected Areas in Cryptography 13th International Workshop SAC 2006 Montreal Quebec Canada August 17-18 2006 Revised Selected Papers volume 4356 of Lecture Notes in Computer Science"},{"key":"ref4","article-title":"How to Break DES for 8,980","author":"kumar","year":"2006","journal-title":"SHARCS - Special-purpose Hardware for Attacking Cryptographic Systems"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2006.49"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1190589"},{"key":"ref5","first-page":"101","article-title":"Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker","author":"kumar","year":"2006","journal-title":"Cryptographic Hardware and Embedded Systems - CHES 2006 8th International Workshop Yokohama Japan October 10-13 2006 Proceedings volume 4249 of Lecture Notes in Computer Science"},{"key":"ref8","first-page":"351","article-title":"Side-Channel Leakage of Masked CMOS Gates","author":"mangard","year":"2005","journal-title":"Topics in Cryptology - CT-RSA 2005 The Cryptographers' Track at the RSA Conference 2005 San Francisco CA USA February 14-18 2005 Proceedings volume 3376 of Lecture Notes in Computer Science"},{"journal-title":"Power Analysis Attacks - Revealing the Secrets of Smart Cards","year":"2007","author":"mangard","key":"ref7"},{"key":"ref2","first-page":"388","article-title":"Differential Power Analysis","author":"kocher","year":"1999","journal-title":"Advances in Cryptology - CRYPTO '99 19th Annual International Cryptology Conference Santa Barbara California USA August 15-19 1999 Proceedings volume 1666 of Lecture Notes in Computer Science"},{"key":"ref1","article-title":"Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip","author":"batina","year":"2008","journal-title":"Proceedings of the 11th international conference on Information Security 2008"},{"year":"2001","key":"ref9"}],"event":{"name":"2009 Annual Computer Security Applications Conference (ACSAC)","start":{"date-parts":[[2009,12,7]]},"location":"Honolulu, Hawaii, USA","end":{"date-parts":[[2009,12,11]]}},"container-title":["2009 Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5379501\/5380502\/05380517.pdf?arnumber=5380517","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,26]],"date-time":"2020-05-26T22:52:49Z","timestamp":1590533569000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5380517\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/acsac.2009.14","relation":{},"subject":[],"published":{"date-parts":[[2009,12]]}}}