{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:49:48Z","timestamp":1729619388134,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/asscc.2014.7008901","type":"proceedings-article","created":{"date-parts":[[2015,1,20]],"date-time":"2015-01-20T02:48:18Z","timestamp":1421722098000},"page":"225-228","source":"Crossref","is-referenced-by-count":13,"title":["An intermittent-driven supply-current equalizer for 11x and 4x power-overhead savings in CPA-resistant 128bit AES cryptographic processor"],"prefix":"10.1109","author":[{"given":"Noriyuki","family":"Miura","sequence":"first","affiliation":[]},{"given":"Daisuke","family":"Fujimoto","sequence":"additional","affiliation":[]},{"given":"Rie","family":"Korenaga","sequence":"additional","affiliation":[]},{"given":"Kohei","family":"Matsuda","sequence":"additional","affiliation":[]},{"given":"Makoto","family":"Nagata","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","article-title":"Differential power analysis","volume":"1666","author":"kocher","year":"1999","journal-title":"CRYPTO Lecture Notes in Computer Science"},{"key":"2","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","article-title":"Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems","volume":"1109","author":"kocher","year":"1996","journal-title":"CRYPTO Lecture Notes in Computer Science]"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45418-7_17"},{"journal-title":"Announcing the Advanced Encryption Standard (AES)","year":"2001","author":"united states national institute of standards and technology (nist)","key":"1","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.FIPS.197"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2009.4977309"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2011.5746316"},{"key":"5","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1007\/11545262_26","article-title":"Prototype ic with wddl and differential routing-Dpa resistance assessment","volume":"3659","author":"tiri","year":"2005","journal-title":"CHES of Lecture Notes in Computer Science"},{"journal-title":"Power Analysis Attacks-revealing the Secrets of Smart Cards","year":"2007","author":"mangard","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44709-1_21"},{"year":"0","key":"8"},{"key":"11","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/3-540-36400-5_4","article-title":"The em sidechannel(s)","volume":"2523","author":"agrawal","year":"2002","journal-title":"CHES Ser Lecture Notes in Computer Science"}],"event":{"name":"2014 IEEE Asian Solid-State Circuits Conference (A-SSCC)","start":{"date-parts":[[2014,11,10]]},"location":"KaoHsiung, Taiwan","end":{"date-parts":[[2014,11,12]]}},"container-title":["2014 IEEE Asian Solid-State Circuits Conference (A-SSCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6996072\/7008838\/07008901.pdf?arnumber=7008901","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,19]],"date-time":"2019-08-19T21:42:44Z","timestamp":1566250964000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7008901\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/asscc.2014.7008901","relation":{},"subject":[],"published":{"date-parts":[[2014,11]]}}}