{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:07:40Z","timestamp":1730221660865,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/ewme.2018.8629483","type":"proceedings-article","created":{"date-parts":[[2019,1,31]],"date-time":"2019-01-31T19:36:24Z","timestamp":1548963384000},"page":"59-62","source":"Crossref","is-referenced-by-count":0,"title":["Hardware-oriented Security in a Computer Science Curriculum"],"prefix":"10.1109","author":[{"given":"Ilia","family":"Polian","sequence":"first","affiliation":[]},{"given":"Mael","family":"Gay","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-011-0006-y"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-71817-0_2"},{"journal-title":"A Proposal For Functionality Classes for Random Number Generators Version 2 0","year":"2011","author":"killmann","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2016.7577379"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/978-1-4419-8080-9_4","article-title":"Security based on physical unclonability and disorder","author":"r\u00fchrmair","year":"2012","journal-title":"Introduction to Hardware Security and Trust"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1284680.1284683"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2331553"},{"key":"ref17","first-page":"473","article-title":"Covert and side channels due to processor architecture","author":"wang","year":"2008","journal-title":"Comp Security App Conf"},{"key":"ref18","article-title":"Spectre attacks: Exploiting speculative execution","author":"kocher","year":"2019","journal-title":"40th IEEE Symposium on Security and Privacy (S&P’19)"},{"journal-title":"Building a secure system using trust-zone technology","year":"2009","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.49"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-04101-3","author":"paar","year":"2010","journal-title":"Understanding Cryptography A Text Book for Student and Practitioners"},{"journal-title":"Implementation of Cryptographic Schemes 1","year":"2015","author":"paar","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8080-9_3"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2012.2188769"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1049\/el:19820617"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2335155"},{"journal-title":"Power Analysis Attacks","year":"2007","author":"mangard","key":"ref9"},{"key":"ref1","first-page":"194","article-title":"Securing the hardware of cyber-physical systems","author":"regazzoni","year":"2017","journal-title":"ASP-DAC"},{"key":"ref20","first-page":"86","article-title":"Intel SGX explained","volume":"2016","author":"costan","year":"2016","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/978-1-4419-8080-9_5","article-title":"Hardware metering: A survey","author":"koushanfar","year":"2012","journal-title":"Introduction to Hardware Security and Trust"},{"key":"ref21","first-page":"363","article-title":"The state-of-the-art in IC reverse engineering","volume":"5747","author":"torrance","year":"2009","journal-title":"CHES Ser LNCS"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2014.12"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2334493"},{"key":"ref26","first-page":"224","article-title":"Differential fault analysis of the Advanced Encryption Standard using a single fault","author":"tunstall","year":"2011","journal-title":"WISTP (LNCS 6633)"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/11502760_10","article-title":"Small scale variants of the AES","author":"cid","year":"2005","journal-title":"Fast Software Encryption"}],"event":{"name":"2018 12th European Workshop on Microelectronics Education (EWME)","start":{"date-parts":[[2018,9,24]]},"location":"Braunschweig, Germany","end":{"date-parts":[[2018,9,26]]}},"container-title":["2018 12th European Workshop on Microelectronics Education (EWME)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8622718\/8629388\/08629483.pdf?arnumber=8629483","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T18:54:32Z","timestamp":1643223272000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8629483\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/ewme.2018.8629483","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}