{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:07:57Z","timestamp":1730225277543,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1109\/hst.2011.5954995","type":"proceedings-article","created":{"date-parts":[[2011,7,20]],"date-time":"2011-07-20T16:53:14Z","timestamp":1311180794000},"page":"51-56","source":"Crossref","is-referenced-by-count":0,"title":["Performance evaluation of protocols resilient to physical attacks"],"prefix":"10.1109","author":[{"given":"Sylvain","family":"Guilley","sequence":"first","affiliation":[]},{"given":"Laurent","family":"Sauvage","sequence":"additional","affiliation":[]},{"given":"Jean-Luc","family":"Danger","sequence":"additional","affiliation":[]},{"given":"Nidhal","family":"Selmane","sequence":"additional","affiliation":[]},{"given":"Denis","family":"Real","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12678-9_17"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01001-9_27"},{"key":"ref12","first-page":"210","article-title":"All-or-Nothing Encryption and the Package Transform","author":"rivest","year":"1997","journal-title":"FSE volume 1267 of LNCS"},{"key":"ref13","first-page":"443","article-title":"A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks","volume":"5479","author":"standaert","year":"2009","journal-title":"Eurocrypt"},{"journal-title":"Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault","year":"2009","author":"tunstall","key":"ref14"},{"key":"ref4","first-page":"254","article-title":"On Side-Channel Resistant Block Cipher Usage","volume":"6531","author":"guajardo","year":"2010","journal-title":"ISC"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11799-2_21"},{"journal-title":"Leak-resistant Cryptographic Indexed Key Update","year":"2003","author":"kocher","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2010.15"},{"journal-title":"A differential side-channel analysis counter-measure European Patent Application","year":"0","author":"mcevoy","key":"ref8"},{"journal-title":"Design and Validation Strategies for Obtaining Assurance in Countermeasures to Power Analysis and Related Attacks","year":"2005","author":"kocher","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10366-7_38"},{"journal-title":"All-or-Nothing Transforms as a Countermeasure to Differential Side-Channel Analysis","year":"2009","author":"mcevoy","key":"ref9"}],"event":{"name":"2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","start":{"date-parts":[[2011,6,5]]},"location":"San Diego, CA, USA","end":{"date-parts":[[2011,6,6]]}},"container-title":["2011 IEEE International Symposium on Hardware-Oriented Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5946040\/5954984\/05954995.pdf?arnumber=5954995","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,20]],"date-time":"2017-03-20T21:31:16Z","timestamp":1490045476000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5954995\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/hst.2011.5954995","relation":{},"subject":[],"published":{"date-parts":[[2011,6]]}}}