{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T22:25:17Z","timestamp":1730240717596,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,12]]},"DOI":"10.1109\/icecs.2007.4511263","type":"proceedings-article","created":{"date-parts":[[2008,5,5]],"date-time":"2008-05-05T20:21:05Z","timestamp":1210018865000},"page":"1408-1411","source":"Crossref","is-referenced-by-count":3,"title":["Power Analysis Resistant Hardware Implementations of AES"],"prefix":"10.1109","author":[{"given":"Levent","family":"Ordu","sequence":"first","affiliation":[]},{"given":"Berna","family":"Ors","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"309","article-title":"An implementation of DES and AES, secure against some attacks","volume":"2162","author":"akkar","year":"2001","journal-title":"ser LNCS"},{"key":"ref11","first-page":"198","article-title":"Multiplicative masking and power anaylsis of AES","volume":"2535","author":"golic","year":"2002","journal-title":"ser LNCS"},{"key":"ref12","first-page":"413","article-title":"A side-channel analysis resistant description of the AES s-box","volume":"3557","author":"oswald","year":"2005","journal-title":"ser LNCS"},{"key":"ref13","first-page":"288","article-title":"The block cipher Rijndael","volume":"1820","author":"daemen","year":"1998","journal-title":"ser LNCS"},{"journal-title":"CMOS Digital Integrated Circuits Analysis and Design","year":"2002","author":"kang","key":"ref14"},{"key":"ref15","article-title":"Efficient hardware calculation of inverses in GF (28)","author":"ward","year":"0","journal-title":"Department of Physics"},{"key":"ref16","article-title":"Efficient VLSI architectures for bit-parallel computations in galois fields","author":"paar","year":"1994","journal-title":"Institute for Experimental Mathematics"},{"key":"ref4","first-page":"388","article-title":"Differential power analysis","volume":"1666","author":"kocher","year":"1999"},{"key":"ref3","first-page":"104","article-title":"Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems","volume":"1109","author":"kocher","year":"1996","journal-title":"CRYPTO'96"},{"key":"ref6","first-page":"200","article-title":"Electromagnetic analysis (EMA): Measures and counter-measures for smard cards","volume":"2140","author":"quisquater","year":"2001","journal-title":"ser LNCS"},{"key":"ref5","first-page":"255","article-title":"Electromagnetic analysis: Concrete results","volume":"2162","author":"gandolfi","year":"2001","journal-title":"ser LNCS"},{"key":"ref8","first-page":"158","article-title":"DES and differential power analysis the “duplication” method","volume":"1717","author":"goubin","year":"1999","journal-title":"ser LNCS"},{"key":"ref7","article-title":"Acoustic cryptanalysis","author":"shamir","year":"2004","journal-title":"Preliminary proof-of-concept presentation"},{"key":"ref2","first-page":"1","article-title":"Tamper resistance - a cautionary note","author":"anderson","year":"1996","journal-title":"Proceedings of the 2nd USENIX Workshop on Electronic Commerce"},{"journal-title":"FIPS 197 Advanced Encryption Standard","article-title":"National Institute of Standards and Technology","year":"2001","key":"ref1"},{"key":"ref9","article-title":"Securing the AES finalists against power analysis attacks","volume":"1978","author":"messerges","year":"2000","journal-title":"ser LNCS"}],"event":{"name":"2007 14th IEEE International Conference on Electronics, Circuits and Systems (ICECS '07)","start":{"date-parts":[[2007,12,11]]},"location":"Marrakech","end":{"date-parts":[[2007,12,14]]}},"container-title":["2007 14th IEEE International Conference on Electronics, Circuits and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4456901\/4510892\/04511263.pdf?arnumber=4511263","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T14:24:42Z","timestamp":1602685482000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4511263"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,12]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icecs.2007.4511263","relation":{},"subject":[],"published":{"date-parts":[[2007,12]]}}}