{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,30]],"date-time":"2024-12-30T19:13:45Z","timestamp":1735586025029,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,5]]},"DOI":"10.1145\/3583781.3590295","type":"proceedings-article","created":{"date-parts":[[2023,5,31]],"date-time":"2023-05-31T22:40:19Z","timestamp":1685572819000},"page":"439-442","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Dynamic Gold Code-Based Chaotic Clock for Cryptographic Designs to Counter Power Analysis Attacks"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-8011-5518","authenticated-orcid":false,"given":"Thai-Ha","family":"Tran","sequence":"first","affiliation":[{"name":"University of Electro-Communications, Tokyo, Japan"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-9052-4796","authenticated-orcid":false,"given":"Anh-Tien","family":"Le","sequence":"additional","affiliation":[{"name":"University of Electro-Communications, Tokyo, Japan"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4078-0836","authenticated-orcid":false,"given":"Trong-Thuc","family":"Hoang","sequence":"additional","affiliation":[{"name":"University of Electro-Communications, Tokyo, Japan"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-0944-8701","authenticated-orcid":false,"given":"Van-Phuc","family":"Hoang","sequence":"additional","affiliation":[{"name":"University of Electro-Communications, Hanoi, Japan"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5255-4919","authenticated-orcid":false,"given":"Cong-Kha","family":"Pham","sequence":"additional","affiliation":[{"name":"University of Electro-Communications, Tokyo, Japan"}]}],"member":"320","published-online":{"date-parts":[[2023,6,5]]},"reference":[{"key":"e_1_3_2_1_1_1","article-title":"Chaotic Clock Driven Cryptographic Chip: Towards a DPA Resistant AES Processor","volume":"10","author":"Moursy A. A.","year":"2020","unstructured":"A. A. E.-Moursy, A. M. Darya, A. S. Elwakil, A. Jha, and S. Majzoub. Dec. 2020. Chaotic Clock Driven Cryptographic Chip: Towards a DPA Resistant AES Processor. IEEE Trans. on Emerging Topics in Comp., Vol. 10, 2 ( Dec. 2020), 792--805.","journal-title":"IEEE Trans. on Emerging Topics in Comp."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/APCCAS.2016.7803910"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2016.2566262"},{"volume-title":"Proc. of Int. Conf. on Field-Prog. Logic and Appl. (FPL)","author":"Hettwer B.","key":"e_1_3_2_1_4_1","unstructured":"B. Hettwer, K. Das, S. Leger, S. Gehrer, and T. G\u00fcneysu. Aug. 2020. Lightweight Side-Channel Protection using Dynamic Clock Randomization. In Proc. of Int. Conf. on Field-Prog. Logic and Appl. (FPL) (Gothenburg, Sweden). 200--207."},{"volume-title":"Proc. of Selected Areas in Crypto. (SAC) (Calgary, AB, Canada). 193--215","author":"Fledel D.","key":"e_1_3_2_1_5_1","unstructured":"D. Fledel and A. Wool. Aug. 2018. Sliding-Window Correlation Attacks Against Encryption Devices with an Unstable Clock. In Proc. of Selected Areas in Crypto. (SAC) (Calgary, AB, Canada). 193--215."},{"key":"e_1_3_2_1_6_1","volume-title":"Optimizing Implementations of Non-Profiled Deep Learning-Based Side-Channel Attacks. IEEE Access","volume":"10","author":"Kwon D.","year":"2022","unstructured":"D. Kwon, S. Hong, and H. Kim. Jan. 2022. Optimizing Implementations of Non-Profiled Deep Learning-Based Side-Channel Attacks. IEEE Access, Vol. 10 ( Jan. 2022), 5957--5967."},{"volume-title":"Proc. of Crypto. Hardware and Embedded Syst. (CHES)","author":"Brier E.","key":"e_1_3_2_1_7_1","unstructured":"E. Brier, C. Clavier, and F. Olivier. Aug. 2004. Correlation Power Analysis with a Leakage Model. In Proc. of Crypto. Hardware and Embedded Syst. (CHES) (Cambridge, MA, USA). 16--29."},{"volume-title":"2009 IEEE Int. Symposium on Circuits and Systems (ISCAS). 2858--2861","author":"Pareschi F.","key":"e_1_3_2_1_8_1","unstructured":"F. Pareschi, G. Scotti, L. Giancane, R. Rovatti, G. Setti, and A. Trifiletti. 2009. Power analysis of a chaos-based Random Number Generator for cryptographic security. In 2009 IEEE Int. Symposium on Circuits and Systems (ISCAS). 2858--2861."},{"volume-title":"Proc. of Topics in Cryptology (CT-RSA)","author":"Van Woudenberg J. G. J.","key":"e_1_3_2_1_9_1","unstructured":"J. G. J. Van Woudenberg, M. F. Witteman, and B. Bakker. Feb. 2011. Improving Differential Power Analysis by Elastic Alignment. In Proc. of Topics in Cryptology (CT-RSA) (San Francisco, CA, USA). 104--119."},{"key":"e_1_3_2_1_10_1","unstructured":"W. Killmann and W. Schindler. 2001. AIS 31: Functionality classes and evaluation methodology for true (physical) random number generators version 3.1. Bundesamt fur Sicherheit in der Informationstechnik (BSI) Bonn (2001)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.15803\/ijnc.11.2_154"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2019.2926555"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2015.7168576"},{"volume-title":"Proc. of Annual Int. Cryptology Conf. (CRYPTO)","author":"Kocher P.","key":"e_1_3_2_1_14_1","unstructured":"P. Kocher, J. Jaffe, and B. Jun. Aug. 1999. Differential Power Analysis. In Proc. of Annual Int. Cryptology Conf. (CRYPTO) (Santa Barbara, CA, USA). 388--397."},{"volume-title":"Proc. of Int. Conf. on Intel. Info. Hiding and Multimedia Signal Processing (IIHMSP) (Piraeus-Athens, Greece). 465--470","author":"Tian Q.","key":"e_1_3_2_1_15_1","unstructured":"Q. Tian and S. A. Huss. Jul. 2012. A General Approach to Power Trace Alignment for the Assessment of Side-Channel Resistance of Hardened Cryptosystems. In Proc. of Int. Conf. on Intel. Info. Hiding and Multimedia Signal Processing (IIHMSP) (Piraeus-Athens, Greece). 465--470."},{"key":"e_1_3_2_1_16_1","article-title":"Deep Learning for Side-channel Analysis and Introduction to ASCAD Database","volume":"10","author":"Benadjila R.","year":"2019","unstructured":"R. Benadjila, E. Prouff, R. Strullu, E. Cagli, and C. Dumas. Nov. 2019. Deep Learning for Side-channel Analysis and Introduction to ASCAD Database. Journal of Crypto. Engi., Vol. 10 (Nov. 2019), 163--188.","journal-title":"Journal of Crypto. Engi."},{"key":"e_1_3_2_1_17_1","volume-title":"NIST Special Publication","volume":"800","author":"Rukhin A.","year":"2010","unstructured":"A. Rukhin et al. 2010. NIST special publication 800-22: A statistical test suite for the validation of random number generators and pseudo random number generators for cryptographic applications. NIST Special Publication, Vol. 800, 22 (2010)."},{"key":"e_1_3_2_1_18_1","volume-title":"Matlab","author":"Srinivasan V.","year":"2020","unstructured":"V. Srinivasan and M. Viswanathan. 2020. Wireless Communication Systems in Matlab: Second Edition. Independently Published. https:\/\/books.google.co.jp\/books?id=2jrAzQEACAAJ"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3047976"},{"key":"e_1_3_2_1_20_1","volume-title":"Efficient Correlation Power Analysis (CPA) Focusing on Byte-Wise Calculation Points. IEEE Access","volume":"9","author":"Jeon Y.","year":"2021","unstructured":"Y. Jeon, J. H. Jung, and J. W. Yoon. Jan. 2021. Efficient Correlation Power Analysis (CPA) Focusing on Byte-Wise Calculation Points. IEEE Access, Vol. 9 ( Jan. 2021), 74275--74285."}],"event":{"name":"GLSVLSI '23: Great Lakes Symposium on VLSI 2023","sponsor":["SIGDA ACM Special Interest Group on Design Automation"],"location":"Knoxville TN USA","acronym":"GLSVLSI '23"},"container-title":["Proceedings of the Great Lakes Symposium on VLSI 2023"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3583781.3590295","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,5]],"date-time":"2024-06-05T10:33:27Z","timestamp":1717583607000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3583781.3590295"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,5]]},"references-count":20,"alternative-id":["10.1145\/3583781.3590295","10.1145\/3583781"],"URL":"https:\/\/doi.org\/10.1145\/3583781.3590295","relation":{},"subject":[],"published":{"date-parts":[[2023,6,5]]},"assertion":[{"value":"2023-06-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}