{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:35:01Z","timestamp":1725543301976},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540354376"},{"type":"electronic","value":"9783540354383"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11767480_17","type":"book-chapter","created":{"date-parts":[[2006,7,4]],"date-time":"2006-07-04T05:21:27Z","timestamp":1151990487000},"page":"253-267","source":"Crossref","is-referenced-by-count":1,"title":["Physical Security Bounds Against Tampering"],"prefix":"10.1007","author":[{"given":"Kerstin","family":"Lemke","sequence":"first","affiliation":[]},{"given":"Christof","family":"Paar","sequence":"additional","affiliation":[]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"ISO 13491-1:1998 Banking \u2013 Secure cryptographic devices (retail)\u2013 Part 1: Concepts, requirements and evaluation methods"},{"key":"17_CR2","unstructured":"FIPS PUB 140-2, Security Requirements for Cryptographic Modules (2001)"},{"key":"17_CR3","unstructured":"Anderson, R., Kuhn, M.: Tamper Resistance \u2014 A Cautionary Note. In: The Second USENIX Workshop on Electronic Commerce Proocedings, pp. 1\u201311 (1996)"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Aum\u00fcller, C., Bier, P., Fischer, W., Hofreiter, P., Seifert, J.-P.: Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures. In: Jr. et\u00a0al. [14], pp. 260\u2013275","DOI":"10.1007\/3-540-36400-5_20"},{"key":"17_CR5","unstructured":"Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The Sorcerer\u2019s Apprenctice\u2019s Guide to Fault Attacks, Technical report (2004), available at: http:\/\/eprint.iacr.org\/2004\/100"},{"key":"17_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/11502760_24","volume-title":"Fast Software Encryption","author":"E. Biham","year":"2005","unstructured":"Biham, E., Granboulan, L., Nguy\u00ea\u0303n, P.Q.: Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol.\u00a03557, pp. 359\u2013367. Springer, Heidelberg (2005)"},{"key":"17_CR7","unstructured":"Biham, E., Shamir, A.: The Next Stage of Differential Fault Analysis: How to break completely unknown cryptosystems (1996), available at: http:\/\/jya.com\/dfa.htm"},{"key":"17_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"E. Biham","year":"1997","unstructured":"Biham, E., Shamir, A.: Differential Fault Analysis of Secret Key Cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 513\u2013525. Springer, Heidelberg (1997)"},{"key":"17_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"D. Boneh","year":"1997","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the Importance of Checking Cryptographic Protocols for Faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 37\u201351. Springer, Heidelberg (1997)"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Fournier, J.J.A., Moore, S.W., Li, H., Mullins, R.D., Taylor, G.S.: Security evaluation of asynchronous circuits. In: Walter, et al. (eds.) [27], pp. 137\u2013151","DOI":"10.1007\/978-3-540-45238-6_12"},{"key":"17_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/978-3-540-24638-1_15","volume-title":"Theory of Cryptography","author":"R. Gennaro","year":"2004","unstructured":"Gennaro, R., Lysyanskaya, A., Malkin, T.G., Micali, S., Rabin, T.: Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering. In: Naor, M. (ed.) TCC 2004. LNCS, vol.\u00a02951, pp. 258\u2013277. Springer, Heidelberg (2004)"},{"key":"17_CR12","unstructured":"Havener, W.N., Medlock, R.J., Mitchell, L.D., Walcott, R.J.: Derived Test Requirements for FIPS PUB 140-1, Security Requirements for Cryptographic Modules (1995)"},{"key":"17_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1007\/978-3-540-28632-5_18","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"J.J. Hoch","year":"2004","unstructured":"Hoch, J.J., Shamir, A.: Fault Analysis of Stream Ciphers. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 240\u2013253. Springer, Heidelberg (2004)"},{"key":"17_CR14","series-title":"Lecture Notes in Computer Science","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","year":"2003","unstructured":"Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.): CHES 2002. LNCS, vol.\u00a02523. Springer, Heidelberg (2003)"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Karri, R., Kuznetsov, G., Goessel, M.: Parity-Based Concurrent Error Detection of Substitution-Permutation Network Block Ciphers. In: Walter, et al. (eds.) [27], pp. 113\u2013124","DOI":"10.1007\/978-3-540-45238-6_10"},{"key":"17_CR16","unstructured":"K\u00f6mmerling, O., Kuhn, M.G.: Design Principles for Tamper-Resistant Smartcard Processors. In: Proceedings of the USENIX Workshop on Smartcard Technology (Smartcard 1999), pp. 9\u201320 (1999)"},{"key":"17_CR17","unstructured":"Lemke, K., Paar, C.: An Adversarial Model for Fault Analysis against Low-Cost Cryptographic Devices. In: Workshop on Fault Detection and Tolerance in Cryptography, pp. 82\u201394 (2005)"},{"key":"17_CR18","unstructured":"Leveugle, R.: Early Analysis of Fault Attack Effects for Cryptographic Hardware. In: Workshop on Fault Detection and Tolerance in Cryptography (2004)"},{"key":"17_CR19","unstructured":"Liardet, P.-Y., Teglia, Y.: From Reliability to Safety. In: Workshop on Fault Detection and Tolerance in Cryptography (2004)"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Malkin, T.G., Standaert, F.-X., Yung, M.: A Comparative Cost\/Security Analysis of Fault Attack Countermeasures. In: Workshop on Fault Detection and Tolerance in Cryptography, pp. 109\u2013123 (2005)","DOI":"10.1007\/11889700_15"},{"key":"17_CR21","unstructured":"National\u00a0Institute of\u00a0Standards and Technology (NIST). Physical Reference Data, available at: http:\/\/physics.nist.gov\/PhysRefData\/contents.html"},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"Piret, G., Quisquater, J.-J.: A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD. In: Walter, et al. (eds.) [27], pp. 77\u201388","DOI":"10.1007\/978-3-540-45238-6_7"},{"key":"17_CR23","unstructured":"Samyde, D., Quisquater, J.-J.: Eddy Current for Magnetic Analysis with Active Sensor. In: Proceedings of ESmart 2002, pp. 185\u2013194 (2002)"},{"key":"17_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/3-540-36400-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S.P. Skorobogatov","year":"2003","unstructured":"Skorobogatov, S.P., Anderson, R.J.: Optical fault induction attacks. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 2\u201312. Springer, Heidelberg (2003)"},{"key":"17_CR25","unstructured":"Skorobogatov, S.S.: Semi-invasive attacks \u2014 A new approach to hardware security analysis Technical report (2005), available at: http:\/\/www.cl.cam.ac.uk\/techreports\/ucam-cl-tr-630.pdf"},{"key":"17_CR26","unstructured":"Standaert, F.-X., Batina, L., de Mulder, E., Lemke, K., Oswald, E., Piret, G.: ECRYT D.VAM.4: Electromagnetic Analysis and Fault Attacks: State of the Art. Technical report (2005)"},{"key":"17_CR27","series-title":"Lecture Notes in Computer Science","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","year":"2003","unstructured":"Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.): CHES 2003. LNCS, vol.\u00a02779. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","RoboCup 2005: Robot Soccer World Cup IX"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11767480_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,19]],"date-time":"2019-04-19T19:36:50Z","timestamp":1555702610000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11767480_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540354376","9783540354383"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/11767480_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}