{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:19:32Z","timestamp":1761707972625},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540465591"},{"type":"electronic","value":"9783540465614"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11894063_6","type":"book-chapter","created":{"date-parts":[[2006,10,16]],"date-time":"2006-10-16T17:49:01Z","timestamp":1161020941000},"page":"61-75","source":"Crossref","is-referenced-by-count":33,"title":["Optically Enhanced Position-Locked Power Analysis"],"prefix":"10.1007","author":[{"given":"Sergei","family":"Skorobogatov","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P. Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"6_CR2","unstructured":"Messerges, T., Dabbish, E., Sloan, R.: Investigations of Power Analysis Attacks on Smartcards. In: USENIX Workshop on Smartcard Technology, Chicago, Illinois, USA, May 10\u201311 (1999)"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/3-540-48059-5_25","volume-title":"Cryptographic Hardware and Embedded Systems","author":"J.-S. Coron","year":"1999","unstructured":"Coron, J.-S.: Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol.\u00a01717, pp. 292\u2013302. Springer, Heidelberg (1999)"},{"issue":"9","key":"6_CR4","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1016\/S0141-9331(03)00092-9","volume":"27","author":"S. Moore","year":"2003","unstructured":"Moore, S., Anderson, R., Mullins, R., Taylor, G., Fournier, J.: Balanced Self-Checking Asynchronous Logic for Smart Card Applications. Microprocessors and Microsystems Journal\u00a027(9), 421\u2013430 (2003)","journal-title":"Microprocessors and Microsystems Journal"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/11545262_13","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"T. Popp","year":"2005","unstructured":"Popp, T., Mangard, S.: Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol.\u00a03659, pp. 172\u2013186. Springer, Heidelberg (2005)"},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/3-540-45418-7_17","volume-title":"Smart Card Programming and Security","author":"J.-J. Quisquater","year":"2001","unstructured":"Quisquater, J.-J., Samyde, D.: ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smard Cards. In: Attali, S., Jensen, T. (eds.) E-smart 2001. LNCS, vol.\u00a02140, pp. 200\u2013210. Springer, Heidelberg (2001)"},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/3-540-36400-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S. Skorobogatov","year":"2003","unstructured":"Skorobogatov, S., Anderson, R.: Optical Fault Induction Attacks. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 2\u201312. Springer, Heidelberg (2003)"},{"issue":"6","key":"6_CR8","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/TNS.1965.4323904","volume":"12","author":"D.H. Habing","year":"1965","unstructured":"Habing, D.H.: Use of Laser to Simulate Radiation-induced Transients in Semiconductors and Circuits. IEEE Transactions on Nuclear Science\u00a012(6), 91\u2013100 (1965)","journal-title":"IEEE Transactions on Nuclear Science"},{"issue":"14","key":"6_CR9","first-page":"37","volume":"43","author":"C. Ajluni","year":"1995","unstructured":"Ajluni, C.: Two New Imaging Techniques Promise to Improve IC Defect Identification. Electronic Design\u00a043(14), 37\u201338 (1995)","journal-title":"Electronic Design"},{"issue":"6","key":"6_CR10","doi-asserted-by":"publisher","first-page":"3109","DOI":"10.1116\/1.585938","volume":"10","author":"H.K. Heinrich","year":"1992","unstructured":"Heinrich, H.K., Pakdaman, N., Prince, J.L., Jordy, G., Belaidi, M., Franch, R., Edelstein, D.C.: Optical Detection of Multibit Logic Signals at Internal Nodes in a Flip-chip Mounted Silicon Static Random-Access Memory Integrated Circuit. Journal of Vacuum Science and Technology, Microelectronics and Nanometer Structures\u00a010(6), 3109\u20133111 (1992)","journal-title":"Journal of Vacuum Science and Technology, Microelectronics and Nanometer Structures"},{"key":"6_CR11","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-4919-2","volume-title":"Failure Analysis of Integrated Circuits: Tools and Techniques","author":"L.C. Wagner","year":"1999","unstructured":"Wagner, L.C.: Failure Analysis of Integrated Circuits: Tools and Techniques. Kluwer Academic Publishers, Dordrecht (1999)"},{"key":"6_CR12","unstructured":"Aigner, M., Oswald, E.: Power Analysis Tutorial, \n                    \n                      http:\/\/www.iaik.tugraz.at\/aboutus\/people\/oswald\/papers\/dpa_tutorial.pdf"},{"key":"6_CR13","unstructured":"K\u00f6mmerling, O., Kuhn, M.G.: Design Principles for Tamper-Resistant Smartcard Processors. In: USENIX Workshop on Smartcard Technology, Chicago, Illinois, USA, May 10\u201311 (1999)"},{"key":"6_CR14","unstructured":"Samyde, D., Skorobogatov, S., Anderson, R., Quisquater, J.-J.: On a New Way to Read Data from Memory. In: SISW 2002 First International IEEE Security in Storage Workshop, Greenbelt Marriott, Maryland, USA (December 11, 2002)"},{"issue":"2","key":"6_CR15","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1023\/A:1022656102956","volume":"32","author":"V.V. Belyakov","year":"2003","unstructured":"Belyakov, V.V., Chumakov, A.I., Nikiforov, A.Y., Pershenkov, V.S., Skorobogatov, P.K., Sogoyan, A.V.: Prediction of Local and Global Ionization Effects on ICs: The Synergy between Numerical and Physical Simulation. Russian Microelectronics\u00a032(2), 105\u2013118 (2003)","journal-title":"Russian Microelectronics"},{"key":"6_CR16","unstructured":"Microchip PIC16F8X 18-pin Flash\/EEPROM 8-Bit Microcontrollers, \n                    \n                      http:\/\/ww1.microchip.com\/downloads\/en\/DeviceDoc\/30430c.pdf"},{"key":"6_CR17","unstructured":"Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: Workshop on Fault Detection and Tolerance in Cryptography, Florence, Italy (June 30, 2004)"},{"key":"6_CR18","unstructured":"Semiconductors Research Ltd: Special equipment for semi-invasive hardware security analysis of semiconductors, \n                    \n                      http:\/\/www.semiresearch.com\/inc\/equipment_for_sale.html"},{"key":"6_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/3-540-44499-8_6","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2000","author":"R. Mayer-Sommer","year":"2000","unstructured":"Mayer-Sommer, R.: Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smart Cards. In: Paar, C., Ko\u00e7, \u00c7.K. (eds.) CHES 2000. LNCS, vol.\u00a01965, pp. 78\u201392. Springer, Heidelberg (2000)"},{"key":"6_CR20","unstructured":"Skorobogatov, S.: Semi-invasive attacks \u2013 A new approach to hardware security analysis. Technical Report UCAM-CL-TR-630, University of Cambridge, Computer Laboratory (April 2005)"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2006"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11894063_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T14:00:27Z","timestamp":1558274427000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11894063_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540465591","9783540465614"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/11894063_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}