{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T09:54:45Z","timestamp":1743069285591,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540494966"},{"type":"electronic","value":"9783540494973"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11935308_18","type":"book-chapter","created":{"date-parts":[[2006,11,15]],"date-time":"2006-11-15T06:26:42Z","timestamp":1163572002000},"page":"249-259","source":"Crossref","is-referenced-by-count":3,"title":["A Wireless Covert Channel on Smart Cards (Short Paper)"],"prefix":"10.1007","author":[{"given":"Geir Olav","family":"Dyrkolbotn","sequence":"first","affiliation":[]},{"given":"Einar","family":"Snekkenes","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","volume-title":"Physics for Scientists and Engineers","author":"D.C. Giancoli","year":"1989","unstructured":"Giancoli, D.C.: Physics for Scientists and Engineers. Prentice-Hall, Englewood Cliffs (1989)"},{"key":"18_CR2","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1016\/0167-4048(85)90046-X","volume":"4","author":"W. Eck van","year":"1985","unstructured":"van Eck, W.: Electromagnetic radiation from video display units: An eavesdropping risk. Computers & Security\u00a04, 269\u2013286 (1985)","journal-title":"Computers & Security"},{"key":"18_CR3","unstructured":"Anderson, R., Kuhn, M.: Tamper resistance-a cautionary note. In: USENIX E-Commerce Workshop, pp. 1\u201311. USENIX Press (1996) ISBN 1-880446-83-9"},{"key":"18_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"P. Kocher","year":"1996","unstructured":"Kocher, P.: Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 104\u2013113. Springer, Heidelberg (1996)"},{"key":"18_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P. Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"18_CR6","unstructured":"Quisquater, J.-J., Samyde, D.: A new tool for non-intrusive analysis of smart cards based on electromagnetic emissions:the sema and dema methods. In: Eurocrypt rump session (2000)"},{"key":"18_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/3-540-45418-7_17","volume-title":"Smart Card Programming and Security","author":"J.-J. Quisquater","year":"2001","unstructured":"Quisquater, J.-J., Samyde, D.: Electromagnetic analysis (ema): Measures and counter-measures for smart cards. In: Attali, S., Jensen, T. (eds.) E-smart 2001. LNCS, vol.\u00a02140, pp. 200\u2013210. Springer, Heidelberg (2001)"},{"key":"18_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-36400-5_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S. Chari","year":"2003","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attack. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 13\u201328. Springer, Heidelberg (2003)"},{"key":"18_CR9","series-title":"Lecture Notes in Computer Science","volume-title":"CHES 2003","author":"D. Agrawal","year":"2003","unstructured":"Agrawal, D., Archambeault, B., Rao, J.R., Rohatgi, P.: The em side-channel(s):attacks and assessment methodologies. In: CHES 2003. LNCS. Springer, Heidelberg (2003)"},{"key":"18_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/3-540-36400-5_4","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"D. Agrawal","year":"2003","unstructured":"Agrawal, D., Archambeault, B., Rao, J.R., Rohatgi, P.: The em side-channel(s). In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 29\u201345. Springer, Heidelberg (2003)"},{"issue":"1","key":"18_CR11","first-page":"20","volume":"6","author":"D. Agrawal","year":"2003","unstructured":"Agrawal, D., Archambeault, B., Chari, S., Rao, J.R., Rohatgi, P.: Advances in side-channel cryptanalysis, electromagnetic analysis and template attacks. CryptoBytes\u00a06(1), 20\u201332 (2003)","journal-title":"CryptoBytes"},{"key":"18_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/978-3-540-45238-6_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"D. Agrawal","year":"2003","unstructured":"Agrawal, D., Rao, J.R., Rohatgi, P.: Multi-channel attack. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 2\u201316. Springer, Heidelberg (2003)"},{"key":"18_CR13","unstructured":"Rao, J.R., Rohatgi, P.: Empowering side-channel attacks. IACR ePrint, vol.\u00a0037 (2001)"},{"key":"18_CR14","unstructured":"Quisquater, J.-J., Samyde, D.: Automatic code recognition for smart cards using a kohonen neural network. In: 5th Smart Card Research and Advanced Application Conference, USENIX (2002)"},{"key":"18_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1007\/3-540-49380-8_6","volume-title":"Information Hiding","author":"R. Anderson","year":"1998","unstructured":"Anderson, R., Kuhn, M.: Soft tempest: Hidden data transmission using electromagnetic emanations. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 124\u2013142. Springer, Heidelberg (1998)"},{"key":"18_CR16","unstructured":"Myers, P.A.: Subversion: The neglected aspect of computer security. Master\u2019s thesis, Naval Postgraduate School (1980)"},{"key":"18_CR17","volume-title":"Digital Communication Systems","author":"P.Z. Peebles Jr.","year":"1987","unstructured":"Peebles Jr., P.Z.: Digital Communication Systems. Prentice Hall, Englewood Cliffs (1987)"},{"key":"18_CR18","volume-title":"Digital and Analog Communication Systems","author":"L.W. Couch II","year":"1993","unstructured":"Couch II, L.W.: Digital and Analog Communication Systems. Macmillan, Basingstoke (1993)"},{"key":"18_CR19","unstructured":"Shannon, C.E., Weaver, W.: The Mathematical Theory of Communication. University of Illinois Press, US (1998)"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11935308_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T20:08:41Z","timestamp":1566763721000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11935308_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540494966","9783540494973"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/11935308_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}