{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T15:48:43Z","timestamp":1778082523956,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540004097","type":"print"},{"value":"9783540364009","type":"electronic"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36400-5_3","type":"book-chapter","created":{"date-parts":[[2007,9,2]],"date-time":"2007-09-02T23:59:37Z","timestamp":1188777577000},"page":"13-28","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":812,"title":["Template Attacks"],"prefix":"10.1007","author":[{"given":"Suresh","family":"Chari","sequence":"first","affiliation":[]},{"given":"Josyula R.","family":"Rao","sequence":"additional","affiliation":[]},{"given":"Pankaj","family":"Rohatgi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"key":"3_CR1","series-title":"Lect Notes Comput Sci","first-page":"125","volume-title":"Low Cost Attacks on Tamper Resistant Devices","author":"R. Anderson","year":"1997","unstructured":"Ross Anderson and Markus Kuhn. Low Cost Attacks on Tamper Resistant Devices. In Proc. Security Protocols, 5th International Workshop, Paris, France, Springer-Verlag LNCS Volume 1361, pp 125\u2013136, April 1997."},{"issue":"2","key":"3_CR2","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s001450010016","volume":"14","author":"D. Boneh","year":"2001","unstructured":"Dan Boneh, Richard DeMillo and Richard Lipton. On the Importance of Checking Cryptographic Protocols for Faults. Journal of Cryptology, Springer-Verlag, Volume 14, Number 2, pp 101\u2013119, 2001.","journal-title":"Journal of Cryptology"},{"key":"3_CR3","series-title":"Lect Notes Comput Sci","first-page":"398","volume-title":"Towards Sound Countermeasures to Counteract Power-Analysis Attacks","author":"S. Chari","year":"1998","unstructured":"Suresh Chari, Charanjit S. Jutla, Josyula R. Rao and Pankaj Rohatgi. Towards Sound Countermeasures to Counteract Power-Analysis Attacks. Proc. Crypto\u2019 99, Springer-Verlag, LNCS 1666, August 1999, pages 398\u2013412."},{"key":"3_CR4","unstructured":"Suresh Chari, Charanjit S. Jutla, Josyula R. Rao and Pankaj Rohatgi. A Cautionary Note Regarding the Evaluation of AES Candidates on Smart Cards. Proc. Second AES Candidate Conference, Rome, Italy, March 1999."},{"key":"3_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1007\/3-540-44499-8_20","volume-title":"Differential Power Analysis in the Presence of Hardware Countermeasures","author":"C. Clavier","year":"2000","unstructured":"Christopher Clavier, Jean-Sebastien Coron, and Nora Dabbous. Differential Power Analysis in the Presence of Hardware Countermeasures. In Proc. Workshop on Cryptographic Hardware and Embedded Systems, Aug. 2000, LNCS 1965, Springer-Verlag, pp 252\u2013263."},{"key":"3_CR6","series-title":"Lect Notes Comput Sci","first-page":"292","volume-title":"Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems","author":"J.-S. Coron","year":"1997","unstructured":"Jean-Sebastien Coron. Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems. In Proc. Workshop on Cryptographic Hardware and Embedded Systems, Aug. 1999, LNCS 1717, Springer-Verlag. pp 292\u2013302."},{"key":"3_CR7","series-title":"Lect Notes Comput Sci","first-page":"231","volume-title":"On Boolean and Arithmetic Masking against Differential Power Analysis","author":"J.-S. Coron","year":"1996","unstructured":"Jean-Sebastien Coron, and Louis Goubin. On Boolean and Arithmetic Masking against Differential Power Analysis. In Proc. Workshop on Cryptographic Hardware and Embedded Systems, Aug. 2000, LNCS 1965, Springer-Verlag. pp 231\u2013237."},{"key":"3_CR8","series-title":"Lect Notes Comput Sci","first-page":"173","volume-title":"IPA: A New Class of Power Attacks","author":"P.N. Fahn","year":"1996","unstructured":"P.N. Fahn and P.K. Pearson. IPA: A New Class of Power Attacks. In Proc.Workshop on Cryptographic Hardware and Embedded Systems, Aug. 1999, LNCS 1717, Springer-Verlag. pp 173\u2013186."},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"K. Gandolfi, C. Mourtel and F. Olivier. Electromagnetic Attacks: Concrete Results. In Proc. Workshop on Cryptographic Hardware and Embedded Systems, Paris, France, May 2001.","DOI":"10.1007\/3-540-44709-1_21"},{"key":"3_CR10","series-title":"Lect Notes Comput Sci","first-page":"158","volume-title":"DES and Differential Power Analysis","author":"L. Goubin","year":"2000","unstructured":"L. Goubin and J. Patarin. DES and Differential Power Analysis. In Proc. Workshop on Cryptographic Hardware and Embedded Systems, Aug. 1999, LNCS 1717, Springer-Verlag. pp 158\u2013172."},{"key":"3_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1007\/BFb0020710","volume-title":"Power Analysis Attacks and Algorithmic Approaches to Their Countermeasures for the Koblitz Curve Cryptosystems","author":"M.A. Hasan","year":"1996","unstructured":"M.A. Hasan. Power Analysis Attacks and Algorithmic Approaches to Their Countermeasures for the Koblitz Curve Cryptosystems. In Proc. Workshop on Cryptographic Hardware and Embedded Systems, Aug. 2000, LNCS 1965, Springer-Verlag. pp 93\u2013108."},{"key":"3_CR12","series-title":"Lect Notes Comput Sci","first-page":"388","volume-title":"Differential Power Analysis: Leaking Secrets","author":"P. Kocher","year":"1998","unstructured":"P. Kocher, J. Jaffe and B. Jun. Differential Power Analysis: Leaking Secrets. In Proc. Crypto\u2019 99, Springer-Verlag, LNCS 1666, pages 388\u2013397."},{"key":"3_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS and Other Systems","author":"P. Kocher","year":"1996","unstructured":"P. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS and Other Systems. In Proc. Crypto\u2019 96, LNCS 1109, Springer-Verlag, pp 104\u2013113."},{"issue":"2\u20133","key":"3_CR14","doi-asserted-by":"crossref","first-page":"141","DOI":"10.3233\/JCS-2000-82-304","volume":"8","author":"J. Kelsey","year":"2000","unstructured":"J. Kelsey, Bruce Schneier, D. Wagner and C. Hall. Side Channel Cryptanalysis of Product Ciphers. Journal of Computer Security, Volume 8, Number 2\u20133, 2000, pages 141\u2013158.","journal-title":"Journal of Computer Security"},{"key":"3_CR15","series-title":"Lect Notes Comput Sci","first-page":"78","volume-title":"Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smart Cards","author":"R. Mayer-Sommer","year":"1997","unstructured":"Rita Mayer-Sommer. Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smart Cards. In Proc. Workshop on Cryptographic Hardware and Embedded Systems, Worcester, MA, USA, Aug. 2000, LNCS 1965, Springer-Verlag. pp 78\u201392."},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Thomas S. Messerges. Securing the AES Finalists Against Power Analysis Attacks. In Proc. Fast Software Encryption Workshop 2000, New York, NY, USA, April 2000, Springer-Verlag.","DOI":"10.1007\/3-540-44706-7_11"},{"key":"3_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1007\/3-540-44499-8_19","volume-title":"Using Second-Order Power Analysis to Attack DPA Resistant Software","author":"T. S. Messerges","year":"2000","unstructured":"Thomas S. Messerges. Using Second-Order Power Analysis to Attack DPA Resistant Software. In Proc. Workshop on Cryptographic Hardware and Embedded Systems, Aug. 2000, LNCS 1965, Springer-Verlag. pp 238\u2013251."},{"key":"3_CR18","series-title":"Lect Notes Comput Sci","first-page":"144","volume-title":"Power Analysis Attacks of Modular Exponentiation in Smart Cards","author":"T.S. Messerges","year":"1996","unstructured":"T.S. Messerges, E.A. Dabbish, and R.H. Sloan. Power Analysis Attacks of Modular Exponentiation in Smart Cards. In Proc. Workshop on Cryptographic Hardware and Embedded Systems 1999, Aug. 1999, LNCS 1717, Springer-Verlag. pp 144\u2013157."},{"key":"3_CR19","unstructured":"Jean-Jacques Quisquater and David Samyde. Simple Electromagnetic analysis for Smart Cards: New Results. Rump session talk at Cyrpto 2000."},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Dakshi Agrawal, Bruce Archambeault, Josyula Rao, Pankaj Rohatgi. The EM Side-Channel(s). In Proc. Workshop on Cryptographic Hardware and Embedded Systems 2002, Aug. 2002","DOI":"10.1007\/3-540-36400-5_4"},{"key":"3_CR21","series-title":"Lect Notes Comput Sci","first-page":"71","volume-title":"Protecting Smart Cards from Power Analysis with Detached Power Supplies","author":"A. Shamir","year":"1997","unstructured":"Adi Shamir. Protecting Smart Cards from Power Analysis with Detached Power Supplies. In Proc. Workshop on Cryptographic Hardware and Embedded Systems, Aug. 2000, LNCS 1965, Springer-Verlag. pp 71\u201377."},{"key":"3_CR22","volume-title":"Detection, Estimation, and Modulation Theory, Part I","author":"H. L. Trees Van","year":"1968","unstructured":"H. L. Van Trees. Detection, Estimation, and Modulation Theory, Part I. John Wiley & Sons. New York. 1968."}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2002"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36400-5_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T01:25:39Z","timestamp":1558488339000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36400-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540004097","9783540364009"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/3-540-36400-5_3","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"17 February 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}