{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T01:14:47Z","timestamp":1767834887703,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540007166","type":"print"},{"value":"9783540365525","type":"electronic"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36552-4_23","type":"book-chapter","created":{"date-parts":[[2007,6,6]],"date-time":"2007-06-06T23:22:37Z","timestamp":1181172157000},"page":"327-342","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":43,"title":["Ways to Enhance Differential Power Analysis"],"prefix":"10.1007","author":[{"given":"R\u00e9gis","family":"Bevan","sequence":"first","affiliation":[]},{"given":"Erik","family":"Knudsen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,3,14]]},"reference":[{"key":"23_CR1","unstructured":"Kocher P., Jaffe J., Jun B., \u201cDifferential power analysis\u201d, Advances in Cryptology-Proceedings of CRYPTO\u201999 327"},{"key":"23_CR2","unstructured":"Chari S., Jutla CS., Rao JR., Rohatgi P.,\u201cTowards sound approaches to counteract power analysis attacks\u201d, Advances in Cryptology-Proceedings of CRYPTO\u201999 327, 328, 340"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Messerges TS., \u201cUsing second-order power analysis to attack DPA resistant software\u201d, Cryptographic Hardware and Embedded Systems-Proceedings of CHES 2000 327","DOI":"10.1007\/3-540-44499-8_19"},{"key":"23_CR4","unstructured":"Messerges TS., Dabbish EA., Sloan RH., \u201cInvestigations of power analysis attacks on smart cards\u201d, Proceedings of the USENIX Workshop on Smart Card Technology 1999"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Messerges TS., Dabbish EA., Sloan RH., \u201cExamining Smart-Card Security under the Threat of Power Analysis Attacks\u201d, IEEE Transactions on computers, Vol. 51, No. 5, May 2002 328, 337","DOI":"10.1109\/TC.2002.1004593"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Coron JS., Kocher P., Naccache D., \u201cStatistics and secret leakage\u201d, Proceedings of Financial Cryptography 2000 328, 336","DOI":"10.1007\/3-540-45472-1_12"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Clavier C., Coron JS., Dabbous N., \u201cDifferential power analysis in the presence of hardware countermeasures\u201d, Cryptographic Hardware and Embedded Systems-Proceedings of CHES 2000 340","DOI":"10.1007\/3-540-44499-8_20"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Goubin L., Patarin J., \u201cDES and differential power analysis, the duplication method\u201d, Cryptographic Hardware and Embedded Systems-Proceedings of CHES 1999 340","DOI":"10.1007\/3-540-48059-5_15"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Messerges TS., \u201cSecuring the AES finalists against power analysis attacks\u201d, Fast Sofware Encryption-Proceedings of FSE 2000 340","DOI":"10.1007\/3-540-44706-7_11"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Coron JS., Goubin L., \u201cOn boolean and arithmetic masking against differential power analysis\u201d, Cryptographic Hardware and Embedded Systems-Proceedings of CHES 2000 340","DOI":"10.1007\/3-540-44499-8_18"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Akkar M, Giraud C, \u201cAn implementation of DES and AES, secure against some attacks\u201d, Cryptographic Hardware and Embedded Systems-Proceedings of CHES 2001 340","DOI":"10.1007\/3-540-44709-1_26"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2014 ICISC 2002"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36552-4_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T13:45:52Z","timestamp":1558273552000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36552-4_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540007166","9783540365525"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/3-540-36552-4_23","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"14 March 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}