{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T13:49:03Z","timestamp":1766065743506},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540414551"},{"type":"electronic","value":"9783540444992"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-44499-8_20","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T14:14:13Z","timestamp":1188310453000},"page":"252-263","source":"Crossref","is-referenced-by-count":222,"title":["Differential Power Analysis in the Presence of Hardware Countermeasures"],"prefix":"10.1007","author":[{"given":"Christophe","family":"Clavier","sequence":"first","affiliation":[]},{"given":"Jean-S\u00e9bastien","family":"Coron","sequence":"additional","affiliation":[]},{"given":"Nora","family":"Dabbous","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,1,29]]},"reference":[{"key":"20_CR1","unstructured":"R. Anderson, M. Kuhn, Tamper resistance-a cautionary note, The second usenix workshop on electronic commerce, pp. 1\u201311, 1996."},{"key":"20_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1007\/3-540-48405-1_26","volume-title":"Crypto\u201999","author":"S. Chari","year":"1999","unstructured":"S. Chari, C. S. Jutla, J. R. Rao, P. Rohatgi, Towards Sound Approaches to Counteract Power-Analysis Attacks, Springer-Verlag, LNCS 1666, pp. 398\u2013411, Crypto\u201999, 1999."},{"key":"20_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1007\/3-540-48059-5_25","volume-title":"CHES\u201999","author":"J.-S. Coron","year":"1999","unstructured":"J.-S Coron, Resistance against Differential Power Analysis for Elliptic Curve Crytosystems, Springer-Verlag, LNCS 1717, pp. 292\u2013302, CHES\u201999, 1999."},{"key":"20_CR4","series-title":"Lect Notes Comput Sci","volume-title":"Statistics and Secret Leakage, FC\u201900","author":"J.-S. Coron","year":"2000","unstructured":"J.-S. Coron, P. Kocher, D. Naccache, Statistics and Secret Leakage, FC\u201900, to appear in the LNCS series, 2000."},{"key":"20_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/3-540-48059-5_16","volume-title":"CHES\u201999","author":"P. N. Fahn","year":"1999","unstructured":"P. N. Fahn, P. K. Pearson, IPA: A New Class of Power Attacks, Springer-Verlag, LNCS 1717, pp. 173\u2013186, CHES\u201999, 1999."},{"key":"20_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1007\/3-540-48059-5_15","volume-title":"CHES\u201999","author":"L. Goubin","year":"1999","unstructured":"L. Goubin, J. Patarin, DES and Differential Power Analysis, Springer-Verlag, LNCS 1717, pp. 158\u2013172, CHES\u201999, 1999."},{"key":"20_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Crypto\u201999","author":"P. Kocher","year":"1999","unstructured":"P. Kocher Differential Power Analysis, Springer-Verlag, LNCS 1666, pp. 388\u2013397, Crypto\u201999, 1999."},{"key":"20_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Crypto\u201996","author":"P. Kocher","year":"1996","unstructured":"P. Kocher Timing Attacks on Implementation of Diffe-Hellman, RSA, DSS, and Other Systems, Springer-Verlag, LNCS 1109, pp. 104\u2013113, Crypto\u201996, 1996."},{"key":"20_CR9","unstructured":"R. G. Lyons, Understanding Digital Signal Processing, Addison Wesley Longman, pp. 327\u2013330, 1997."}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems \u2014 CHES 2000"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44499-8_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,23]],"date-time":"2019-02-23T03:59:05Z","timestamp":1550894345000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44499-8_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540414551","9783540444992"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/3-540-44499-8_20","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}