{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T13:48:00Z","timestamp":1742392080722},"publisher-location":"Berlin, Heidelberg","reference-count":4,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540414551"},{"type":"electronic","value":"9783540444992"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-44499-8_5","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T14:14:13Z","timestamp":1188310453000},"page":"71-77","source":"Crossref","is-referenced-by-count":60,"title":["Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies"],"prefix":"10.1007","author":[{"given":"Adi","family":"Shamir","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,1,29]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"D. Boneh, R. A. Demillo and R. J. Lipton, On the Importance of Checking Cryptographic Protocols for Faults, Proceedings of Eurocrypt 97, Springer-Verlag, 1997, pp 37\u201351.","DOI":"10.1007\/3-540-69053-0_4"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"P. Kocher, Timing Attacks on Implementations of Difie-Hellman, RSA, DSS, and Other Systems, Proceedings of Crypto 96, Springer-Verlag, 1996, pp 104\u2013113.","DOI":"10.1007\/3-540-68697-5_9"},{"key":"5_CR3","unstructured":"O. Kommerling and M. Kuhn, Design Principles for Tamper Resistant Smartcard Processors, Proceedings of USENIX Workshop on Smartcard Technology, USENIX Association, pp. 9\u201320, 1999. http:\/\/www.cl.cam.ac.uk\/~mgk25\/sc99-tamper[-slides].pdf ."},{"key":"5_CR4","unstructured":"P. Kocher, J. Jaffe, and B. Jun, Introduction to Differential Power Analysis and Related Attacks, http:\/\/www.cryptography.com\/dpa\/technical\/index.html , 1998."}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems \u2014 CHES 2000"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44499-8_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T17:07:11Z","timestamp":1556816831000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44499-8_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540414551","9783540444992"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/3-540-44499-8_5","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}