{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T12:13:02Z","timestamp":1775477582357,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540425212","type":"print"},{"value":"9783540447092","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-44709-1_21","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T10:04:18Z","timestamp":1186826658000},"page":"251-261","source":"Crossref","is-referenced-by-count":656,"title":["Electromagnetic Analysis: Concrete Results"],"prefix":"10.1007","author":[{"given":"Karine","family":"Gandolfi","sequence":"first","affiliation":[]},{"given":"Christophe","family":"Mourtel","sequence":"additional","affiliation":[]},{"given":"Francis","family":"Olivier","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,9,20]]},"reference":[{"key":"21_CR1","unstructured":"sepi\u201988, Primo simposio nazionale su sicurezza elettromagnetica nella protezione dell\u2019informazione, Rome (Italy), 1988."},{"key":"21_CR2","unstructured":"sepi\u2019 91, Symposium on electromagnetic security for information protection, Rome (Italy), 1991."},{"key":"21_CR3","unstructured":"R. Anderson, M. Kuhn, Tamper Resistance-a Cautionary Note, Proc. of the Second usenix Workshop on Electronic Commerce, usenix Association, 1996."},{"key":"21_CR4","series-title":"Lect Notes Comput Sci","volume-title":"Financial Cryptography","author":"J.-S. Coron","year":"2000","unstructured":"J-S. Coron, P. Kocher, and D. Naccache, Statistics and Secret Leakage, Financial Cryptography 2000 (fc\u201900), Lecture Notes in Computer Science, Springer-Verlag, To appear."},{"issue":"6","key":"21_CR5","doi-asserted-by":"publisher","first-page":"911","DOI":"10.1109\/22.506451","volume":"44","author":"Y. Gao","year":"1996","unstructured":"Y. Gao and I. Wolff, A new miniature magnetic field probe for measuring three-dimensional fields in planar high frequency circuits, IEEE Trans. on Microwave Theory and Techniques, vol. 44 no. 6, pp. 911\u2013918, 1996.","journal-title":"IEEE Trans. on Microwave Theory and Techniques"},{"key":"21_CR6","series-title":"Lect Notes Comput Sci","first-page":"380","volume-title":"Smart Card Research and Applications (cardis\u201998)","author":"H. Handschuh","year":"2000","unstructured":"H. Handschuh and P. Paillier, Reducing the collision probability of alleged COMP128, In J.-J. Quisquater and B. Schneier, editors, Smart Card Research and Applications (cardis\u201998), vol. 1820 of Lecture Notes in Computer Science, pp. 380\u2013385, Springer-Verlag, 2000."},{"key":"21_CR7","unstructured":"T. Harada, H. Sasaki and Y. Kami, Investigation on radiated emission characteristics of multilayer printed circuits boards, IEICE Trans. Commun, E80-B, no. 11, pp. 1645\u20131651, 1997."},{"key":"21_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology-crypto\u201999","author":"P. Kocher","year":"1999","unstructured":"P. Kocher, J. Jaffe and B. Jun, Differential power analysis, In M. Wiener, editor, Advances in Cryptology-crypto\u201999, vol. 1666 of Lecture Notes in Computer Science, pp. 388\u2013397, Springer-Verlag, 1999. Also available at: \n                    http:\/\/www.cryptography.com\/dpa\/Dpa.pdf\n                    \n                  ."},{"key":"21_CR9","unstructured":"O. K\u00f6mmerling and M. Kuhn, Design principles for tamper-resistant smartcard processors, In Proc. of the usenix Workshop on Smartcard Technology (Smartcard\u201999), pp. 9\u201320. usenix Association, 1999."},{"key":"21_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1007\/3-540-49380-8_10","volume-title":"Information Hiding","author":"M. Kuhn","year":"1998","unstructured":"M. Kuhn and R. Anderson, Soft tempest: Hidden data transmission using electromagnetic emanations, In D. Aucsmith, editor, Information Hiding, vol. 1525 of Lecture Notes in Computer Science, pp. 124\u2013142. Springer-Verlag, 1998."},{"key":"21_CR11","unstructured":"T. Messerges and E. Dabbish, Investigations of power analysis attacks on smartcards, In Proc. of the usenix Workshop on Smartcard Technology (Smartcard\u201999). usenix Association, 1999."},{"key":"21_CR12","unstructured":"J-J. Quisquater and D. Samyde, A new tool for non-intrusive analysis of smart cards based on electro-magnetic emissions, the sema and dema methods, Presented at the rump session of eurocrypt\u20192000."}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems \u2014 CHES 2001"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44709-1_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,21]],"date-time":"2019-02-21T12:47:13Z","timestamp":1550753233000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44709-1_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540425212","9783540447092"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-44709-1_21","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2001]]}}}