{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:36:44Z","timestamp":1725493004248},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540405153"},{"type":"electronic","value":"9783540450672"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-45067-x_10","type":"book-chapter","created":{"date-parts":[[2007,10,25]],"date-time":"2007-10-25T00:29:51Z","timestamp":1193272191000},"page":"106-117","source":"Crossref","is-referenced-by-count":4,"title":["Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces"],"prefix":"10.1007","author":[{"given":"Sung-Ming","family":"Yen","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,18]]},"reference":[{"key":"10_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 97","author":"D. Boneh","year":"1997","unstructured":"D. Boneh, R.A. DeMillo, and R.J. Lipton, \u201cOn the importance of checking cryptographic protocols for faults,\u201d In Advances in Cryptology \u2014 EUROCRYPT\u2019 97, LNCS 1233, pp. 37\u201351, Springer-Verlag, 1997."},{"key":"10_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 97","author":"E. Biham","year":"1997","unstructured":"E. Biham and A. Shamir, \u201cDifferential fault analysis of secret key cryptosystems,\u201d In Advances in Cryptology \u2014 CRYPTO\u2019 97, LNCS 1294, pp. 513\u2013525, Springer-Verlag, Berlin, 1997."},{"issue":"4","key":"10_CR3","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s001459900055","volume":"12","author":"M. Joye","year":"1999","unstructured":"M. Joye, A.K. Lenstra, and J.-J. Quisquater, \u201cChinese remaindering based cryptosystems in the presence of faults,\u201d Journal of Cryptology, vol. 12, no. 4, pp. 241\u2013245, 1999.","journal-title":"Journal of Cryptology"},{"issue":"9","key":"10_CR4","doi-asserted-by":"publisher","first-page":"967","DOI":"10.1109\/12.869328","volume":"49","author":"S.M. Yen","year":"2000","unstructured":"S.M. Yen and M. Joye, \u201cChecking before output may not be enough against fault-based cryptanalysis,\u201d IEEE Trans. on Computers, vol. 49, no. 9, pp. 967\u2013970, Sept. 2000.","journal-title":"IEEE Trans. on Computers"},{"key":"10_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 96","author":"P. Kocher","year":"1996","unstructured":"P. Kocher, \u201cTiming attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems,\u201d In Advances in Cryptology \u2014 CRYPTO\u2019 96, LNCS 1109, pp. 104\u2013113, Springer-Verlag, 1996."},{"key":"10_CR6","unstructured":"J.F. Dhem, F. Koeune, P.A. Leroux, P. Mestre, J.J. Quisquater, and J.L. Willems, \u201cA practical implementation of the timing attack,\u201d In Proceedings of CARDIS\u2019 98 \u2014 Third Smart Card Research and Advanced Application Conference, UCL, Louvainla-Neuve, Belgium, Sep. 14\u201316, 1998."},{"key":"10_CR7","unstructured":"F. Koeune and J.-J. Quisquater, \u201cA timing attack against Rijndael,\u201d Technical Report CG-1999\/1, Universit\u00e9 catholique de Louvain, June 1999."},{"key":"10_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"P. Kocher","year":"1999","unstructured":"P. Kocher, J. Jaffe and B. Jun, \u201cDifferential power analysis,\u201d In Advances in Cryptology \u2014 CRYPTO\u2019 99, LNCS 1666, pp. 388\u2013397, Springer-Verlag, 1999."},{"key":"10_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1007\/3-540-48059-5_14","volume-title":"Cryptographic Hardware and Embedded Systems \u2014 CHES\u2019 99","author":"T.S. Messerges","year":"1999","unstructured":"T.S. Messerges, E.A. Dabbish, and R.H. Sloan, \u201cPower analysis attacks of modular exponentiation in smartcards,\u201d In Cryptographic Hardware and Embedded Systems \u2014 CHES\u2019 99, LNCS 1717, pp. 144\u2013157, Springer-Verlag, 1999."},{"key":"10_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/3-540-44499-8_20","volume-title":"Cryptographic Hardware and Embedded Systems \u2014 CHES 2000","author":"C. Clavier","year":"2000","unstructured":"C. Clavier, J.-S. Coron, and N. Dabbous, \u201cDifferential power analysis in the presence of hardware countermeasures,\u201d In Cryptographic Hardware and Embedded Systems \u2014 CHES 2000, LNCS 1965, pp. 252\u2013263, Springer-Verlag, 2000."},{"key":"10_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/3-540-44706-7_11","volume-title":"Proceedings of Fast Software Encryption Workshop \u2014 FSE 2000","author":"T.S. Messerges","year":"2001","unstructured":"T.S. Messerges, \u201cSecuring the AES finalists against power analysis attacks,\u201d In Proceedings of Fast Software Encryption Workshop \u2014 FSE 2000, LNCS 1978, pp. 150\u2013164, Springer-Verlag, 2001."},{"key":"10_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/3-540-44499-8_19","volume-title":"Cryptographic Hardware and Embedded Systems \u2014 CHES 2000","author":"T.S. Messerges","year":"2000","unstructured":"T.S. Messerges, \u201cUsing second-order power analysis to attack DPA resistant software,\u201d In Cryptographic Hardware and Embedded Systems \u2014 CHES 2000, LNCS 1965, pp. 238\u2013251, Springer-Verlag, 2000."},{"key":"10_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/3-540-44709-1_26","volume-title":"Cryptographic Hardware and Embedded Systems \u2014 CHES 2001","author":"M. Akkar","year":"2001","unstructured":"M. Akkar and C. Giraud, \u201cAn implementation of DES and AES, secure against some attacks,\u201d In Cryptographic Hardware and Embedded Systems \u2014 CHES 2001, LNCS 2162, pp. 309\u2013318, Springer-Verlag, 2001."},{"key":"10_CR14","unstructured":"J. Daemen and V. Rijmen, \u201cAES Proposal: Rijndael,\u201d AES submission, 1998, available at \n                    http:\/\/www.csrc.nist.gov\/encryption\/aes\/aes home.htm"},{"key":"10_CR15","unstructured":"F. Sano, M. Koike, S. Kawamura, and M. Shiba, \u201cPerformance evaluation of AES finalists on the high-end smart card,\u201d In Proceedings of the Third Advanced Encryption Standard (AES) Candidate Conference, pp. 82\u201393, April 13\u201314, 2000."},{"key":"10_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/3-540-44499-8_6","volume-title":"Cryptographic Hardware and Embedded Systems \u2014 CHES 2000","author":"R.M. Sommer","year":"2000","unstructured":"R.M. Sommer, \u201cSmartly analyzing the simplicity and the power of SPA on smartcards,\u201d In Cryptographic Hardware and Embedded Systems \u2014 CHES 2000, LNCS 1965, pp. 78\u201392, Springer-Verlag, 2000."},{"key":"10_CR17","unstructured":"J. Bl\u00f6mer and J.P. Seifert, \u201cFault based cryptanalysis of the Advanced Encryption Standard (AES),\u201d Cryptology ePrint Archive of IACR, No. 075, 2002, available at \n                    http:\/\/www.eprint.iacr.org\/2002\/075"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45067-X_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,24]],"date-time":"2019-02-24T14:06:59Z","timestamp":1551017219000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45067-X_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540405153","9783540450672"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-45067-x_10","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}