{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:33:04Z","timestamp":1775838784417,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540426103","type":"print"},{"value":"9783540454182","type":"electronic"}],"license":[{"start":{"date-parts":[[2001,1,1]],"date-time":"2001-01-01T00:00:00Z","timestamp":978307200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45418-7_17","type":"book-chapter","created":{"date-parts":[[2007,6,3]],"date-time":"2007-06-03T17:08:09Z","timestamp":1180890489000},"page":"200-210","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":564,"title":["ElectroMagnetic Analysis (EMA): Measures and Counter-measures for Smart Cards"],"prefix":"10.1007","author":[{"given":"Jean-Jacques","family":"Quisquater","sequence":"first","affiliation":[]},{"given":"David","family":"Samyde","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,9,11]]},"reference":[{"key":"17_CR1","unstructured":"R. Anderson and M. Kuhn, Tamper resistance-A cautionary note, Proc. of the Second USENIX Workshop on Electronic Commerce, 1996, pp 1\u201311."},{"key":"17_CR2","series-title":"Lect Notes Comput Sci","first-page":"173","volume-title":"Proc. of CHES\u201999","author":"P.N. Fahm","year":"1999","unstructured":"P.N. Fahm and P.K. Pearson, IPA: A new class of power attacks, Proc. of CHES\u201999 (C.K. Koc and Chr. Paar, eds), Lecture Notes in Computer Science, vol. 1717, Springer-Verlag, 1999, pp. 173\u2013186."},{"key":"17_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology-CRYPTO\u201999","author":"P. Kocher","year":"1999","unstructured":"P. Kocher, J. Jaffe and B. Jun, Differential power analysis, Advances in Cryptology-CRYPTO\u201999 (M.J. Wiener, ed.), Lecture Notes in Computer Science, vol. 1666, Springer-Verlag, 1999, pp. 388\u2013397."},{"key":"17_CR4","unstructured":"Power analysis of the key scheduling of the AES candidates, The Second AES Conference, March 22\u201323, 1999, pp. 115\u2013121."},{"key":"17_CR5","unstructured":"T.S. Messerges, E.A. Dabbish, R. Sloan, Investigations of Power Analysis Attacks on Smartcards."},{"key":"17_CR6","series-title":"Lect Notes Comput Sci","first-page":"125","volume-title":"Proc. of International Workshop on Security Protocols","author":"R. Anderson","year":"1997","unstructured":"Low cost attacks on tamper resistant devices, Proc. of International Workshop on Security Protocols 1997 (Paris, France) (M. Lomas et. al, ed.), Lecture Notes in Computer Science, vol. 1361, Springer-Verlag, 1997, pp. 125\u2013136"},{"key":"17_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1007\/3-540-48405-1_26","volume-title":"Proc. Of CRYPTO\u201999","author":"S. Chari","year":"1999","unstructured":"Towards sound approaches to counteract power-analysis attacks, Proc. Of CRYPTO\u201999 (M.J. Wiener, ed.), Lecture Notes in Computer Science, vol. 1666, Springer-Verlag, 1999, pp. 398\u2013412."},{"key":"17_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1007\/3-540-48059-5_25","volume-title":"Proc. of CHES\u201999","author":"J.-S. Coron","year":"1999","unstructured":"J-S. Coron, Resistance against differential power analysis for elliptic curve cryptosystems, Proc. of CHES\u201999 (C.K. Ko and Chr. Paar, eds), Lecture Notes in Computer Science, vol. 1717, Springer-Verlag, 1999, pp. 292\u2013302."},{"key":"17_CR9","series-title":"Lect Notes Comput Sci","volume-title":"Financial Cryptography 2000 (FC\u201900)","author":"J.-S. Coron","year":"2000","unstructured":"J-S. Coron, P. Kocher, and D. Naccache, Statistics and secret leakage, Financial Cryptography 2000 (FC\u201900), Lecture Notes in Computer Science, Springer-Verlag."},{"key":"17_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Proc. of CRYPTO\u201997","author":"E. Biham","year":"1997","unstructured":"E. Biham and A. Shamir, Differential fault analysis of secret key cryptosystems, Proc. of CRYPTO\u201997 (Burton S. Kaliski Jr., ed), Lecture Notes in Computer Science, vol. 1294, Springer-Verlag, 1997, pp. 513\u2013525."},{"key":"17_CR11","unstructured":"D. Boneh, R.A. DeMillo, and R.J. Lipton, On the importance of checking cryptographic protocols for faults, Proc. of EUROCRYPT\u2019 97 (W. Fumy, ed), Lectures Notes in Computer Science, vol. 1233, Springer-Verlag, 1997, pp. 37\u201351."},{"key":"17_CR12","unstructured":"E. Hess, N. Janssen, B. Meyer, T. Schutze, Information Leakage Attacks against Smart Card Implementations of Crypt0ographic Algorithms and Countermeasures, Proc. of Eurosmart 2000, pp. 55\u201363."},{"key":"17_CR13","unstructured":"A. Neve, D. Flandre, J-J. Quisquater, Feasibility of Smart Cards in Silicon-On-Insulator (SOI) Technology, Usenix workshop on Smartcard Technology, (Smartcard\u201999), Usenix Association."},{"key":"17_CR14","unstructured":"O. Kommerling, M. Kuhn, Design Principles for Tamper-Resistant Smartcard Processors Proc. of the USENIX Workshop on Smartcard Technology (Smart-card\u201999), pp. 9\u201320. Usenix Association."},{"key":"17_CR15","unstructured":"K.P. Slattery, J.P. Muccioli, T. North, Modeling the radiated Emisssions from Microprocessors and other VLSI Devices, IEEE 2000 International Symposium on Electromagnetic Compatibility."},{"key":"17_CR16","unstructured":"J.P. Muccioli, T. North, K.P. Slattery, Characterization of the RF Emissions from a family of Microprocessors using a lGHz cell, IEEE 1997 International Symposium on Electromagnetic Compatibilty."},{"key":"17_CR17","unstructured":"J.P. Muccioli, M. Catherwood, Characteristics of Near-field Magnetic Radiated Emissions from VLSI Microcontroller Devices, EMC Test and Design, November 1993."},{"issue":"2","key":"17_CR18","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1038\/scientificamerican0899-60","volume":"281","author":"Anant Agarwal","year":"1999","unstructured":"A. Agarwal, Raw Computation, Scientific American, August 1999.","journal-title":"Scientific American"},{"key":"17_CR19","unstructured":"J-J. Quisquater and D. Samyde, A new tool for non-intrusive analysis of smart-cards based on electro-magnetic emssions, the SEMA and DEMA methods, Presented at the rump session of EUROCRYPT\u20192000."}],"container-title":["Lecture Notes in Computer Science","Smart Card Programming and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45418-7_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T09:39:31Z","timestamp":1558258771000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45418-7_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540426103","9783540454182"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/3-540-45418-7_17","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2001]]},"assertion":[{"value":"11 September 2001","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}