{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:10:12Z","timestamp":1763467812033,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540427001"},{"type":"electronic","value":"9783540454724"}],"license":[{"start":{"date-parts":[[2001,1,1]],"date-time":"2001-01-01T00:00:00Z","timestamp":978307200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45472-1_12","type":"book-chapter","created":{"date-parts":[[2007,6,13]],"date-time":"2007-06-13T00:03:20Z","timestamp":1181693000000},"page":"157-173","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":69,"title":["Statistics and Secret Leakage"],"prefix":"10.1007","author":[{"given":"Jean-S\u00e9basticn","family":"Coron","sequence":"first","affiliation":[]},{"given":"Paul","family":"Kocher","sequence":"additional","affiliation":[]},{"given":"David","family":"Naccache","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,10,26]]},"reference":[{"key":"12_CR1","unstructured":"R. Anderson, M. Kuhn, Tamper resistance-a cautionary note, The second USBNix workshop on electronic commerce, pp. 1\u201311, 1996."},{"key":"12_CR2","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1147\/rd.176.0525","volume":"17","author":"C. Bennett","year":"1973","unstructured":"C. Bennett, Logical reversibility of computation, IBM Journal of R&D, vol. 17, pp. 525\u2013532, 1973.","journal-title":"IBM Journal of R&D"},{"key":"12_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Cryptology CRYPTO\u201997","author":"E. Biham","year":"1997","unstructured":"E. Biham, A. Shamir, Differential fault analysis of secret key cryptosys-tems, Advances in Cryptology CRYPTO\u201997, Springer-Verlag, LNCS 1233, pp. 513\u2013525, 1997."},{"key":"12_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Cryptology burocrypt\u201997","author":"D. Boneh","year":"1997","unstructured":"D. Boneh, R. DeMillo, R. Lipton, On the importance of checking cryptographic protocols for faults, Advances in Cryptology burocrypt\u201997, Springer-Verlag, LNCS 1233, pp. 37\u201351, 1997."},{"key":"12_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1007\/3-540-48405-1_26","volume-title":"Cryptology crypto\u201999","author":"S. Chari","year":"1999","unstructured":"S. Chari, C. Jutla, J. Rao, P. Rohatgi, Towards sound approaches to couteract power-analysis attacks, Advances in Cryptology crypto\u201999, Springer-Verlag, LNCS 1666, pp. 398\u2013412, 1999."},{"key":"12_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/3-540-49162-7_3","volume-title":"Proceedings of PKC\u201999","author":"J.-S. Coron","year":"1999","unstructured":"J.-S. Coron, On the security of random sources, Proceedings of PKC\u201999, Springer-Verlag, LNCS 1560, pp. 29\u201342, 1999."},{"key":"12_CR7","first-page":"138","volume":"14","author":"F. Edgeworth","year":"1885","unstructured":"F. Edgeworth, Observations and statistics: an essay on the theory of errors of observation and the first principles of statistics, Transactions of the Cambridge philosophical society, vol. 14, pp. 138\u2013169, 1885.","journal-title":"Transactions of the Cambridge philosophical society"},{"key":"12_CR8","unstructured":"International Organization for Standardization and International Elec-trotechnical Commission, ISO\/IEC 15408-l:1999(E), Information technology-Security techniques-Evaluation criteria for IT security, 1999."},{"key":"12_CR9","unstructured":"B. Jun, P. Kocher, The Intel random number generator, Cryptography Research white paper, \nhttp:\/\/www.cryptography.com\/intelRNG_OnlinePDF.pdf\n\n, 1999."},{"key":"12_CR10","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1109\/PROC.1975.9825","volume":"63","author":"R. Keyes","year":"1975","unstructured":"R. Keyes, Physical limits in digital electronics, Proceedings of the IEEE, vol. 63, pp. 740\u2013767, 1975.","journal-title":"Proceedings of the IEEE"},{"key":"12_CR11","unstructured":"D. Knuth, The art of computer programming, vol. 2, Seminunierical algorithms, Addison-Wesley. Reading, pp. 2\u2013160. 1969."},{"key":"12_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Cryp-tology crypto\u201999","author":"P. Kocher","year":"1999","unstructured":"P. Kocher. J. Jaffe, B. Jun, Differential power analysis, Advances in Cryp-tology crypto\u201999, Springer-Verlag, LNCS 1666, pp. 388\u2013397, 1999."},{"key":"12_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Cryptology crypto\u201996","author":"P. Kocher","year":"1996","unstructured":"P. Kocher. Timing attacks on implementations of DifEe-Hellman, USA. DSS, and other systems, Advances in Cryptology crypto\u201996, Springer-Verlag, LNCS 1109, pp. 104\u2013113, 1996."},{"key":"12_CR14","unstructured":"O. K\u00f6mmerling, M. Kuhn, Design principles for tamper-resistant smart-card processors, Proceedings of the usenix workshop on smartcard technology, pp. 9\u201320, 1999."},{"key":"12_CR15","volume-title":"Practical statistics","author":"R. Langlcy","year":"1968","unstructured":"R. Langlcy, Practical statistics, Dover publications, Now-York, 1968."},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"M. Luby, Pseudorandomness and cryptographic applications, Princeton computer science notes, 1996.","DOI":"10.1515\/9780691206844"},{"issue":"2","key":"12_CR17","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/BF00193563","volume":"5","author":"U. Maurer","year":"1992","unstructured":"U. Maurer, A universal statistical test for random bit generators, Journal of Cryptology, vol. 5, no. 2, pp. 89\u2013105, 1992.","journal-title":"Journal of Cryptology"},{"key":"12_CR18","unstructured":"C. Mead, L. Conway, Introduction to VLSI systems, Addison-Wesley, pp. 333\u2013371, 1980."},{"key":"12_CR19","unstructured":"I. Miller, J. Frcund, R. Johnson, Probability and statistics for cnginncrs, Prentice Hill, 1990."},{"key":"12_CR20","unstructured":"National Institute of Standards and Technology, Federal Information Processing Standards Publication 140-1, Security requirements for cryptographic modules January 11, 1994."},{"key":"12_CR21","unstructured":"SEPF88, Primo simposio nazionale,su sicurezza elettromagnetica nella pro-tezione dell\u2019informazione, Rome (Italy), pp. 1\u2013205, 1988."},{"key":"12_CR22","unstructured":"SEPI\u201991, Symposium on electromagnetic security for information protection, Rome (Italy), pp. 1\u2013311, 1991."},{"key":"12_CR23","unstructured":"N. Weste, K. Eshraghian, Principles of CMOS VLSI design, Addison-Wesley, pp. 231\u2013238, 1993."},{"issue":"4","key":"12_CR24","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/99.641604","volume":"4","author":"H. Wolfson","year":"1997","unstructured":"H. Wolfson, Geometric hashing, an overview, IEEE Computational Science and Engineering, vol. 4., no. 4, pp. 10\u201321, 1997.","journal-title":"IEEE Computational Science and Engineering"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45472-1_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,30]],"date-time":"2020-03-30T21:13:35Z","timestamp":1585602815000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45472-1_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540427001","9783540454724"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/3-540-45472-1_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2001]]},"assertion":[{"value":"26 October 2001","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}