{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:38:45Z","timestamp":1742913525862,"version":"3.40.3"},"publisher-location":"New York, NY","reference-count":37,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461479147"},{"type":"electronic","value":"9781461479154"}],"license":[{"start":{"date-parts":[[2013,9,13]],"date-time":"2013-09-13T00:00:00Z","timestamp":1379030400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,9,13]],"date-time":"2013-09-13T00:00:00Z","timestamp":1379030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-1-4614-7915-4_21","type":"book-chapter","created":{"date-parts":[[2013,9,12]],"date-time":"2013-09-12T08:10:18Z","timestamp":1378973418000},"page":"475-495","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Overview of PIC Microcontrollers and Their Suitability for Cryptographic Algorithms"],"prefix":"10.1007","author":[{"given":"Mehari G.","family":"Msgna","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Colin D.","family":"Walter","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2013,9,13]]},"reference":[{"key":"21_CR1","unstructured":"L. E. Bassham, III. The Advanced Encryption Standard Algorithm Validation Suite (AESAVS). NIST Cryptographic Algorithm Validation Program (CAVP), February 2002. http:\/\/csrc.nist.gov\/groups\/STM\/cavp\/documents\/aes\/AESAVS.pdf"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"M. Bates. Interfacing PIC Microcontrollers: Embedded Design by Interactive Simulation. Elsevier, 2006.","DOI":"10.1016\/B978-075068028-8\/50005-X"},{"key":"21_CR3","unstructured":"R. M. Best. Preventing Software Piracy with Crypto-Microprocessors. In Proc. IEEE Spring COMPCON \u201980, pages 466\u2013469. IEEE Computer Society, 25\u201328 Feb, 1980."},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"E. Biham and A. Shamir. Differential Cryptanalysis of DES-like Cryptosystems. In Advances in Cryptology - CRYPTO \u201990, volume 537 of Lecture Notes in Computer Science, pp. 2\u201321. Springer, 1991. http:\/\/dl.acm.org\/citation.cfm?id=646755.705229","DOI":"10.1007\/3-540-38424-3_1"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"E. Biham and A. Shamir. Differential Fault Analysis of Secret Key Cryptosystems. In Advances in Cryptology - CRYPTO \u201997, volume 1294 of Lecture Notes in Computer Science, pp. 513\u2013525. Springer, 1997. http:\/\/dl.acm.org\/citation.cfm?id=646762.706179","DOI":"10.1007\/BFb0052259"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"D. Boneh, R. DeMillo, R. Lipton. On the Importance of Checking Cryptographic Protocols for Faults. In Advances in Cryptology - EUROCRYPT \u201997, volume 1233 of Lecture Notes in Computer Science, pp. 37\u201351. Springer, 1997. http:\/\/dl.acm.org\/citation.cfm?id=1754542.1754548","DOI":"10.1007\/3-540-69053-0_4"},{"key":"21_CR7","unstructured":"Xi Xi Chen. Simple Power Analysis a Threat in Embedded Devices. Master\u2019s thesis, University of Waterloo, Ontario, Canada, 2004."},{"key":"21_CR8","unstructured":"J.-S. Coron and L. Goubin. On Boolean and Arithmetic Masking against Differential Power Analysis. In Cryptographic Hardware and Embedded Systems - CHES \u201900, volume 1965 of Lecture Notes in Computer Science, pages 1\u201314. Springer, 2000."},{"key":"21_CR9","series-title":"Information Security and Cryptography","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael","author":"Joan Daemen","year":"2002","unstructured":"J. Daemen and V. Rijmen. The Design of Rijndael\u2014Information Security and Cryptography. Springer, Heidelberg, 2002."},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"J.-F. Dhem, F. Koeune, P. Leroux, P. Mestr\u00e9, J.-J. Quisquater, and J.-L. Willems. A Practical Implementation of the Timing Attack. In Smart Card Research and Applications\u2014CARDIS \u201998, volume 1820 of Lecture Notes in Computer Science, pp. 167\u2013182. Springer, 2000. http:\/\/dl.acm.org\/citation.cfm?id=646692.703439","DOI":"10.1007\/10721064_15"},{"key":"21_CR11","unstructured":"M. Dworkin. Computer Security: Recommendation for Block Cipher Modes of Operation. NIST Special Publication 800\u201338A. NIST, 2001. http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-38a\/sp800-38a.pdf"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"R. Elbaz, L. Torres, G. Sassatelli, P. Guillemin, C. Anguille, M. Bardouillet, C. Buatois, and J. B. Rigaud. Hardware Engines for Bus Encryption: A Survey of Existing Techniques. In Proc. Design, Automation and Test in Europe (DATE \u201905), Vol. 3, pp. 40\u201345. IEEE Computer Society, 2005. http:\/\/dx.doi.org\/10.1109\/DATE.2005.170","DOI":"10.1109\/DATE.2005.170"},{"key":"21_CR13","unstructured":"Federal Information Processing Standards. FIPS PUB 197 - Announcing the Advanced Encryption System (AES), November 2001. http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf"},{"issue":"1","key":"21_CR14","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/85.194088","volume":"15","author":"M. Godfrey","year":"1993","unstructured":"M. Godfrey and D. Hendry. The Computer as von Neumann Planned It. Annals of the History of Computing, IEEE, 15(1):11\u201321, 1993.","journal-title":"Annals of the History of Computing, IEEE"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"J. Golic and C. Tymen. Multiplicative Masking and Power Analysis of AES. In Cryptographic Hardware and Embedded Systems\u2014CHES 2002, volume 2523 of Lecture Notes in Computer Science, pages 198\u2013212. Springer, 2003.","DOI":"10.1007\/3-540-36400-5_16"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"H. Handschuh and P. Paillier. Smart Card Crypto-Coprocessor for Public-Key Cryptography. In Smart Card Research and Applications\u2014CARDIS 1998, volume 1820 of Lecture Notes for Computer Science, pages 386\u2013394. Springer, 2000.","DOI":"10.1007\/10721064_35"},{"key":"21_CR17","unstructured":"J. Iovine. PIC Microcontroller Project Book: For PIC Basic and PIC Pro Compilers. McGraw-Hill, second edition, 2004."},{"key":"21_CR18","doi-asserted-by":"crossref","unstructured":"P. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and other Systems. In Advances in Cryptology\u2014CRYPTO \u201996, volume 1109 of Lecture Notes in Computer Science, pp. 104\u2013113. Springer, 1996. http:\/\/dl.acm.org\/citation.cfm?id=646761.706156","DOI":"10.1007\/3-540-68697-5_9"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"P. Kocher, J. Jaffe, B. Jun. Differential Power Analysis. In Advances in Cryptology\u2014CRYPTO \u201999, volume 1666 of Lecture Notes in Computer Science, pp. 388\u2013397. Springer, 1999. http:\/\/dx.doi.org\/10.1007\/3-540-48405-1_25","DOI":"10.1007\/3-540-48405-1_25"},{"key":"21_CR20","unstructured":"MathWorks\u2122. MATLAB and SIMULINK, MathWorks\u2122 website visited October 2012. http:\/\/www.mathworks.com"},{"key":"21_CR21","doi-asserted-by":"crossref","unstructured":"M. Matsui. Linear Cryptanalysis Method for DES Cipher. In Advances in Cryptology\u2014EUROCRYPT \u201993, volume 765 of Lecture Notes in Computer Science, pp. 386\u2013397. Springer, 1994. http:\/\/dl.acm.org\/citation.cfm?id=188307.188366","DOI":"10.1007\/3-540-48285-7_33"},{"issue":"1","key":"21_CR22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1502781.1502784","volume":"2","author":"Robert P. McEvoy","year":"2009","unstructured":"R. McEvoy, C. Murphy, W. Marnane, M. Tunstall. Isolated WDDL: A Hiding Countermeasure for Differential Power Analysis on FPGAs. ACM Trans. Reconfigurable Technol. Syst., 2(3):1\u201323, March 2009. http:\/\/doi.acm.org\/10.1145\/1502781.1502784","journal-title":"ACM Transactions on Reconfigurable Technology and Systems"},{"key":"21_CR23","doi-asserted-by":"crossref","unstructured":"T. Messerges. Using Second-Order Power Analysis to Attack DPA Resistant Software. In Cryptographic Hardware and Embedded Systems\u2014CHES \u201900, volume 1965 of Lecture Notes in Computer Science, pp. 238\u2013251. Springer, 2000. http:\/\/dl.acm.org\/citation.cfm?id=648253.752407","DOI":"10.1007\/3-540-44499-8_19"},{"key":"21_CR24","unstructured":"Microchip Technology Inc. MPLAB Integrated Development Environment, Microchip, website visited October 2012. http:\/\/www.microchip.com\/stellent\/idcplg?IdcService=SS_GET_PAGE&nodeId=1406&dDocName=en019469&part=SW007002"},{"key":"21_CR25","unstructured":"Microchip Technology Inc. PIC16F84A Data Sheet, Microchip website visited October 2012. http:\/\/ww1.microchip.com\/downloads\/en\/devicedoc\/35007b.pdf"},{"key":"21_CR26","unstructured":"Microchip Technology Inc. PIC16F876 Data Sheet, Microchip website visited October 2012. http:\/\/ww1.microchip.com\/downloads\/en\/devicedoc\/30292c.pdf"},{"key":"21_CR27","unstructured":"Microchip Technology Inc. Website visited October, 2012. http:\/\/www.microchip.com"},{"key":"21_CR28","unstructured":"Pomona Electronics. 6069A Scope Probe, website visited October 2012. www.pomonaelectronics.com\/pdf\/d4550b-sp150b_6_01.pdf."},{"key":"21_CR29","unstructured":"Royal Holloway, University of London. Smart Card Centre website. http:\/\/www.scc.rhul.ac.uk\/books\/ssed\/embedded\/chapter_21"},{"key":"21_CR30","unstructured":"J. Sanchez and M. Canton. Microcontroller Programming: The Microchip PIC. CRC Press, 2007. http:\/\/www.crcpress.com"},{"key":"21_CR31","unstructured":"D. Smith. PIC in Practice: A Project Based Approach. Newnes, 2006."},{"key":"21_CR32","unstructured":"V. Soso. PIC Simulator IDE, Oshon Software Project, website visited October 2012. http:\/\/www.oshonsoft.com\/pic.html"},{"key":"21_CR33","unstructured":"Teledyne LeCroy Corporation, website visited October 2012. http:\/\/teledynelecroy.com\/oscilloscope\/"},{"key":"21_CR34","unstructured":"K. Tiri and I. Verbauwhede. Design Method for Constant Power Consumption of Differential Logic Circuits. In Design, Automation and Test in Europe, 2005. Proceedings, volume 1, pages 628\u2013633, March 2005."},{"key":"21_CR35","unstructured":"W. Tuchman. A Brief History of the Data Encryption Standard. In Dorothy E. Denning and Peter J. Denning, editors, Internet Besieged, pp. 275\u2013280. ACM Press, Addison-Wesley Publishing Co., 1998. http:\/\/dl.acm.org\/citation.cfm?id=275737.275754"},{"key":"21_CR36","doi-asserted-by":"crossref","unstructured":"W. van Eck. Electromagnetic Radiation From Video Display Units: An Eavesdropping Risk? Computer Security, 4(4):269\u2013286, December 1985. http:\/\/dx.doi.org\/10.1016\/0167-4048(85)90046-X","DOI":"10.1016\/0167-4048(85)90046-X"},{"key":"21_CR37","doi-asserted-by":"crossref","unstructured":"J. von Neumann. First Draft of a Report on the EDVAC. Technical report, Moore School of Electrical Engineering, University of Pennsylvania, June 1945.","DOI":"10.5479\/sil.538961.39088011475779"}],"container-title":["Secure Smart Embedded Devices, Platforms and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-7915-4_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T16:45:43Z","timestamp":1676825143000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4614-7915-4_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,13]]},"ISBN":["9781461479147","9781461479154"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-7915-4_21","relation":{},"subject":[],"published":{"date-parts":[[2013,9,13]]},"assertion":[{"value":"13 September 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}