{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T06:10:02Z","timestamp":1746339002803,"version":"3.40.4"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319101743"},{"type":"electronic","value":"9783319101750"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-10175-0_19","type":"book-chapter","created":{"date-parts":[[2014,8,14]],"date-time":"2014-08-14T07:37:06Z","timestamp":1408001826000},"page":"281-298","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Studying Leakages on an Embedded Biometric System Using Side Channel Analysis"],"prefix":"10.1007","author":[{"given":"Ma\u00ebl","family":"Berthier","sequence":"first","affiliation":[]},{"given":"Yves","family":"Bocktaels","sequence":"additional","affiliation":[]},{"given":"Julien","family":"Bringer","sequence":"additional","affiliation":[]},{"given":"Herv\u00e9","family":"Chabanne","sequence":"additional","affiliation":[]},{"given":"Taoufik","family":"Chouta","sequence":"additional","affiliation":[]},{"given":"Jean-Luc","family":"Danger","sequence":"additional","affiliation":[]},{"given":"M\u00e9lanie","family":"Favre","sequence":"additional","affiliation":[]},{"given":"Tarik","family":"Graba","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,15]]},"reference":[{"unstructured":"http:\/\/www.rcis.aist.go.jp\/special\/SASEBO\/SASEBO-GII-en.html","key":"19_CR1"},{"unstructured":"Fingerprint Verification Competition. http:\/\/biolab.csr.unibo.it\/FVCOnGoing\/","key":"19_CR2"},{"unstructured":"Fingerprint Verification Competition (2004). http:\/\/bias.csr.unibo.it\/fvc2004\/","key":"19_CR3"},{"unstructured":"Iso\/iec 19794-2 information technology - biometric data interchange formats - part 2: Finger minutiae data","key":"19_CR4"},{"key":"19_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11894063_1","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"C Archambeau","year":"2006","unstructured":"Archambeau, C., Peeters, E., Standaert, F.-X., Quisquater, J.-J.: Template attacks in principal subspaces. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 1\u201314. Springer, Heidelberg (2006)"},{"doi-asserted-by":"crossref","unstructured":"Barral, C., Vaudenay, S.: A protection scheme for moc-enabled smart cards. In: 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference, pp. 1\u20136. IEEE (2006)","key":"19_CR6","DOI":"10.1109\/BCC.2006.4341632"},{"issue":"4","key":"19_CR7","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/s10044-006-0048-4","volume":"9","author":"S Bistarelli","year":"2006","unstructured":"Bistarelli, S., Santini, F., Vaccarelli, A.: An asymmetric fingerprint matching algorithm for java card $$^{\\text{ TM }}$$. Pattern Anal. Appl. 9(4), 359\u2013376 (2006)","journal-title":"Pattern Anal. Appl."},{"key":"19_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-36400-5_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S Chari","year":"2003","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski, B.S., Ko\u00e7, K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13\u201328. Springer, Heidelberg (2003)"},{"doi-asserted-by":"crossref","unstructured":"Chouta, T., Danger, J.-L., Sauvage, L., Graba, T.: A small and high-performance coprocessor for fingerprint match-on-card. In: DSD, pp. 915\u2013922. IEEE (2012)","key":"19_CR9","DOI":"10.1109\/DSD.2012.14"},{"key":"19_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/978-3-540-30079-3_24","volume-title":"Trust and Privacy in Digital Business","author":"T Cucinotta","year":"2004","unstructured":"Cucinotta, T., Brigo, R., Di Natale, M.: Hybrid fingerprint matching on programmable smart cards. In: Katsikas, S.K., L\u00f3pez, J., Pernul, G. (eds.) TrustBus 2004. LNCS, vol. 3184, pp. 232\u2013241. Springer, Heidelberg (2004)"},{"key":"19_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/978-3-642-04391-8_37","volume-title":"Biometric ID Management and Multimodal Communication","author":"J Galbally","year":"2009","unstructured":"Galbally, J., Carballo, S., Fierrez, J., Ortega-Garcia, J.: Vulnerability assessment of fingerprint matching based on time analysis. In: Fierrez, J., Ortega-Garcia, J., Esposito, A., Drygajlo, A., Faundez-Zanuy, M. (eds.) BioID MultiComm2009. LNCS, vol. 5707, pp. 285\u2013292. Springer, Heidelberg (2009)"},{"doi-asserted-by":"crossref","unstructured":"Govan, M., Buggy, T.: A computationally efficient fingerprint matching algorithm for implementation on smartcards. In: First IEEE International Conference on Biometrics: Theory, Applications, and Systems, 2007, BTAS 2007, pp. 1\u20136. IEEE (2007)","key":"19_CR12","DOI":"10.1109\/BTAS.2007.4401959"},{"key":"19_CR13","volume-title":"Principal Component Analysis","author":"I Jolliffe","year":"2005","unstructured":"Jolliffe, I.: Principal Component Analysis. Wiley Online Library, New York (2005)"},{"key":"19_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"PC Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104\u2013113. Springer, Heidelberg (1996)"},{"key":"19_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"PC Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"doi-asserted-by":"crossref","unstructured":"Martinez-Diaz, M., Fierrez-Aguilar, J., Alonso-Fernandez, F., Ortega-Garcia, V., Siguenza, J.: Hill-climbing and brute-force attacks on biometric systems: a case study in match-on-card fingerprint verification. In: Proceedings 2006 40th Annual IEEE International Carnahan Conferences Security Technology, pp. 151\u2013159. IEEE (2006)","key":"19_CR16","DOI":"10.1109\/CCST.2006.313444"},{"key":"19_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/3-540-45418-7_17","volume-title":"Smart Card Programming and Security","author":"J-J Quisquater","year":"2001","unstructured":"Quisquater, J.-J., Samyde, D.: ElectroMagnetic Analysis (EMA): measures and counter-measures for smart cards. In: Attali, S., Jensen, T. (eds.) E-smart 2001. LNCS, vol. 2140, pp. 200\u2013210. Springer, Heidelberg (2001)"},{"key":"19_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-45344-X_32","volume-title":"Audio- and Video-Based Biometric Person Authentication","author":"NK Ratha","year":"2001","unstructured":"Ratha, N.K., Connell, J.H., Bolle, R.M.: An analysis of minutiae matching strength. In: Bigun, J., Smeraldi, F. (eds.) AVBPA 2001. LNCS, vol. 2091, pp. 223\u2013228. Springer, Heidelberg (2001)"},{"key":"19_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"720","DOI":"10.1007\/11527923_75","volume-title":"Audio- and Video-Based Biometric Person Authentication","author":"J Reisman","year":"2005","unstructured":"Reisman, J., Uludag, U., Ross, A.: Secure fingerprint matching with external registration. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 720\u2013729. Springer, Heidelberg (2005)"},{"doi-asserted-by":"crossref","unstructured":"Tiri, K., Hwang, D., Hodjat, A., Lai, B.-C., Yang, S., Schaumont, P., Verbauwhede, I.: AES-based cryptographic and biometric security coprocessor IC in 0.18- $$\\upmu $$m CMOS resistant to side-channel power analysis attacks. In: 2005 Symposium on VLSI Circuits 2005. Digest of Technical Papers, pp. 216\u2013219 (2005)","key":"19_CR20","DOI":"10.1109\/VLSIC.2005.1469370"},{"unstructured":"UCLA. Thumbpod: a next generation biometrically secure wireless embedded system. http:\/\/www.emsec.ee.ucla.edu\/thumbpod","key":"19_CR21"},{"doi-asserted-by":"crossref","unstructured":"Uludag, U., Jain, A.K.: Attacks on biometric systems: a case study in fingerprints. In: Delp, E.J., Wong, P.W. (eds.) Security, Steganography, and Watermarking of Multimedia Contents. Proceedings of SPIE, vol. 5306, pp. 622\u2013633. SPIE (2004)","key":"19_CR22","DOI":"10.1117\/12.530907"},{"issue":"1","key":"19_CR23","doi-asserted-by":"crossref","first-page":"058263","DOI":"10.1155\/ASP\/2006\/58263","volume":"2006","author":"S Yang","year":"2006","unstructured":"Yang, S., Sakiyama, K., Verbauwhede, I.: Efficient and secure fingerprint verification for embedded devices. EURASIP J. Adv. Signal Process. 2006(1), 058263 (2006)","journal-title":"EURASIP J. Adv. Signal Process."},{"unstructured":"Yang, S., Verbauwhede, I.: Automatic secure fingerprint verification system based on fuzzy vault scheme. In: IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005), pp. 609\u2013612 (2005)","key":"19_CR24"}],"container-title":["Lecture Notes in Computer Science","Constructive Side-Channel Analysis and Secure Design"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-10175-0_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T05:37:48Z","timestamp":1746337068000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-10175-0_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319101743","9783319101750"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-10175-0_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"15 August 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}