{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:27:29Z","timestamp":1725809249619},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319130651"},{"type":"electronic","value":"9783319130668"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-13066-8_12","type":"book-chapter","created":{"date-parts":[[2014,11,14]],"date-time":"2014-11-14T18:26:21Z","timestamp":1415989581000},"page":"185-197","source":"Crossref","is-referenced-by-count":2,"title":["A Low Area Probing Detector for Power Efficient Security ICs"],"prefix":"10.1007","author":[{"given":"Michael","family":"Weiner","sequence":"first","affiliation":[]},{"given":"Salvador","family":"Manich","sequence":"additional","affiliation":[]},{"given":"Georg","family":"Sigl","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,15]]},"reference":[{"issue":"2","key":"12_CR1","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1109\/JPROC.2005.862423","volume":"94","author":"R Anderson","year":"2006","unstructured":"Anderson, R., Bond, M., Clulow, J., Skorobogatov, S.: Cryptographic processors-a survey. Proc. IEEE 94(2), 357\u2013369 (2006)","journal-title":"Proc. IEEE"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Balankutty, A., Chih, T.C., Chen, C.Y., Kinget, P.: Mismatch characterization of ring oscillators. In: Custom Integrated Circuits Conference, CICC \u201907, pp. 515\u2013518. IEEE (2007)","DOI":"10.1109\/CICC.2007.4405784"},{"key":"12_CR3","unstructured":"Bowman, K.A., Austin, B.L., Eble, J.C., Tang, X., Meindl, J.D.: A physical alpha-power law MOSFET model. In: Proceedings of the 1999 International Symposium on Low Power Electronics and Design, ISLPED \u201999, pp. 218\u2013222. ACM, New York (1999). \n                    http:\/\/doi.acm.org\/10.1145\/313817.313930"},{"key":"12_CR4","unstructured":"Buchm\u00fcler, H.U.: Security Target M7820 A11 and M11, August 2012. \n                    http:\/\/www.commoncriteriaportal.org\/files\/epfiles\/0829b_pdf.pdf\n                    \n                  . Accessed 16 Jan 2014"},{"key":"12_CR5","unstructured":"Common Criteria for Information Technology Security Evaluation, Part 3: Security assurance components (2012). \n                    https:\/\/www.niap-ccevs.org\/Documents_and_Guidance\/cc_docs.cfm\n                    \n                  . Accessed 25 Aug 2013"},{"key":"12_CR6","unstructured":"Helfmeier, C., Nedospasov, D., Tarnovsky, C., Krissler, J., Boit, C., Seifert, J.P.: Breaking and entering through the silicon. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS \u201913, pp. 733\u2013744. ACM, New York (2013). \n                    http:\/\/doi.acm.org\/10.1145\/2508859.2516717"},{"key":"12_CR7","unstructured":"K\u00f6mmerling, O., Kuhn, M.G.: Design principles for tamper-resistant smartcard processors. In: Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology, WOST\u201999, p. 2. USENIX Association, Berkeley (1999). \n                    http:\/\/dl.acm.org\/citation.cfm?id=1267115.1267117"},{"key":"12_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-40026-1_1","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"J Kr\u00e4mer","year":"2013","unstructured":"Kr\u00e4mer, J., Nedospasov, D., Schl\u00f6sser, A., Seifert, J.-P.: Differential photonic emission analysis. In: Prouff, E. (ed.) COSADE 2013. LNCS, vol. 7864, pp. 1\u201316. Springer, Heidelberg (2013)"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Ling, M., Wu, L., Li, X., Zhang, X., Hou, J., Wang, Y.: Design of monitor and protect circuits against FIB attack on chip security. In: 2012 Eighth International Conference on Computational Intelligence and Security (CIS), pp. 530\u2013533 (2012)","DOI":"10.1109\/CIS.2012.125"},{"key":"12_CR10","unstructured":"Maier, P., Nohl, K.: Low-Cost Chip Microprobing. 29th Chaos Communication Congress (29C3), November 2012. \n                    http:\/\/events.ccc.de\/congress\/2012\/Fahrplan\/attachments\/2247_29C3-Dexter_Nohl-Low_Cost_Chip_Microprobing.pdf\n                    \n                  . Accessed 16 Jan 2014"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Manich, S., Wamser, M.S., Sigl, G.: Detection of probing attempts in secure ICs. In: Hardware-Oriented Security and Trust (HOST), pp. 134\u2013139 (2012)","DOI":"10.1109\/HST.2012.6224333"},{"key":"12_CR12","unstructured":"Picoprobe Model 18C & Picoprobe Model 19C. Datasheet. \n                    http:\/\/www.ggb.com\/PdfIndex_files\/mod18c.pdf\n                    \n                  . Accessed 16 Jan 2014"},{"issue":"2","key":"12_CR13","doi-asserted-by":"publisher","first-page":"584","DOI":"10.1109\/4.52187","volume":"25","author":"T Sakurai","year":"1990","unstructured":"Sakurai, T., Newton, A.R.: Alpha-power law MOSFET model and its applications to CMOS inverter delay and other formulas. IEEE J. Solid-State Circuits 25(2), 584\u2013594 (1990)","journal-title":"IEEE J. Solid-State Circuits"},{"key":"12_CR14","unstructured":"Tarnovsky, C.: Deconstructing a \u2018Secure\u2019 Processor. Blackhat DC (2012)"}],"container-title":["Lecture Notes in Computer Science","Radio Frequency Identification: Security and Privacy Issues"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-13066-8_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T14:44:44Z","timestamp":1559054684000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-13066-8_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319130651","9783319130668"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-13066-8_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}