{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T04:38:19Z","timestamp":1747802299074,"version":"3.41.0"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319159423"},{"type":"electronic","value":"9783319159430"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-15943-0_14","type":"book-chapter","created":{"date-parts":[[2015,3,16]],"date-time":"2015-03-16T10:27:17Z","timestamp":1426501637000},"page":"222-237","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Remote IP Protection Using Timing Channels"],"prefix":"10.1007","author":[{"given":"Ariano-Tim","family":"Donda","sequence":"first","affiliation":[]},{"given":"Peter","family":"Samarin","sequence":"additional","affiliation":[]},{"given":"Jacek","family":"Samotyja","sequence":"additional","affiliation":[]},{"given":"Kerstin","family":"Lemke-Rust","sequence":"additional","affiliation":[]},{"given":"Christof","family":"Paar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,17]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Aciicmez, O., Seifert, J.-P., Koc, C.K.: Predicting Secret Keys via Branch Prediction. Cryptology ePrint Archive, Report 2006\/288 (2006). http:\/\/eprint.iacr.org\/","DOI":"10.1007\/11967668_15"},{"key":"14_CR2","volume-title":"Computer Viruses and Malware","author":"J Aycock","year":"2006","unstructured":"Aycock, J.: Computer Viruses and Malware. Springer, New York (2006)"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Becker, G.T., Burleson, W., Paar, C.: Side-channel watermarks for embedded software. In: 9th IEEE NEWCAS Conference (2011)","DOI":"10.1109\/NEWCAS.2011.5981323"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Becker, G.T., Kasper, M., Moradi, A., Paar, C.: Side-channel based Watermarks for Integrated Circuits. In: Plusquellic, J., Mai, K. (eds.) HOST, pp. 30\u201335. IEEE Computer Society (2010)","DOI":"10.1109\/HST.2010.5513117"},{"key":"14_CR5","unstructured":"Bernstein, D.J.: Cache-timing attacks on AES. Technical report (2005)"},{"key":"14_CR6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-09527-0","volume-title":"Protocols for Authentication and Key Establishment","author":"C Boyd","year":"2003","unstructured":"Boyd, C.: Protocols for Authentication and Key Establishment. Springer, Heidelberg (2003)"},{"key":"14_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/11836810_13","volume-title":"Information Security","author":"C De Canni\u00e8re","year":"2006","unstructured":"De Canni\u00e8re, C.: Trivium: a stream cipher construction inspired by block cipher design principles. In: Katsikas, S.K., L\u00f3pez, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol. 4176, pp. 171\u2013186. Springer, Heidelberg (2006)"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Collberg, C.S., Thomborson, C.D.: Software watermarking: models and dynamic embeddings. In: Appel, A.W., Aiken, A. (eds.) POPL, pp. 311\u2013324. ACM (1999)","DOI":"10.1145\/292540.292569"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J., Kalker, T.: Digital watermarking and steganography. Elesevier Inc. (2008)","DOI":"10.1016\/B978-012372585-1.50015-2"},{"key":"14_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in cryptology - crypto \u201996","author":"PC Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104\u2013113. Springer, Heidelberg (1996)"},{"key":"14_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"PC Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, p. 388. Springer, Heidelberg (1999)"},{"key":"14_CR12","volume-title":"Power Analysis Attacks","author":"S Mangard","year":"2007","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks. Springer, New York (2007)"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Murdoch, S.J., Danezis, G.: Low-cost traffic analysis of Tor. In: IEEE Symposium on Security and Privacy, pp. 183\u2013195. IEEE Computer Society (2005)","DOI":"10.1109\/SP.2005.12"},{"key":"14_CR14","unstructured":"Nagra, J., Thomborson, C.D., Collberg, C.S.: A Functional taxonomy for software watermarking. In: Oudshoorn, M.J. (ed.) ACSC. CRPIT, vol. 4, pp. 177\u2013186. Australian Computer Society (2002)"},{"key":"14_CR15","unstructured":"Page, D.: Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel. IACR Cryptology ePrint Archive 2002:169 (2002)"},{"key":"14_CR16","unstructured":"Van Vleck, T.: Timing Channels. http:\/\/multicians.org\/timing-chn.html"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Wang, X., Chen, S., Jajodia, S.: Tracking anonymous peer-to-peer VoIP calls on the internet. In: Atluri, V., Meadows, C., Juels, A. (eds.) ACM Conference on Computer and Communications Security, pp. 81\u201391. ACM (2005)","DOI":"10.1145\/1102120.1102133"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology - ICISC 2014"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-15943-0_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T00:26:18Z","timestamp":1747787178000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-15943-0_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319159423","9783319159430"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-15943-0_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"17 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}