{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T03:10:20Z","timestamp":1775099420443,"version":"3.50.1"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319312705","type":"print"},{"value":"9783319312712","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31271-2_1","type":"book-chapter","created":{"date-parts":[[2016,3,9]],"date-time":"2016-03-09T08:33:58Z","timestamp":1457512438000},"page":"3-14","source":"Crossref","is-referenced-by-count":5,"title":["Side-Channel Attacks on SHA-1-Based Product Authentication ICs"],"prefix":"10.1007","author":[{"given":"David","family":"Oswald","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,10]]},"reference":[{"key":"1_CR1","unstructured":"Atmel. ATAES132A 32K AES Serial EEPROM Specification. Datasheet, July 2015. \n                      http:\/\/www.atmel.com\/Images\/Atmel-8914-CryptoAuth-ATAES132A-Datasheet.pdf"},{"key":"1_CR2","unstructured":"Belaid, S., Bettale, L., Dottax, E., Genelle, L., Rondepierre, F.: Differential power analysis of HMAC SHA-2 in the hamming weight model. In: SECRYPT 2013, Reykjavik, Iceland. Scitepress, July 2013"},{"key":"1_CR3","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Advances in Cryptology - CRYPTO 1996","author":"M Bellare","year":"1996","unstructured":"Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1\u201315. Springer, Heidelberg (1996)"},{"key":"1_CR4","unstructured":"Brandt, C.: Hacking iButtons. Presentation at 27C3 (2010). \n                      http:\/\/cribert.freeforge.net\/27c3\/ibsec.pdf"},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"E Brier","year":"2004","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16\u201329. Springer, Heidelberg (2004)"},{"key":"1_CR6","unstructured":"O\u2019Flynn, C.: ChipWhisperer, July 2015. \n                      https:\/\/www.assembla.com\/spaces\/chipwhisperer\/wiki"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/978-3-642-04138-9_6","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"P-A Fouque","year":"2009","unstructured":"Fouque, P.-A., Leurent, G., R\u00e9al, D., Valette, F.: Practical electromagnetic template attack on HMAC. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 66\u201380. Springer, Heidelberg (2009)"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Hemme, L., Hoffmann, L.: Differential fault analysis on the SHA1 compression function. In: Proceedings of the Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2011, pp. 54\u201362. IEEE Computer Society, Washington, DC (2011)","DOI":"10.1109\/FDTC.2011.16"},{"key":"1_CR9","unstructured":"Infineon. ORIGA SLE95200. Datasheet, July 2015. \n                      http:\/\/www.infineon.com\/dgdl\/ORIGA2_SLE95200_Product_Brief_v1+00.pdf?fileId=db3a30433580b3710135a50170336cd8"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Li, R., Li, C., Gong, C.: Differential fault analysis on SHACAL-1. In: Proceedings of the Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2009, pp. 120\u2013126. IEEE Computer Society, Washington, DC (2009)","DOI":"10.1109\/FDTC.2009.41"},{"key":"1_CR11","unstructured":"Maxim integrated. 1-Wire, July 2015. \n                      http:\/\/www.maximintegrated.com\/en\/products\/comms\/one-wire.html"},{"key":"1_CR12","unstructured":"Maxim integrated. DS28E01-100 1\u00a0Kb Protected 1-Wire EEPROM with SHA-1 Engine, July 2015. \n                      http:\/\/www.maximintegrated.com\/en\/products\/digital\/memory-products\/DS28E01-100.html\/tb_tab0"},{"key":"1_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/978-3-540-77535-5_23","volume-title":"Information Security Applications","author":"R McEvoy","year":"2008","unstructured":"McEvoy, R., Tunstall, M., Murphy, C.C., Marnane, W.P.: Differential power analysis of HMAC based on SHA-2, and countermeasures. In: Kim, S., Yung, M., Lee, H.-W. (eds.) WISA 2007. LNCS, vol. 4867, pp. 317\u2013332. Springer, Heidelberg (2008)"},{"key":"1_CR14","unstructured":"NIST. FIpPS 180\u20134 Secure Hash Standard (SHS). \n                      http:\/\/csrc.nist.gov\/publications\/fips\/fips180-4\/fips-180-4.pdf"},{"key":"1_CR15","unstructured":"Oswald, D.: Implementation attacks.: from theory to practice. Ph.D. thesis, Ruhr-University Bochum, September 2013"},{"key":"1_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/3-540-60590-8","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"B Preneel","year":"1995","unstructured":"Preneel, B., van Oorschot, P.C.: MDx-MAC and building fast MACs from hash functions. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 1\u201314. Springer, Heidelberg (1995)"},{"issue":"2","key":"1_CR17","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1080\/00207161003596708","volume":"88","author":"RL Rivest","year":"2011","unstructured":"Rivest, R.L.: The invertibility of the XOR of rotations of a binary word. Int. J. Comput. Math. 88(2), 281\u2013284 (2011)","journal-title":"Int. J. Comput. Math."},{"key":"1_CR18","unstructured":"Sourceforge. GIAnT (Generic Implementation ANalysis Toolkit), April 2013. \n                      https:\/\/sf.net\/projects\/giant\/"},{"key":"1_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/978-3-642-01001-9_26","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"F-X Standaert","year":"2009","unstructured":"Standaert, F.-X., Malkin, T.G., Yung, M.: A unified framework for the analysis of side-channel key recovery attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 443\u2013461. Springer, Heidelberg (2009)"},{"key":"1_CR20","unstructured":"United nations office on drugs and crime. Counterfeit Goods - A Bargain or a Costly Mistake? Fact Sheet (2013). \n                      http:\/\/www.unodc.org\/documents\/toc\/factsheets\/TOC12_fs_counterfeit_EN_HIRES.pdf"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31271-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T14:04:25Z","timestamp":1559397865000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31271-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319312705","9783319312712"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31271-2_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}