{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:17:33Z","timestamp":1725887853577},"publisher-location":"Cham","reference-count":54,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319504988"},{"type":"electronic","value":"9783319505008"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-50500-8_9","type":"book-chapter","created":{"date-parts":[[2017,5,18]],"date-time":"2017-05-18T11:14:46Z","timestamp":1495106086000},"page":"217-251","source":"Crossref","is-referenced-by-count":5,"title":["Smart Card Security"],"prefix":"10.1007","author":[{"given":"Michael","family":"Tunstall","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,19]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Akkar, M.-L. and Giraud, C. (2001). An implementation of DES and AES secure against some attacks. In Ko\u00e7, C. K., Naccache, D., and Paar, C., editors, Cryptographic Hardware and Embedded Systems\u2014CHES 2001, volume 2162 of Lecture Notes in Computer Science, pages 309\u2013318. Springer-Verlag.","DOI":"10.1007\/3-540-44709-1_26"},{"key":"9_CR2","unstructured":"American National Standards Institute (1985). Financial Institution Key Management (Wholesale). American National Standards Institute."},{"key":"9_CR3","unstructured":"Anderson, R. and Kuhn, M. (1996). Tamper resistance\u2014a cautionary note. In Proceedings of the Second USENIX Workshop of Electronic Commerce, pages 1\u201311."},{"key":"9_CR4","unstructured":"Anderson, R. and Kuhn, M. (1997). Low cost attacks on tamper resistant devices. In Christianson, B., Crispo, B., Lomas, T. M. A., and Roe, M., editors, Security Protocols, volume 1361 of Lecture Notes in Computer Science, pages 125\u2013136. Springer-Verlag."},{"key":"9_CR5","unstructured":"Aum\u00fcller, C., Bier, P., Hofreiter, P., Fischer, W., and Seifert, J.-P. (2002). Fault attacks on RSA with CRT: Concrete results and practical countermeasures. In Kaliski, B. S., Ko\u00e7, C. K., and Paar, C., editors, Cryptographic Hardware and Embedded Systems\u2014CHES 2002, volume 2523 of Lecture Notes in Computer Science, pages 260\u2013275. Springer-Verlag."},{"issue":"2","key":"9_CR6","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1109\/JPROC.2005.862424","volume":"94","author":"H Bar-El","year":"2006","unstructured":"Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., and Whelan, C. (2006). The sorcerer\u2019s apprentice guide to fault attacks. Proceedings of the IEEE, 94(2):370\u2013382.","journal-title":"Proceedings of the IEEE"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Biham, E. and Shamir, A. (1991). Differential cryptanalysis of DES-like cryptosystems. In Menezes, A. and Vanstone, S., editors, Advances in Cryptology\u2014CRYPTO \u201990, volume 537 of Lecture Notes in Computer Science, pages 2?-21. Springer-Verlag.","DOI":"10.1007\/3-540-38424-3_1"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Biham, E. and Shamir, A. (1997). Differential fault analysis of secret key cryptosystems. In Kaliski, B. S., editor, Advances in Cryptology\u2014CRYPTO \u201997, volume 1294 of Lecture Notes in Computer Science, pages 513\u2013525. Springer-Verlag.","DOI":"10.1007\/BFb0052259"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Bl\u00f6mer, J. and Seifert, J.-P. (2003). Fault based cryptanalysis of the advanced encryption standard (AES). In Wright, R. N., editor, Financial Cryptography\u2014FC 2003, volume 2742 of Lecture Notes in Computer Science, pages 162\u2013181. Springer-Verlag.","DOI":"10.1007\/978-3-540-45126-6_12"},{"key":"9_CR10","unstructured":"Boneh, D., DeMillo, R. A., and Lipton, R. J. (1997). On the importance of checking computations. In Fumy, W., editor, Advances in Cryptology\u2014EUROCRYPT \u201997, volume 1233 of Lecture Notes in Computer Science, pages 37\u201351. Springer-Verlag."},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Brier, E., Clavier, C., and Olivier, F. (2004). Correlation power analysis with a leakage model. In Joye, M. and Quisquater, J.-J., editors, Cryptographic Hardware and Embedded Systems\u2014CHES 2004, volume 3156 of Lecture Notes in Computer Science, pages 16\u201329. Springer-Verlag.","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Chari, S., Jutla, C. S., Rao, J. R., and Rohatgi, P. (1999). Towards approaches to counteract power-analysis attacks. In Wiener, M., editor, Advances in Cryptology\u2014CRYPTO \u201999, volume 1666 of Lecture Notes in Computer Science, pages 398\u2013412. Springer-Verlag.","DOI":"10.1007\/3-540-48405-1_26"},{"issue":"6","key":"9_CR13","doi-asserted-by":"crossref","first-page":"760","DOI":"10.1109\/TC.2004.13","volume":"53","author":"B Chevallier-Mames","year":"2004","unstructured":"Chevallier-Mames, B., Ciet, M., and Joye, M. (2004). Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity. IEEE Transactions on Computers, 53(6):760\u2013768.","journal-title":"IEEE Transactions on Computers"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Clavier, C., Coron, J.-S., and Dabbous, N. (2000). Differential power analysis in the presence of hardware countermeasures. In Ko\u00e7, C. K. and Paar, C., editors, Cryptographic Hardware and Embedded Systems\u2014CHES 2000, volume 1965 of Lecture Notes in Computer Science, pages 252\u2013263. Springer-Verlag.","DOI":"10.1007\/3-540-44499-8_20"},{"key":"9_CR15","unstructured":"Dobraunig, C., Eichlseder, M., Mangard, S. and Mendel, F. (2014). On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks. In Joye, M. and Moradi, A., editors, Smart Card Research and Advanced Applications\u201413th International Conference, CARDIS 2014, volume 8968 of Lecture Notes in Computer Science, pages 233\u2013244. Springer-Verlag."},{"key":"9_CR16","unstructured":"Fouillat, P. (1990). Contribution \u00e0 l\u2019\u00e9tude de l\u2019interaction entre un faisceau laser et un milieu semiconducteur, Applications \u00e0 l\u2019\u00e9tude du Latchup et \u00e0 l\u2019analyse d\u2019\u00e9tats logiques dans les circuits int\u00e9gr\u00e9s en technologie CMOS. PhD thesis, University of Bordeaux."},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Gandolfi, K., Mourtel, C., and Olivier, F. (2001). Electromagnetic analysis: Concrete results. In Ko\u00e7, C. K., Naccache, D., and Paar, C., editors, Cryptographic Hardware and Embedded Systems\u2014CHES 2001, volume 2162 of Lecture Notes in Computer Science, pages 251\u2013261. Springer-Verlag.","DOI":"10.1007\/3-540-44709-1_21"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Genkin, D., Pachmanov, L., Pipman, I., Tromer, E. (2015). Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation. In G\u00fcneysu, G. and Handschuh, H., editors, Cryptographic Hardware and Embedded Systems\u2014CHES 2015, volume 9293 of Lecture Notes in Computer Science, pages 207\u2013228. Springer-Verlag.","DOI":"10.1007\/978-3-662-48324-4_11"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Giraud, C. and Thiebeauld, H. (2004). A survey on fault attacks. In Deswarte, Y. and Kalam, A. A. El, editors, Smart Card Research and Advanced Applications VI\u201418th IFIP World Computer Congress, pages 159\u2013176. Kluwer Academic.","DOI":"10.1007\/1-4020-8147-2_11"},{"key":"9_CR20","unstructured":"Goodwill, G., Jun, B., Jaffe, J. and Rohatgi, P. (2011). A testing methodology for side-channel resistance validation. In The Non-Invasive Attack Testing Workshop\u2014NIAT 2011."},{"key":"9_CR21","first-page":"154","volume":"2003","author":"S Govindavajhala","year":"2003","unstructured":"Govindavajhala, S. and Appel, A. W. (2003). Using memory errors to attack a virtual machine. In IEEE Symposium on Security and Privacy 2003, pages 154\u2013165.","journal-title":"In IEEE Symposium on Security and Privacy"},{"key":"9_CR22","unstructured":"Gutmann, P. (2004). Security Architecture. Springer."},{"key":"9_CR23","doi-asserted-by":"crossref","first-page":"1647","DOI":"10.1109\/23.211348","volume":"39","author":"DH Habing","year":"1992","unstructured":"Habing, D. H. (1992). The use of lasers to simulate radiation-induced transients in semiconductor devices and circuits. IEEE Transactions On Nuclear Science, 39:1647\u20131653.","journal-title":"IEEE Transactions On Nuclear Science"},{"key":"9_CR24","unstructured":"International Organization for Standardization (1997). ISO\/IEC 7816\u20133 Information technology\u2014Identification cards\u2014Integrated circuit(s) cards with contacts \u2013 Part 3: Electronic signals and transmission protocols. International Organization for Standardization."},{"key":"9_CR25","unstructured":"International Organization for Standardization (1999). ISO\/IEC 7816\u20132 Identification cards\u2014Integrated circuit cards\u2014Part 2: Cards with contacts\u2014Dimensions and location of the contacts. International Organization for Standardization."},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Joye, M. and Olivier, F. (2005). Side-channel attacks. In van Tilborg, H., editor, Encyclopedia of Cryptography and Security, pages 571\u2013576. Kluwer Academic Publishers.","DOI":"10.1007\/0-387-23483-7_394"},{"key":"9_CR27","unstructured":"Joye, M. and Tunstall, M., Eds (2015). Fault Analysis in Cryptography. Springer."},{"key":"9_CR28","unstructured":"Kahn, D. (1997). The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet. Simon & Schuster Inc., second edition."},{"key":"9_CR29","volume-title":"The Art of Computer Programming","author":"D Knuth","year":"2001","unstructured":"Knuth, D. (2001). The Art of Computer Programming, volume 2, Seminumerical Algorithms. Addison\u2013Wesley, third edition."},{"key":"9_CR30","doi-asserted-by":"crossref","unstructured":"Kocher, P. (1996). Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Koblitz, N., editor, Advances in Cryptology\u2014CRYPTO \u201996, volume 1109 of Lecture Notes in Computer Science, pages 104\u2013113. Springer-Verlag.","DOI":"10.1007\/3-540-68697-5_9"},{"key":"9_CR31","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., and Jun, B. (1999). Differential power analysis. In Wiener, M. J., editor, Advances in Cryptology\u2014CRYPTO \u201999, volume 1666 of Lecture Notes in Computer Science, pages 388\u2013397. Springer-Verlag.","DOI":"10.1007\/3-540-48405-1_25"},{"key":"9_CR32","unstructured":"Kommerling, O. and Kuhn, M. (1999). Design principles for tamper resistant smartcard processors. In USENIX Workshop on Smartcard Technology, pages 9\u201320."},{"key":"9_CR33","unstructured":"Longo\u00a0Galea, J., De Mulder, E., Page, D. and Tunstall, M. (2015). SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip. In G\u00fcneysu, G. and Handschuh, H., editors, Cryptographic Hardware and Embedded Systems\u2014CHES 2015, volume 9293 of Lecture Notes in Computer Science, pages 620\u2013640. Springer-Verlag."},{"key":"9_CR34","unstructured":"Mangard, S., Oswald, E., and Popp, T. (2007). Power Analysis Attacks\u2014Revealing the Secrets of Smart Cards. Springer-Verlag."},{"key":"9_CR35","doi-asserted-by":"crossref","unstructured":"May, T. and Woods, M. (1978). A new physical mechanism for soft errors in dynamic memories. In 16th International Reliability Physics Symposium.","DOI":"10.1109\/IRPS.1978.362815"},{"key":"9_CR36","unstructured":"Menezes, A., van Oorschot, P., and Vanstone, S. (1997). Handbook of Applied Cryptography. CRC Press."},{"key":"9_CR37","unstructured":"Messerges, T. S. (2000). Power Analysis Attacks and Countermeasures for Cryptographic Algorithms. PhD thesis, University of Illinois, Chicago."},{"key":"9_CR38","unstructured":"Meyer, C. (2000). Private communication. Carl Meyer was one of the designers of the DES algorithm."},{"key":"9_CR39","unstructured":"MIPS-Technologies (2001). MIPS $$^{\\rm TM}$$ architecture for programmers volume I: Introduction to the MIPS32 $$^{\\rm TM}$$ architecture. Technical Report MD00082, Revision 0.95."},{"key":"9_CR40","unstructured":"Murdocca, M. and Heuring, V. P. (2000). Principles of Computer Architecture. Addison-Wesley."},{"key":"9_CR41","doi-asserted-by":"crossref","unstructured":"Naccache, D., Nguyen, P. Q., Tunstall, M., and Whelan, C. (2005). Experimenting with faults, lattices and the DSA. In Vaudenay, S., editor, Public Key Cryptography\u2014PKC 2005, volume 3386 of Lecture Notes in Computer Science, pages 16\u201328. Springer-Verlag.","DOI":"10.1007\/978-3-540-30580-4_3"},{"key":"9_CR42","unstructured":"NIST (1999). Data Encryption Standard (DES) (FIPS-46\u20133). National Institute of Standards and Technology."},{"key":"9_CR43","unstructured":"NIST (2001). Advanced Encryption Standard (AES) (FIPS-197). National Institute of Standards and Technology."},{"key":"9_CR44","unstructured":"Pouget, V. (2000). Simulation exp\u00e9rimentale par impulsions laser ultra-courtes des effets des radiations ionisantes sur les circuits int\u00e9gr\u00e9s. PhD thesis, University of Bordeaux."},{"key":"9_CR45","doi-asserted-by":"crossref","unstructured":"Quisquater, J.-J. and Samyde, D. (2001). Electromagnetic analysis (EMA): Measures and counter-measures for smart cards. In Attali, I. and Jensen, T. P., editors, Smart Card Programming and Security, International Conference on Research in Smart Cards\u2014E-smart 2001, volume 2140 of Lecture Notes in Computer Science, pages 200\u2013210. Springer-Verlag.","DOI":"10.1007\/3-540-45418-7_17"},{"key":"9_CR46","doi-asserted-by":"crossref","unstructured":"Rivain, M. (2009). Differential Fault Analysis on DES Middle Rounds. Clavier, C. and Kris, G., editors, Cryptographic Hardware and Embedded Systems\u2014CHES 2009, volume 5747 of Lecture Notes in Computer Science, pages 457\u2013469. Springer-Verlag.","DOI":"10.1007\/978-3-642-04138-9_32"},{"issue":"2","key":"9_CR47","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., and Adleman, L. M. (1978). Method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120\u2013126.","journal-title":"Communications of the ACM"},{"key":"9_CR48","unstructured":"Samyde, D., Skorobogatov, S. P., Anderson, R. J., and Quisquater, J.-J. (2002). On a new way to read data from memory. In Proceedings of the First International IEEE Security in Storage Workshop, pages 65\u201369."},{"key":"9_CR49","unstructured":"Schneider, T. and Moradi, A. (2015). Leakage Assessment Methodology\u2014A Clear Roadmap for Side-Channel Evaluations. In G\u00fcneysu, G. and Handschuh, H., editors, Cryptographic Hardware and Embedded Systems\u2014CHES 2015, volume 9293 of Lecture Notes in Computer Science, pages 495\u2013513. Springer-Verlag."},{"key":"9_CR50","unstructured":"Skorobogatov, S. and Anderson, R. (2002). Optical fault induction attacks. In Kaliski, B. S., \u00c7. K. Ko\u00e7, and Paar, C., editors, Cryptographic Hardware and Embedded Systems\u2014CHES 2002, volume 2523 of Lecture Notes in Computer Science, pages 2\u201312. Springer-Verlag."},{"key":"9_CR51","unstructured":"Skorobogatov, S. P. (2005). Semi-Invasive Attacks\u2014A New Approach to Hardware Security Analysis. PhD thesis, University of Cambridge. available at http:\/\/www.cl.cam.ac.uk\/TechReports\/ ."},{"key":"9_CR52","unstructured":"Tarnovsky, C., (2015) https:\/\/en.wikipedia.org\/wiki\/Christopher_Tarnovsky . Accessed 16 November 2015."},{"key":"9_CR53","unstructured":"Wright, P. (1987). Spycatcher. Heineman."},{"key":"9_CR54","doi-asserted-by":"crossref","first-page":"776","DOI":"10.1126\/science.206.4420.776","volume":"206","author":"J Ziegler","year":"1979","unstructured":"Ziegler, J. (1979). Effect of cosmic rays on computer memories. Science, 206:776\u2013788.","journal-title":"Science"}],"container-title":["Smart Cards, Tokens, Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-50500-8_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T20:16:44Z","timestamp":1569356204000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-50500-8_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319504988","9783319505008"],"references-count":54,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-50500-8_9","relation":{},"subject":[],"published":{"date-parts":[[2017]]}}}