{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T18:27:59Z","timestamp":1725906479695},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319646466"},{"type":"electronic","value":"9783319646473"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64647-3_11","type":"book-chapter","created":{"date-parts":[[2017,7,28]],"date-time":"2017-07-28T15:33:27Z","timestamp":1501256007000},"page":"171-189","source":"Crossref","is-referenced-by-count":4,"title":["Side-Channel Attacks Against the Human Brain: The PIN Code Case Study"],"prefix":"10.1007","author":[{"given":"Joseph","family":"Lange","sequence":"first","affiliation":[]},{"given":"Cl\u00e9ment","family":"Massart","sequence":"additional","affiliation":[]},{"given":"Andr\u00e9","family":"Mouraux","sequence":"additional","affiliation":[]},{"given":"Francois-Xavier","family":"Standaert","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,29]]},"reference":[{"key":"11_CR1","unstructured":"http:\/\/emotiv.com\/ . Accessed July 2016"},{"key":"11_CR2","unstructured":"http:\/\/neurosky.com\/ . Accessed July 2016"},{"key":"11_CR3","unstructured":"http:\/\/www.chesworkshop.org\/ . Accessed July 2016"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11894063_1","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"C Archambeau","year":"2006","unstructured":"Archambeau, C., Peeters, E., Standaert, F.-X., Quisquater, J.-J.: Template attacks in principal subspaces. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 1\u201314. Springer, Heidelberg (2006). doi: 10.1007\/11894063_1"},{"issue":"2","key":"11_CR5","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1007\/s00145-010-9084-8","volume":"24","author":"L Batina","year":"2011","unstructured":"Batina, L., Gierlichs, B., Prouff, E., Rivain, M., Standaert, F., Veyrat-Charvillon, N.: Mutual information analysis: a comprehensive study. J. Cryptol. 24(2), 269\u2013291 (2011)","journal-title":"J. Cryptol."},{"issue":"5","key":"11_CR6","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1016\/0168-5597(95)00116-A","volume":"96","author":"I Berlad","year":"1995","unstructured":"Berlad, I., Pratt, H.: P300 in response to the subject\u2019s own name. Electroencephalogr. Clin. Neurophysiol. 96(5), 472\u2013474 (1995)","journal-title":"Electroencephalogr. Clin. Neurophysiol."},{"issue":"2","key":"11_CR7","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MTS.2015.2425551","volume":"34","author":"T Bonaci","year":"2015","unstructured":"Bonaci, T., Calo, R., Chizeck, H.J.: App stores for the brain: privacy and security in brain-computer interfaces. IEEE Technol. Soc. Mag. 34(2), 32\u201339 (2015)","journal-title":"IEEE Technol. Soc. Mag."},{"key":"11_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-36400-5_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S Chari","year":"2003","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski, B.S., Ko\u00e7, K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13\u201328. Springer, Heidelberg (2003). doi: 10.1007\/3-540-36400-5_3"},{"issue":"2","key":"11_CR9","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1109\/TCIAIG.2013.2264736","volume":"5","author":"D Coyle","year":"2013","unstructured":"Coyle, D., Pr\u00edncipe, J.C., Lotte, F., Nijholt, A.: Guest editorial: brain\/neuronal - computer game interfaces and interaction. IEEE Trans. Comput. Intell. AI Games 5(2), 77\u201381 (2013)","journal-title":"IEEE Trans. Comput. Intell. AI Games"},{"key":"11_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/978-3-662-46800-5_16","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2015","author":"A Duc","year":"2015","unstructured":"Duc, A., Faust, S., Standaert, F.-X.: Making masking security proofs concrete. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9056, pp. 401\u2013429. Springer, Heidelberg (2015). doi: 10.1007\/978-3-662-46800-5_16"},{"key":"11_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1007\/978-3-642-55220-5_26","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2014","author":"F Durvaux","year":"2014","unstructured":"Durvaux, F., Standaert, F.-X., Veyrat-Charvillon, N.: How to certify the leakage of a chip? In: Nguyen, P.Q., Oswald, E. (eds.) EUROCRYPT 2014. LNCS, vol. 8441, pp. 459\u2013476. Springer, Heidelberg (2014). doi: 10.1007\/978-3-642-55220-5_26"},{"key":"11_CR12","doi-asserted-by":"crossref","DOI":"10.1201\/9780429246593","volume-title":"An Introduction to the Bootstrap","author":"B Efron","year":"1994","unstructured":"Efron, B., Tibshirani, R.J.: An Introduction to the Bootstrap. CRC Press, Boca Raton (1994)"},{"issue":"6","key":"11_CR13","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1002\/ana.410120605","volume":"12","author":"J Engel","year":"1982","unstructured":"Engel, J., Kuhl, D.E., Phelps, M.E., Crandall, P.H.: Comparative localization of foci in partial epilepsy by PCT and EEG. Ann. Neurol. 12(6), 529\u2013537 (1982)","journal-title":"Ann. Neurol."},{"issue":"5","key":"11_CR14","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1111\/j.1469-8986.1991.tb01990.x","volume":"28","author":"LA Farwell","year":"1991","unstructured":"Farwell, L.A., Donchin, E.: The truth will out: interrogative polygraphy (lie detection) with event-related brain potentials. Psychophysiology 28(5), 531\u2013547 (1991)","journal-title":"Psychophysiology"},{"issue":"2","key":"11_CR15","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1007\/s10676-016-9398-9","volume":"18","author":"M Ienca","year":"2016","unstructured":"Ienca, M.: Hacking the brain: brain-computer interfacing technology and the ethics of neurosecurity. Ethics Inf. Technol. 18(2), 117\u2013129 (2016)","journal-title":"Ethics Inf. Technol."},{"issue":"3","key":"11_CR16","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1111\/j.1467-9280.2009.02305.x","volume":"20","author":"M Inzlicht","year":"2009","unstructured":"Inzlicht, M., McGregor, I., Hirsh, J.B., Nash, K.: Neural markers of religious conviction. Psychol. Sci. 20(3), 385\u2013392 (2009)","journal-title":"Psychol. Sci."},{"key":"11_CR17","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1126\/science.7350657","volume":"207","author":"M Kutas","year":"1980","unstructured":"Kutas, M., Hillyard, S.A.: Reading senseless sentences: brain potentials reflect semantic incongruity. Science 207, 203\u2013205 (1980)","journal-title":"Science"},{"key":"11_CR18","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1038\/307161a0","volume":"307","author":"M Kutas","year":"1984","unstructured":"Kutas, M., Hillyard, S.A.: Brain potentials during reading reflect word expectancy and semantic association. Nature 307, 161\u2013163 (1984)","journal-title":"Nature"},{"issue":"12","key":"11_CR19","first-page":"2726","volume":"52\u2013I","author":"C Lin","year":"2005","unstructured":"Lin, C., Wu, R., Liang, S., Chao, W., Chen, Y., Jung, T.: EEG-based drowsiness estimation for safety driving using independent component analysis. IEEE Trans. Circ. Syst. 52\u2013I(12), 2726\u20132738 (2005)","journal-title":"IEEE Trans. Circ. Syst."},{"key":"11_CR20","volume-title":"Power Analysis Attacks - Revealing the Secrets of Smart Cards","author":"S Mangard","year":"2007","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks - Revealing the Secrets of Smart Cards. Springer, New York (2007)"},{"key":"11_CR21","unstructured":"Martinovic, I., Davies, D., Frank, M., Perito, D., Ros, T., Song, D.: On the feasibility of side-channel attacks with brain-computer interfaces. In: USENIX Security Symposium, Proceedings, pp. 143\u2013158. USENIX Association (2012)"},{"issue":"3","key":"11_CR22","doi-asserted-by":"crossref","first-page":"991","DOI":"10.1016\/S0896-6273(00)00169-0","volume":"28","author":"CM Portas","year":"2000","unstructured":"Portas, C.M., Krakow, K., Allen, P., Josephs, O., Armony, J.L., Frith, C.D.: Auditory processing across the sleep-wake cycle: simultaneous EEG and FMRI monitoring in humans. Neuron 28(3), 991\u2013999 (2000)","journal-title":"Neuron"},{"key":"11_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-642-20465-4_8","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2011","author":"M Renauld","year":"2011","unstructured":"Renauld, M., Standaert, F.-X., Veyrat-Charvillon, N., Kamel, D., Flandre, D.: A formal study of power variability issues and side-channel attacks for nanoscale devices. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 109\u2013128. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-20465-4_8"},{"key":"11_CR24","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4899-3324-9","volume-title":"Density Estimation for Statistics and Data Analysis","author":"BW Silverman","year":"1986","unstructured":"Silverman, B.W.: Density Estimation for Statistics and Data Analysis. CRC Press, Boca Raton (1986)"},{"key":"11_CR25","unstructured":"Smart, N.P.: Computing on encrypted data. In: Kayaks & Dreadnoughts in a Sea of Crypto, September 2016"},{"key":"11_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1007\/978-3-642-01957-9_30","volume-title":"Applied Cryptography and Network Security","author":"F-X Standaert","year":"2009","unstructured":"Standaert, F.-X., Koeune, F., Schindler, W.: How to compare profiled side-channel attacks? In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 485\u2013498. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-01957-9_30"},{"key":"11_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/978-3-642-01001-9_26","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"F-X Standaert","year":"2009","unstructured":"Standaert, F.-X., Malkin, T.G., Yung, M.: A unified framework for the analysis of side-channel key recovery attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 443\u2013461. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-01001-9_26"},{"key":"11_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1007\/978-3-642-35999-6_25","volume-title":"Selected Areas in Cryptography","author":"N Veyrat-Charvillon","year":"2013","unstructured":"Veyrat-Charvillon, N., G\u00e9rard, B., Renauld, M., Standaert, F.-X.: An optimal key enumeration algorithm and its application to side-channel attacks. In: Knudsen, L.R., Wu, H. (eds.) SAC 2012. LNCS, vol. 7707, pp. 390\u2013406. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-35999-6_25"}],"container-title":["Lecture Notes in Computer Science","Constructive Side-Channel Analysis and Secure Design"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64647-3_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T19:43:28Z","timestamp":1602618208000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-64647-3_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319646466","9783319646473"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64647-3_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}