{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:28:21Z","timestamp":1725560901418},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540208273"},{"type":"electronic","value":"9783540245919"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24591-9_16","type":"book-chapter","created":{"date-parts":[[2010,7,29]],"date-time":"2010-07-29T07:36:56Z","timestamp":1280389016000},"page":"203-216","source":"Crossref","is-referenced-by-count":5,"title":["Sign-Based Differential Power Analysis"],"prefix":"10.1007","author":[{"given":"Roman","family":"Novak","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"P. Kocher","year":"1996","unstructured":"Kocher, P.: Timing Attacks on Implementation of Diffie-Hellman, RSA, DSS and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 104\u2013113. Springer, Heidelberg (1996)"},{"key":"16_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P. Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"16_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-36206-1","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"D. Agrawal","year":"2002","unstructured":"Agrawal, D., Archambeault, B., Rao, J.R., Rohatgi, P.: The EM Side-Channel(s): Attacks and Assessment Methodologies. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, Springer, Heidelberg (2002)"},{"key":"16_CR4","unstructured":"Chari, S., Jutla, C., Rao, J.R., Rohatgi, P.: A Cautionary Note Regarding Evaluation of AES Candidates. In: AES Second Candidate Conference, Rome, Italy, March 22-23, pp. 133\u2013147 (1999)"},{"key":"16_CR5","unstructured":"Quisquater, J.J., Samyde, D.: Automatic Code Recognition for Smartcards Using a Kohonen Neural Network. In: Proceedings of the 5th Smart Card Research and Advanced Application Conference - CARDIS 2002, San Jose, CA, USA, November 21-22, USENIX Association (2002)"},{"issue":"5","key":"16_CR6","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"T.S. Messerges","year":"2002","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining Smart-Card Security under the Threat of Power Analysis Attacks. IEEE Transactions on Computers\u00a051(5), 541\u2013552 (2002)","journal-title":"IEEE Transactions on Computers"},{"key":"16_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/3-540-48059-5_16","volume-title":"Cryptographic Hardware and Embedded Systems","author":"P.N. Fahn","year":"1999","unstructured":"Fahn, P.N., Pearson, P.K.: IPA: A New Class of Power Attacks. In: Koc, C.K., Paar, C. (eds.) CHES 1999. LNCS, vol.\u00a01717, pp. 173\u2013186. Springer, Heidelberg (1999)"},{"key":"16_CR8","unstructured":"K\u00f6mmerling, O., Kuhn, M.G.: Design Principles for Tamper-Resistant Smartcard Processors. In: Proceedings of the USENIX Workshop on Smartcard Technology - Smartcard 1999, Chicago, Illinois, May 10-11, pp. 9\u201320. USENIX Association (1999)"},{"key":"16_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1007\/3-540-48405-1_26","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"S. Chari","year":"1999","unstructured":"Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards Sound Countermeasures to Counteract Power-Analysis Attacks. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 398\u2013412. Springer, Heidelberg (1999)"},{"key":"16_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1007\/3-540-44448-3_38","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"M.L. Akkar","year":"2000","unstructured":"Akkar, M.L., Bevan, R., Dischamp, P., Moyart, D.: Power Analysis, What Is Now Possible. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 489\u2013502. Springer, Heidelberg (2000)"},{"key":"16_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/3-540-44499-8_20","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2000","author":"C. Clavier","year":"2000","unstructured":"Clavier, C., Coron, J.S., Dabbous, N.: Differential Power Analysis in the Presence of Hardware Countermeasures. In: Koc, C.K., Paar, C. (eds.) CHES 2000. LNCS, vol.\u00a01965, pp. 252\u2013263. Springer, Heidelberg (2000)"},{"key":"16_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45203-4_24","volume-title":"Applied Cryptography and Network Security","author":"R. Novak","year":"2003","unstructured":"Novak, R.: Side-Channel Attack on Substitution Blocks. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol.\u00a02846, Springer, Heidelberg (2003) (in print)"},{"key":"16_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/BFb0028165","volume-title":"Security Protocols","author":"R. Anderson","year":"1997","unstructured":"Anderson, R., Kuhn, M.: Low Cost Attacks on Tamper Resistant Devices. In: Lomas, M., et al. (eds.) Security Protocols 1997. LNCS, vol.\u00a01361, pp. 125\u2013136. Springer, Heidelberg (1997)"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24591-9_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,19]],"date-time":"2019-01-19T14:04:42Z","timestamp":1547906682000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24591-9_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540208273","9783540245919"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24591-9_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}