{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:29:47Z","timestamp":1772555387293,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":4,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540226666","type":"print"},{"value":"9783540286325","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-28632-5_1","type":"book-chapter","created":{"date-parts":[[2010,9,20]],"date-time":"2010-09-20T16:45:31Z","timestamp":1285001131000},"page":"1-15","source":"Crossref","is-referenced-by-count":117,"title":["Towards Efficient Second-Order Power Analysis"],"prefix":"10.1007","author":[{"given":"Jason","family":"Waddle","sequence":"first","affiliation":[]},{"given":"David","family":"Wagner","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P.C. Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"1_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/3-540-44499-8_19","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2000","author":"T.S. Messerges","year":"2000","unstructured":"Messerges, T.S.: Using second-order power analysis to attack DPA resistant software. In: Paar, C., Ko\u00e7, \u00c7.K. (eds.) CHES 2000. LNCS, vol.\u00a01965, p. 238. Springer, Heidelberg (2000)"},{"key":"1_CR3","volume-title":"Proceedings of Workshop on Cryptographic Hardware and Embedded Systems","author":"J.-S. Coron","year":"2000","unstructured":"Coron, J.-S., Goubin, L.: On Boolean and Arithmetic Masking against Differential Power Analysis. In: Proceedings of Workshop on Cryptographic Hardware and Embedded Systems, August 2000, Springer, Heidelberg (2000)"},{"key":"1_CR4","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/3-540-48059-5_14","volume-title":"Proceedings of Workshop on Cryptographic Hardware and Embedded Systems","author":"T.S. Messerges","year":"1999","unstructured":"Messerges, T.S.: Securing the AES Finalists Against Power Analysis Attacks. In: Proceedings of Workshop on Cryptographic Hardware and Embedded Systems, August 1999, pp. 144\u2013157. Springer-, Heidelberg (1999)"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-28632-5_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,2]],"date-time":"2021-05-02T23:28:37Z","timestamp":1619998117000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-28632-5_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540226666","9783540286325"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-28632-5_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}