{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T23:15:22Z","timestamp":1776208522737,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":38,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540406747","type":"print"},{"value":"9783540451464","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-45146-4_27","type":"book-chapter","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T21:51:19Z","timestamp":1277243479000},"page":"463-481","source":"Crossref","is-referenced-by-count":663,"title":["Private Circuits: Securing Hardware against Probing Attacks"],"prefix":"10.1007","author":[{"given":"Yuval","family":"Ishai","sequence":"first","affiliation":[]},{"given":"Amit","family":"Sahai","sequence":"additional","affiliation":[]},{"given":"David","family":"Wagner","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Ajtai, M., Komlos, J., Szemeredi, E.: An O(n log n) sorting network. In: Proceedings of the 15th STOC, pp. 1\u20139 (1983)","DOI":"10.1145\/800061.808726"},{"key":"27_CR2","unstructured":"Anderson, R., Kuhn, M.: Tamper Resistance\u2014A Cautionary Note. In: USENIX E-Commerce Workshop, pp. 1\u201311. USENIX Press (1996)"},{"key":"27_CR3","unstructured":"Anderson, R., Kuhn, M.: Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations. In: Proc. 2nd Workshop on Information Hiding. Springer, Heidelberg (1998)"},{"key":"27_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44647-8_1","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"B. Barak","year":"2001","unstructured":"Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (Im)possibility of obfuscating programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, p. 1. Springer, Heidelberg (2001)"},{"key":"27_CR5","unstructured":"Batcher, K.: Sorting Networks and their Applications. In: Proc. AFiPS Spring Joint Conference, vol.\u00a032, pp. 307\u2013314 (1988)"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Ben-Or, M., Goldwasser, S., Widgerson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: Proc. of 20th STOC (1988)","DOI":"10.1145\/62212.62213"},{"key":"27_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"D. Boneh","year":"1997","unstructured":"Boneh, D., Demillo, R.A., Lipton, R.J.: On the Importance of Checking Cryptographic Protocols for Faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 37\u201351. Springer, Heidelberg (1997)"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Canetti, R.: Security and composition of multiparty cryptographic protocols. J. of Cryptology\u00a013(1) (2000)","DOI":"10.1007\/s001459910006"},{"key":"27_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/3-540-45539-6_33","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"R. Canetti","year":"2000","unstructured":"Canetti, R., Dodis, Y., Halevi, S., Kushilevitz, E., Sahai, A.: Exposure-Resilient Functions and All-or-Nothing Transforms. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 453\u2013469. Springer, Heidelberg (2000)"},{"key":"27_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1007\/3-540-48658-5_38","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"R. Canetti","year":"1994","unstructured":"Canetti, R., Herzberg, A.: Maintaining Security in the Presence of Transient Faults. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 425\u2013438. Springer, Heidelberg (1994)"},{"key":"27_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1007\/3-540-48405-1_26","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"S. Chari","year":"1999","unstructured":"Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards Sound Approaches to Counteract Power- Analysis Attacks. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 398\u2013412. Springer, Heidelberg (1999)"},{"key":"27_CR12","doi-asserted-by":"crossref","unstructured":"Chaum, D., Crepeau, C., Damg\u00e5rd, I.: Multiparty unconditional secure protocols. In: Proc. of 20th STOC (1988)","DOI":"10.1145\/62212.62214"},{"key":"27_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/3-540-45539-6_22","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"R. Cramer","year":"2000","unstructured":"Cramer, R., Damg\u00e5rd, I., Maurer, U.: General secure multi-party computation from any linear secret-sharing scheme. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, p. 316. Springer, Heidelberg (2000)"},{"key":"27_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/3-540-44499-8_18","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2000","author":"J.-S. Coron","year":"2000","unstructured":"Coron, J.-S., Goubin, L.: On Boolean and Arithmetic Masking against Differential Power Analysis. In: Paar, C., Ko\u00e7, \u00c7.K. (eds.) CHES 2000. LNCS, vol.\u00a01965, pp. 231\u2013237. Springer, Heidelberg (2000)"},{"key":"27_CR15","unstructured":"Daemen, J., Rijmen, V.: Resistance Against Implementation Attacks: A Comparative Study of the AES Proposals. In: AES 1999 (March 1999)"},{"key":"27_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-44709-1_21","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2001","author":"K. Gandolfi","year":"2001","unstructured":"Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic Analysis: Concrete Results. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.\u00a02162, p. 251. Springer, Heidelberg (2001)"},{"key":"27_CR17","doi-asserted-by":"crossref","unstructured":"Gennaro, R., Rabin, M.O., Rabin, T.: Simplified VSS and fast-track multiparty computations with applications to threshold cryptography. In: Proc. of 17th PODC (1998)","DOI":"10.1145\/277697.277716"},{"issue":"4","key":"27_CR18","doi-asserted-by":"publisher","first-page":"792","DOI":"10.1145\/6490.6503","volume":"33","author":"O. Goldreich","year":"1986","unstructured":"Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. JACM\u00a033(4), 792\u2013807 (1986)","journal-title":"JACM"},{"key":"27_CR19","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game (extended abstract). In: Proc. of 19th STOC (1987)","DOI":"10.1145\/28395.28420"},{"issue":"3","key":"27_CR20","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1145\/233551.233553","volume":"43","author":"O. Goldreich","year":"1996","unstructured":"Goldreich, O., Ostrovsky, R.: Software Protection and Simulation on Oblivious RAMs. JACM\u00a043(3), 431\u2013473 (1996)","journal-title":"JACM"},{"key":"27_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/3-540-48059-5_15","volume-title":"Cryptographic Hardware and Embedded Systems","author":"L. Goubin","year":"1999","unstructured":"Goubin, L., Patarin, J.: DES and Differential Power Analysis\u2014The Duplication Method. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol.\u00a01717, pp. 158\u2013172. Springer, Heidelberg (1999)"},{"key":"27_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/3-540-44647-8_6","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"M. Hirt","year":"2001","unstructured":"Hirt, M., Maurer, U.: Robustness for free in unconditional multi-party computation. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, p. 101. Springer, Heidelberg (2001)"},{"key":"27_CR23","volume-title":"The Codebreakers","author":"D. Kahn","year":"1967","unstructured":"Kahn, D.: The Codebreakers. The MacMillan Company, Basingstoke (1967)"},{"key":"27_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/BFb0055858","volume-title":"Computer Security \u2013 ESORICS 98","author":"J. Kelsey","year":"1998","unstructured":"Kelsey, J., Schneier, B., Wagner, D.: Side Channel Cryptanalysis of Product Ciphers. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol.\u00a01485, pp. 97\u2013110. Springer, Heidelberg (1998)"},{"key":"27_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"P. Kocher","year":"1996","unstructured":"Kocher, P.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 104\u2013113. Springer, Heidelberg (1996)"},{"key":"27_CR26","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"key":"27_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/3-540-44706-7_11","volume-title":"Fast Software Encryption","author":"T.S. Messerges","year":"2001","unstructured":"Messerges, T.S.: Securing the AES Finalists Against Power Analysis Attacks. In: Schneier, B. (ed.) FSE 2000. LNCS, vol.\u00a01978, p. 150. Springer, Heidelberg (2001)"},{"key":"27_CR28","doi-asserted-by":"crossref","unstructured":"Micali, S., Reyzin, L.: A model for physically observable cryptography. Manuscript (2003)","DOI":"10.1007\/978-3-540-24638-1_16"},{"key":"27_CR29","doi-asserted-by":"crossref","unstructured":"Ostrovsky, R., Yung, M.: How to withstand mobile virus attacks. In: Proc. of 10th PODC (1991)","DOI":"10.1145\/112600.112605"},{"key":"27_CR30","unstructured":"Page, D.: Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel. Tech. report CSTR-02-003, Computer Science Dept., Univ. of Bristol (June 2002)"},{"key":"27_CR31","unstructured":"Pfitzmann, B., Schunter, M., Waidner, M.: Secure Reactive Systems, IBM Technical report RZ 3206 (93252) (May 2000)"},{"key":"27_CR32","unstructured":"Quisquater, J.-J., Samyde, D.: Eddy current for Magnetic Analysis with Active Sensor. In: Esmart 2002 (September 2002)"},{"key":"27_CR33","doi-asserted-by":"crossref","unstructured":"Quisquater, J.-J., Samyde, D.: ElectroMagnetic Analysis (EMA): Measures and Counter- Measures for Smart Cards. In: Attali, S., Jensen, T. (eds.) Esmart 2001. LNCS, vol.\u00a02140, p. 200. Springer, Heidelberg (2001)","DOI":"10.1007\/3-540-45418-7_17"},{"key":"27_CR34","unstructured":"Rao, J.R., Rohatgi, P.: EMpowering Side-Channel Attacks. IACR ePrint 2001\/037"},{"key":"27_CR35","unstructured":"US Air Force, Air Force Systems Security Memorandum 7011\u2014Emission Security Countermeasures Review, May 1 (1998)"},{"key":"27_CR36","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1016\/0167-4048(85)90046-X","volume":"4","author":"W. Eck van","year":"1985","unstructured":"van Eck, W.: Electromagnetic Radiation fromVideo Display Units:An Eavesdropping Risk. Computers & Security\u00a04, 269\u2013286 (1985)","journal-title":"Computers & Security"},{"key":"27_CR37","unstructured":"Wright, D.: Spycatcher. Viking Penguin Inc., New York (1987)"},{"key":"27_CR38","doi-asserted-by":"crossref","unstructured":"Yao, A.C.: How to generate and exchange secrets. In: Proc. of 27th FOCS (1986)","DOI":"10.1109\/SFCS.1986.25"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology - CRYPTO 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45146-4_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T09:52:00Z","timestamp":1559209920000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45146-4_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540406747","9783540451464"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45146-4_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2003]]}}}