{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:12:57Z","timestamp":1772554377306,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540408222","type":"print"},{"value":"9783540452348","type":"electronic"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-45234-8_68","type":"book-chapter","created":{"date-parts":[[2011,1,8]],"date-time":"2011-01-08T01:12:05Z","timestamp":1294449125000},"page":"701-710","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":35,"title":["Power Analysis of FPGAs: How Practical Is the Attack?"],"prefix":"10.1007","author":[{"given":"Fran\u00e7ois-Xavier","family":"Standaert","sequence":"first","affiliation":[]},{"given":"Lo\u00efc","family":"van Oldeneel tot Oldenzeel","sequence":"additional","affiliation":[]},{"given":"David","family":"Samyde","sequence":"additional","affiliation":[]},{"given":"Jean-Jacques","family":"Quisquater","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,9,30]]},"reference":[{"key":"68_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"P. Kocher","year":"1996","unstructured":"Kocher, P.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 104\u2013113. Springer, Heidelberg (1996)"},{"key":"68_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1007\/3-540-48405-1_26","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P. Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 398\u2013412. Springer, Heidelberg (1999)"},{"key":"68_CR3","doi-asserted-by":"crossref","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining Smart-Card Security under the Threat of Power Analysis Attacks. IEEE transactions on computers\u00a051(5) (2002)","DOI":"10.1109\/TC.2002.1004593"},{"key":"68_CR4","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Introduction to Differential Power Analysis and Related Attacks. In: Cryptography Research 607 Market Street, 5th Floor San Francisco, CA 94102,, \n\nwww.cryptography.com"},{"key":"68_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/3-540-45418-7_17","volume-title":"Smart Card Programming and Security","author":"J.J. Quisquater","year":"2001","unstructured":"Quisquater, J.J., Samyde, D.: Electromagnetic Analysis (EMA): Measurements and Countermeasures for Smart Cards. In: Attali, S., Jensen, T. (eds.) E-smart 2001. LNCS, vol.\u00a02140, pp. 200\u2013210. Springer, Heidelberg (2001)"},{"key":"68_CR6","unstructured":"National Bureau of Standards. FIPS PUB 46, The Data Encryption Standard. U.S. Departement of Commerce (January 1977)"},{"key":"68_CR7","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM\u00a021, 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"key":"68_CR8","unstructured":"Xilinx: Virtex 2.5V Field Programmable Gate Arrays Data Sheet, \n\nhttp:\/\/www.xilinx.com"},{"key":"68_CR9","unstructured":"Altera: Flex 10K Field Programmable Gate Arrays Data Sheet, \n\nhttp:\/\/www.altera.com"},{"key":"68_CR10","unstructured":"Proceedings of CHES 1999-2002: Workshop on Cryptographic Hardware and Embedded System, Springer, Heidelberg (1999-2002)"},{"key":"68_CR11","unstructured":"Proceedings of FPL 1999-2002 : The Field Programmable Logic Conference, Springer, Hidleberg (1999-2002)"},{"key":"68_CR12","volume-title":"Cryptography: Theory and Practice","author":"D. Stinson","year":"2000","unstructured":"Stinson, D.: Cryptography: Theory and Practice. CRC Press, Boca Raton (2000)"}],"container-title":["Lecture Notes in Computer Science","Field Programmable Logic and Application"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45234-8_68","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,16]],"date-time":"2020-01-16T16:05:09Z","timestamp":1579190709000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45234-8_68"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540408222","9783540452348"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45234-8_68","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"30 September 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}