{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:08:11Z","timestamp":1771697291410,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540850526","type":"print"},{"value":"9783540850533","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-85053-3_15","type":"book-chapter","created":{"date-parts":[[2008,8,5]],"date-time":"2008-08-05T13:42:12Z","timestamp":1217943732000},"page":"228-243","source":"Crossref","is-referenced-by-count":39,"title":["Attacking State-of-the-Art Software Countermeasures\u2014A Case Study for AES"],"prefix":"10.1007","author":[{"given":"Stefan","family":"Tillich","sequence":"first","affiliation":[]},{"given":"Christoph","family":"Herbst","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"Atmel Corporation. 8-bit Microcontroller with 16K Bytes In-System Programmable Flash (February 2003), \n                    \n                      http:\/\/www.atmel.com\/dyn\/resources\/prod_documents\/doc1142.pdf"},{"key":"15_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/3-540-44499-8_20","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2000","author":"C. Clavier","year":"2000","unstructured":"Clavier, C., Coron, J.-S., Dabbous, N.: Differential Power Analysis in the Presence of Hardware Countermeasures. In: Paar, C., Ko\u00e7, \u00c7.K. (eds.) CHES 2000. LNCS, vol.\u00a01965, pp. 252\u2013263. Springer, Heidelberg (2000)"},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/978-3-540-74735-2_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"J.-S. Coron","year":"2007","unstructured":"Coron, J.-S., Prouff, E., Rivain, M.: Side Channel Cryptanalysis of a Higher Order Masking Scheme. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 28\u201344. Springer, Heidelberg (2007)"},{"key":"15_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/11767480_16","volume-title":"Applied Cryptography and Network Security","author":"C. Herbst","year":"2006","unstructured":"Herbst, C., Oswald, E., Mangard, S.: An AES Smart Card Implementation Resistant to Power Analysis Attacks. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol.\u00a03989, pp. 239\u2013252. Springer, Heidelberg (2006)"},{"key":"15_CR5","unstructured":"International Organisation for Standardization (ISO). ISO\/IEC 7816-3: Information technology - Identification cards - Integrated circuit(s) cards with contacts - Part 3: Electronic signals and transmission protocols (September 1997), \n                    \n                      http:\/\/www.iso.org"},{"key":"15_CR6","unstructured":"Jaffe, J.: Introduction to Differential Power Analysis, Presented at ECRYPT Summerschool on Cryptographic Hardware, Side Channel and Fault Analysis (June 2006)"},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/11545262_22","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"M. Joye","year":"2005","unstructured":"Joye, M., Paillier, P., Schoenmakers, B.: On Second-Order Differential Power Analysis. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol.\u00a03659, pp. 293\u2013308. Springer, Heidelberg (2005)"},{"key":"15_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P.C. Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"15_CR9","volume-title":"Power Analysis Attacks \u2013 Revealing the Secrets of Smart Cards","author":"S. Mangard","year":"2007","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks \u2013 Revealing the Secrets of Smart Cards. Springer, Heidelberg (2007)"},{"key":"15_CR10","unstructured":"National Institute of Standards and Technology (NIST). FIPS-197: Advanced Encryption Standard (November 2001), \n                    \n                      http:\/\/www.itl.nist.gov\/fipspubs\/\n                    \n                    \n                  ."},{"key":"15_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/11967668_16","volume-title":"Topics in Cryptology \u2013 CT-RSA 2007","author":"E. Oswald","year":"2006","unstructured":"Oswald, E., Mangard, S.: Template Attacks on Masking\u2014Resistance is Futile. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol.\u00a04377, pp. 243\u2013256. Springer, Heidelberg (2006)"},{"key":"15_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/11605805_13","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"E. Oswald","year":"2006","unstructured":"Oswald, E., Mangard, S., Herbst, C., Tillich, S.: Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol.\u00a03860, pp. 192\u2013207. Springer, Heidelberg (2006)"},{"key":"15_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/11605805_14","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"K. Schramm","year":"2006","unstructured":"Schramm, K., Paar, C.: Higher Order Masking of the AES. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol.\u00a03860, pp. 208\u2013225. Springer, Heidelberg (2006)"},{"key":"15_CR14","doi-asserted-by":"publisher","first-page":"562","DOI":"10.1109\/ITCC.2005.213","volume-title":"International Conference on Information Technology: Coding and Computing (ITCC 2005)","author":"F.-X. Standaert","year":"2005","unstructured":"Standaert, F.-X., Peeters, E., Quisquater, J.-J.: On the Masking Countermeasure and Higher-Order Power Analysis Attacks. In: International Conference on Information Technology: Coding and Computing (ITCC 2005), Las Vegas, Nevada, USA, April 4-6, 2005, vol.\u00a01, pp. 562\u2013567. IEEE Computer Society, Los Alamitos (2005)"},{"key":"15_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-540-72738-5_10","volume-title":"Applied Cryptography and Network Security","author":"S. Tillich","year":"2007","unstructured":"Tillich, S., Herbst, C., Mangard, S.: Protecting AES Software Implementations on 32-bit Processors against Power Analysis. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol.\u00a04521, pp. 141\u2013157. Springer, Heidelberg (2007)"},{"key":"15_CR16","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"J. Waddle","year":"2004","unstructured":"Waddle, J., Wagner, D.: Towards Efficient Second-Order Power Analysis. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 1\u201315. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems \u2013 CHES 2008"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85053-3_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:38:21Z","timestamp":1619523501000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85053-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540850526","9783540850533"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85053-3_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[]}}