{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:04:01Z","timestamp":1725516241475},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540850526"},{"type":"electronic","value":"9783540850533"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-85053-3_23","type":"book-chapter","created":{"date-parts":[[2008,8,5]],"date-time":"2008-08-05T09:42:12Z","timestamp":1217929332000},"page":"363-379","source":"Crossref","is-referenced-by-count":17,"title":["RFID and Its Vulnerability to Faults"],"prefix":"10.1007","author":[{"given":"Michael","family":"Hutter","sequence":"first","affiliation":[]},{"given":"J\u00f6rn-Marc","family":"Schmidt","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Plos","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","unstructured":"Anderson, R.J., Kuhn, M.G.: Tamper Resistance - a Cautionary Note. In: Second Usenix Workshop on Electronic Commerce, pp. 1\u201311 (November 1996)"},{"key":"23_CR2","unstructured":"Atmel Corporation. Website atmel.com - Secure RFID: CryptoRF, http:\/\/www.atmel.com\/products\/SecureRF"},{"key":"23_CR3","unstructured":"Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The Sorcerer\u2019s Apprentice Guide to Fault Attacks. Cryptology ePrint Archive Report 2004\/100 (2004), http:\/\/eprint.iacr.org\/"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P., Verbauwhede, I.: Public-Key Cryptography for RFID-Tags. In: Workshop on RFID Security 2006 (RFIDSec 2006), Graz, Austria, July 12-14 (2006)","DOI":"10.1109\/PERCOMW.2007.98"},{"key":"23_CR5","unstructured":"Blitshteyn, M.: Mastering RFID Label Converting: Where Understanding Static Control Can Help Prevent RFID Transponder Failures. Technical report, Ion Industrial (2005)"},{"key":"23_CR6","series-title":"Lecture Notes in Computer Science","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"A. Bogdanov","year":"2007","unstructured":"Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurinand, Y., Vikkelsoe, C.: PRESENT: An Ultra-Lightweight Block Cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, Springer, Heidelberg (2007)"},{"key":"23_CR7","unstructured":"Canni\u00e9re, C.D., Preneel, B.: TRIVIUM Specifications. eSTREAM, ECRYPT Stream Cipher Project Report 2005\/030 (April 2005), http:\/\/www.ecrypt.eu.org\/stream"},{"key":"23_CR8","unstructured":"Carluccio, D., Lemke, K., Paar, C.: Electromagnetic Side Channel Analysis of a Contactless Smart Card: First Results. In: Oswald, E. (ed.) Workshop on RFID and Lightweight Crypto (RFIDSec 2005), Graz, Austria, July 13-15 (2005)"},{"key":"23_CR9","unstructured":"Feldhofer, M.: Comparing the Stream Ciphers Trivium and Grain for their Feasibility on RFID Tags. In: Posch, K.C., Wolkerstorfer, J. (eds.) Proceedings of Austrochip 2007, Graz, Austria, October 11, 2007, pp. 69\u201375. Verlag der Technischen Universit\u00e4t Graz (2007) ISBN 978-3-902465-87-0"},{"key":"23_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/978-3-540-28632-5_26","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"M. Feldhofer","year":"2004","unstructured":"Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong Authentication for RFID Systems using the AES Algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 357\u2013370. Springer, Heidelberg (2004)"},{"key":"23_CR11","doi-asserted-by":"publisher","first-page":"1118","DOI":"10.1109\/ESTC.2006.280149","volume-title":"Electronics Systeminteg ration Technology Conference, Proceedings of IEEE Conference","author":"R. God","year":"2006","unstructured":"God, R.: Lean Manufacturing of RFID Products - Put the Chip on the Box. In: Electronics Systeminteg ration Technology Conference, Proceedings of IEEE Conference, September 2006, pp. 1118\u20131121. IEEE Computer Society, Los Alamitos (2006)"},{"key":"23_CR12","unstructured":"Hell, M., Johansson, T., Meier, W.: Grain - A Stream Cipher for Constrained Environments. eSTREAM, ECRYPT Stream Cipher Project, Report 2006\/010 (revised version 2005) (2006), http:\/\/www.ecrypt.eu.org\/stream"},{"key":"23_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/11894063_4","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"D. Hong","year":"2006","unstructured":"Hong, D., Sung, J., Hong, S., Lim, J., Lee, S., Koo, B., Lee, C., Chang, D., Lee, J., Jeong, K., Kim, H., Kim, J., Chee, S.: HIGHT: A New Block Cipher Suitable for Low-Resource Device. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol.\u00a04249, pp. 46\u201359. Springer, Heidelberg (2006)"},{"key":"23_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/978-3-540-74735-2_22","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"M. Hutter","year":"2007","unstructured":"Hutter, M., Mangard, S., Feldhofer, M.: Power and EM Attacks on Passive 13.56 MHz RFID Devices. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 320\u2013333. Springer, Heidelberg (2007)"},{"key":"23_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"P.C. Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 104\u2013113. Springer, Heidelberg (1996)"},{"key":"23_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P.C. Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"23_CR17","unstructured":"K\u00f6mmerling, O., Kuhn, M.G.: Design Principles for Tamper-Resistant Smartcard Processors. In: USENIX Workshop on Smartcard Technology (Smartcard 1999), pp. 9\u201320 (May 1999)"},{"key":"23_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1007\/11967668_24","volume-title":"Topics in Cryptology \u2013 CT-RSA 2007","author":"M. McLoone","year":"2007","unstructured":"McLoone, M., Robshaw, M.J.B.: Public Key Cryptography and RFID Tags. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol.\u00a04377, pp. 372\u2013384. Springer, Heidelberg (2007)"},{"key":"23_CR19","unstructured":"NXP Austria GmbH. Website mifare.net - contactless smart cards, http:\/\/www.mifare.net"},{"issue":"9","key":"23_CR20","doi-asserted-by":"publisher","first-page":"1292","DOI":"10.1109\/TC.2007.1050","volume":"56","author":"Y. Oren","year":"2007","unstructured":"Oren, Y., Shamir, A.: Remote Password Extraction from RFID Tags. IEEE Transactions on Computers\u00a056(9), 1292\u20131296 (2007)","journal-title":"IEEE Transactions on Computers"},{"key":"23_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/978-3-540-79263-5_18","volume-title":"Topics in Cryptology - CT-RSA 2008, The Cryptographers\u2019 Track at the RSA Conference 2008","author":"T. Plos","year":"2008","unstructured":"Plos, T.: Susceptibility of UHF RFID Tags to Electromagnetic Analysis. In: Malkin, T. (ed.) Topics in Cryptology - CT-RSA 2008, The Cryptographers\u2019 Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. LNCS, vol.\u00a04964, pp. 288\u2013300. Springer, Heidelberg (2008)"},{"key":"23_CR22","unstructured":"Poschmann, A., Leander, G., Schramm, K., Paar, C.: A Family of Light-Weight Block Ciphers Based on DES Suited for RFID Applications. In: Workshop on RFID Security 2006 (RFIDSec 2006), Graz, Austria, July 12-14 (2006)"},{"key":"23_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1007\/BFb0054143","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"G. Poupard","year":"1998","unstructured":"Poupard, G., Stern, J.: Security Analysis of a Practical \u201don the fly\u201d Authentication and Signature Generation. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 422\u2013436. Springer, Heidelberg (1998)"},{"key":"23_CR24","unstructured":"Quisquater, J.-J., Samyde, D.: Eddy Current for Magnetic Analysis with Active Sensor. In: Proceedings of Esmart, pp. 185\u2013194 (2002)"},{"key":"23_CR25","unstructured":"Schmidt, J.-M., Hutter, M.: Optical and EM Fault-Attacks on CRT-based RSA: Concrete Results. In: Posch, K.C., Wolkerstorfer, J. (eds.) Proceedings of the Austrochip 2007, October 2007, pp. 61\u201367. Verlag der Technischen Universit\u00e4t Graz (2007) ISBN 978-3-902465-87-0"},{"key":"23_CR26","unstructured":"SecureRF. SecureRF - Secure RFID Solutions, http:\/\/www.securerf.com"},{"key":"23_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/3-540-36400-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S.P. Skorobogatov","year":"2003","unstructured":"Skorobogatov, S.P., Anderson, R.J.: Optical Fault Induction Attacks. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 2\u201312. Springer, Heidelberg (2003)"},{"key":"23_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/11733447_16","volume-title":"Smart Card Research and Advanced Applications","author":"F.-X. Standaert","year":"2006","unstructured":"Standaert, F.-X., Piret, G., Gershenfeld, N., Quisquater, J.-J.: SEA: a Scalable Encryption Algorithm for Small Embedded Applications. In: Domingo-Ferrer, J., Posegga, J., Schreckling, D. (eds.) CARDIS 2006. LNCS, vol.\u00a03928, pp. 222\u2013236. Springer, Heidelberg (2006)"},{"key":"23_CR29","doi-asserted-by":"crossref","unstructured":"Tan, K., Tan, S., Ong, S.: Functional failure analysis on analog device by optical beam induced current technique. In: Proceedings of the 1997 6th International Symposium on Physical & Failure Analysis of Integrated Circuits, 1997, pp. 296\u2013301. IEEExplore (July 1997)","DOI":"10.1109\/IPFA.1997.638367"},{"key":"23_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/11605805_8","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"P. Tuyls","year":"2006","unstructured":"Tuyls, P., Batina, L.: RFID-Tags for Anti-counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol.\u00a03860, pp. 115\u2013131. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems \u2013 CHES 2008"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85053-3_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:21:16Z","timestamp":1606166476000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85053-3_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540850526","9783540850533"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85053-3_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}