{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:39:25Z","timestamp":1725518365623},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540858928"},{"type":"electronic","value":"9783540858935"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-85893-5_21","type":"book-chapter","created":{"date-parts":[[2008,8,29]],"date-time":"2008-08-29T02:28:18Z","timestamp":1219976898000},"page":"283-289","source":"Crossref","is-referenced-by-count":0,"title":["A Chemical Memory Snapshot"],"prefix":"10.1007","author":[{"given":"J\u00f6rn-Marc","family":"Schmidt","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","volume-title":"Power Analysis Attacks \u2013 Revealing the Secrets of Smart Cards","author":"S. Mangard","year":"2007","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks \u2013 Revealing the Secrets of Smart Cards. Springer, Heidelberg (2007)"},{"key":"21_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"P.C. Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 104\u2013113. Springer, Heidelberg (1996)"},{"key":"21_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"E. Biham","year":"1997","unstructured":"Biham, E., Shamir, A.: Differential Fault Analysis of Secret Key Cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 513\u2013525. Springer, Heidelberg (1997)"},{"key":"21_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"D. Boneh","year":"1997","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract). In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 37\u201351. Springer, Heidelberg (1997)"},{"key":"21_CR5","unstructured":"Anderson, R.J., Kuhn, M.G.: Tamper Resistance - a Cautionary Note. In: Second Usenix Workshop on Electronic Commerce, pp. 1\u201311 (November 1996)"},{"key":"21_CR6","unstructured":"K\u00f6mmerling, O., Kuhn, M.G.: Design Principles for Tamper-Resistant Smartcard Processors. In: USENIX Workshop on Smartcard Technology (Smartcard 1999), pp. 9\u201320 (May 1999)"},{"key":"21_CR7","first-page":"65","volume-title":"IEEE Security in Storage Workshop (SISW 2002)","author":"D. Samyde","year":"2002","unstructured":"Samyde, D., Skorobogatov, S.P., Anderson, R.J., Quisquater, J.J.: On a New Way to Read Data from Memory. In: IEEE Security in Storage Workshop (SISW 2002), pp. 65\u201369. IEEE Computer Society, Los Alamitos (2002)"},{"key":"21_CR8","unstructured":"Skorobogatov, S.: Low temperature data remanence in static RAM. Technical report, University of Cambridge Computer Laboratory (June 2002)"},{"key":"21_CR9","unstructured":"Skorobogatov, S.P.: Semi-invasive attacks - A new approach to hardware security analysis. PhD thesis, University of Cambridge - Computer Laboratory (2005), \n                  \n                    http:\/\/www.cl.cam.ac.uk\/TechReports\/"},{"key":"21_CR10","unstructured":"G\u00e4rtner, H., Hoffmann, M., Schaschke, H., Sch\u00fcrmann, I.M.: Das gro\u00dfe Buch der Chemie. Compact Verlag (2004)"},{"key":"21_CR11","volume-title":"Integrated Circuit Failure Analysis: A Guide to Preparation Techniques","author":"F. Beck","year":"1998","unstructured":"Beck, F.: Integrated Circuit Failure Analysis: A Guide to Preparation Techniques. Wiley, Chichester (1998)"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85893-5_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,2]],"date-time":"2019-03-02T23:12:24Z","timestamp":1551568344000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85893-5_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540858928","9783540858935"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85893-5_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}