{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T05:21:40Z","timestamp":1740028900475,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642123672"},{"type":"electronic","value":"9783642123689"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12368-9_5","type":"book-chapter","created":{"date-parts":[[2010,4,7]],"date-time":"2010-04-07T10:30:40Z","timestamp":1270636240000},"page":"60-75","source":"Crossref","is-referenced-by-count":0,"title":["Evaluation Metrics of Physical Non-invasive Security"],"prefix":"10.1007","author":[{"given":"Huiyun","family":"Li","sequence":"first","affiliation":[]},{"given":"Keke","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Fengqi","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Hai","family":"Yuan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Feng, D.: Side-channel attacks: Ten years after its publication and the impact on cryptographic module security testing. In: Information Security Seminar (2006)","DOI":"10.1016\/S1353-4858(06)70465-2"},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-540-24638-1_16","volume-title":"Theory of Cryptography","author":"S. Micali","year":"2004","unstructured":"Micali, S., Reyzin, L.: Physically observable cryptography. In: Naor, M. (ed.) TCC 2004. LNCS, vol.\u00a02951, pp. 278\u2013296. Springer, Heidelberg (2004)"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Standaert, F., Malkin, T., Yung, M.: A unified framework for the analysis of side-channel key recovery attacks. Cryptology ePrint Archive, Report 2006\/139 (2008)","DOI":"10.1007\/978-3-642-01001-9_26"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Mangard, S.: Hardware countermeasures against DPA - A statistical analysis of their effectiveness. In: Proceedings of the RSA Conference (2004)","DOI":"10.1007\/978-3-540-24660-2_18"},{"key":"5_CR5","unstructured":"Security requirements for cryptographic modules, FIPS PUB 140-3, draft by National Institute of Standards and Technology (2007)"},{"key":"5_CR6","unstructured":"Common Criteria for information technology security evaluation, Part III: Security assurance requirements by National Institute of Standards and Technology (1999)"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Wang, A.: Information security models and metrics. In: Proceedings of the 43rd ACM annual Southeast regional conference (2005)","DOI":"10.1145\/1167253.1167295"},{"issue":"3","key":"5_CR8","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1145\/1015047.1015049","volume":"3","author":"S. Ravi","year":"2004","unstructured":"Ravi, S., Raghunathan, A., Kocher, P., Hattangady, S.: Security in embedded systems: Design challenges. ACM Transactions on Embedded Computing Systems\u00a03(3), 461 (2004)","journal-title":"ACM Transactions on Embedded Computing Systems"},{"key":"5_CR9","unstructured":"Security requirements for cryptographic modules, FIPS PUB 140-2 by National Institute of Standards and Technology (2001)"},{"key":"5_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/3-540-48059-5_25","volume-title":"Cryptographic Hardware and Embedded Systems","author":"J. Coron","year":"1999","unstructured":"Coron, J.: Resistance against differential power analysis for elliptic curve cryptosystems. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol.\u00a01717, pp. 292\u2013302. Springer, Heidelberg (1999)"},{"key":"5_CR11","doi-asserted-by":"publisher","first-page":"1071","DOI":"10.1109\/12.956092","volume":"50","author":"M. Hasan","year":"2001","unstructured":"Hasan, M.: Power analysis attacks and algorithmic approaches to their countermeasures for koblitz curve cryptosystems. IEEE Transactions on Computers\u00a050, 1071\u20131083 (2001)","journal-title":"IEEE Transactions on Computers"},{"key":"5_CR12","unstructured":"Tiri, K., Akmal, M., Verbauwhede, I.: A dynamic and differential cmos logic with signal independent power consumption to withstand differential power analysis on smart cards. In: IEEE 28th European Solid-state Circuit Conference (ESSCIRC) (2002)"},{"key":"5_CR13","volume-title":"8th IEEE International Symposium on Asynchronous Circuits and Systems (Async)","author":"S. Moore","year":"2002","unstructured":"Moore, S., Anderson, R., Cunningham, P., Mullins, R., Taylor, G.: Improving smart card security using self-timed circuits. In: 8th IEEE International Symposium on Asynchronous Circuits and Systems (Async). IEEE Computer Society Press, Los Alamitos (2002)"},{"key":"5_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/3-540-36400-5_4","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"D. Agrawal","year":"2003","unstructured":"Agrawal, D., Archambeault, B., Rao, J., Rohatgi, P.: The em side-channel(s). In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 29\u201345. Springer, Heidelberg (2003)"},{"key":"5_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1007\/11545262_21","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"H. Li","year":"2005","unstructured":"Li, H., Markettos, T., Moore., S.: Security evaluation against electromagnetic analysis at design time. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol.\u00a03659, pp. 280\u2013292. Springer, Heidelberg (2005)"},{"key":"5_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-44709-1_21","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2001","author":"K. Gandolfi","year":"2001","unstructured":"Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: Concrete results. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.\u00a02162, pp. 251\u2013261. Springer, Heidelberg (2001)"},{"key":"5_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/3-540-45472-1_12","volume-title":"Financial Cryptography","author":"J.S. Coron","year":"2001","unstructured":"Coron, J.S., Kocher, P., Naccache., D.: Statistics and secret leakage. In: Frankel, Y. (ed.) FC 2000. LNCS, vol.\u00a01962, pp. 157\u2013173. Springer, Heidelberg (2001)"},{"key":"5_CR18","unstructured":"Miller, I., Freund, J., Johnson, R.: Probability and statistics for engineers. Prentice Hall, Englewood Cliffs (1990)"},{"issue":"4","key":"5_CR19","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1109\/6046.890058","volume":"2","author":"S. Berretti","year":"2000","unstructured":"Berretti, S., Bimbo, A.D., Pala, P.: Retrieval by shape similarity with perceptual distance and effective indexing. IEEE Transactions on Multimedia\u00a02(4), 225\u2013239 (2000)","journal-title":"IEEE Transactions on Multimedia"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Li, H., Chen, T., Wu, K., Yu, F.: Quantitative evaluation of side-channel security. In: Asia-Pacific Conference on Information Processing (APCIP) (2009)","DOI":"10.1109\/APCIP.2009.248"},{"issue":"6","key":"5_CR21","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1109\/TC.2004.13","volume":"53","author":"B. Chevallier-Mames","year":"2004","unstructured":"Chevallier-Mames, B., Ciet, M., Joye, M.: Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity. IEEE Transactions on Computers\u00a053(6), 760\u2013768 (2004)","journal-title":"IEEE Transactions on Computers"},{"key":"5_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/3-540-45664-3_24","volume-title":"Public Key Cryptography","author":"E. Brier","year":"2002","unstructured":"Brier, E., Joye, M.: Weierstrass elliptic curves and side-channel attacks. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol.\u00a02274, p. 335. Springer, Heidelberg (2002)"},{"key":"5_CR23","volume-title":"Embedded Cryptographic Hardware: Methodologies and Architectures","author":"E. Brier","year":"2004","unstructured":"Brier, E., Dechene, I., Joye., M.: Unified addition formulae for elliptic curve cryptosystems. In: Embedded Cryptographic Hardware: Methodologies and Architectures. Nova Science Publishers, Bombay (2004)"}],"container-title":["Lecture Notes in Computer Science","Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12368-9_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T21:48:44Z","timestamp":1740001724000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12368-9_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642123672","9783642123689"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12368-9_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}