{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:59:24Z","timestamp":1725551964538},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642125096"},{"type":"electronic","value":"9783642125102"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12510-2_4","type":"book-chapter","created":{"date-parts":[[2010,4,9]],"date-time":"2010-04-09T23:43:16Z","timestamp":1270856596000},"page":"36-48","source":"Crossref","is-referenced-by-count":13,"title":["Side-Channel Leakage across Borders"],"prefix":"10.1007","author":[{"given":"J\u00f6rn-Marc","family":"Schmidt","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Plos","sequence":"additional","affiliation":[]},{"given":"Mario","family":"Kirschbaum","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Hutter","sequence":"additional","affiliation":[]},{"given":"Marcel","family":"Medwed","sequence":"additional","affiliation":[]},{"given":"Christoph","family":"Herbst","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P.C. Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"4_CR2","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Investigations of Power Analysis Attacks on Smartcards. In: USENIX Workshop on Smartcard Technology (Smartcard 1999), May 1999, pp. 151\u2013162 (1999)"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/978-3-540-45238-6_4","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"S.B. \u00d6rs","year":"2003","unstructured":"\u00d6rs, S.B., Oswald, E., Preneel, B.: Power-Analysis Attacks on FPGAs \u2013 First Experimental Results. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 35\u201350. Springer, Heidelberg (2003)"},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/978-3-540-74735-2_22","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"M. Hutter","year":"2007","unstructured":"Hutter, M., Mangard, S., Feldhofer, M.: Power and EM Attacks on Passive 13.56 MHz RFID Devices. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 320\u2013333. Springer, Heidelberg (2007)"},{"key":"4_CR5","volume-title":"Power Analysis Attacks \u2013 Revealing the Secrets of Smart Cards","author":"S. Mangard","year":"2007","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks \u2013 Revealing the Secrets of Smart Cards. Springer, Heidelberg (2007), ISBN 978-0-387-30857-9"},{"key":"4_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/3-540-36400-5_4","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"D. Agrawal","year":"2003","unstructured":"Agrawal, D., Archambeault, B., Rao, J.R., Rohatgi, P.: The EM Side-channel(s). In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 29\u201345. Springer, Heidelberg (2003)"},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-44709-1_21","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2001","author":"K. Gandolfi","year":"2001","unstructured":"Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic Analysis: Concrete Results. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.\u00a02162, pp. 251\u2013261. Springer, Heidelberg (2001)"},{"key":"4_CR8","first-page":"403","volume-title":"Proceedings of 28th European Solid-State Circuits Conference - ESSCIRC 2002","author":"K. Tiri","year":"2002","unstructured":"Tiri, K., Akmal, M., Verbauwhede, I.: A Dynamic and Differential CMOS Logic with Signal Independent Power Consumption to Withstand Differential Power Analysis on Smart Cards. In: Proceedings of 28th European Solid-State Circuits Conference - ESSCIRC 2002, Florence, Italy, September 24-26, pp. 403\u2013406. IEEE, Los Alamitos (2002)"},{"key":"4_CR9","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1109\/DATE.2004.1268856","volume-title":"2004 Design, Automation and Test in Europe Conference and Exposition (DATE 2004)","author":"K. Tiri","year":"2004","unstructured":"Tiri, K., Verbauwhede, I.: A Logic Level Design Methodology for a Secure DPA Resistant ASIC or FPGA Implementation. In: 2004 Design, Automation and Test in Europe Conference and Exposition (DATE 2004), Paris, France, February 16-20, vol.\u00a01, pp. 246\u2013251. IEEE Computer Society, Los Alamitos (2004)"},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/11545262_13","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"T. Popp","year":"2005","unstructured":"Popp, T., Mangard, S.: Masked Dual-Rail Pre-Charge Logic: DPA-Resistance without Routing Constraints. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol.\u00a03659, pp. 172\u2013186. Springer, Heidelberg (2005)"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/3-540-45472-1_12","volume-title":"Financial Cryptography","author":"J.S. Coron","year":"2001","unstructured":"Coron, J.S., Kocher, P.C., Naccache, D.: Statistics and Secret Leakage. In: Frankel, Y. (ed.) FC 2000. LNCS, vol.\u00a01962, pp. 157\u2013173. Springer, Heidelberg (2001)"},{"key":"4_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/3-540-44499-8_5","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2000","author":"A. Shamir","year":"2000","unstructured":"Shamir, A.: Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies. In: Paar, C., Ko\u00e7, \u00c7.K. (eds.) CHES 2000. LNCS, vol.\u00a01965, pp. 71\u201377. Springer, Heidelberg (2000)"},{"key":"4_CR13","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/ICASIC.2005.1611251","volume-title":"Proceedings of the 6th International Conference on ASIC (ASICON 2005)","author":"P. Corsonello","year":"2005","unstructured":"Corsonello, P., Perri, S., Margala, M.: A New Charge-Pump Based Countermeasure Against Differential Power Analysis. In: Proceedings of the 6th International Conference on ASIC (ASICON 2005), vol.\u00a01, pp. 66\u201369. IEEE, Los Alamitos (2005)"},{"key":"4_CR14","unstructured":"Oren, Y., Shamir, A.: How not to protect pcs from power analysis. Rump Session, Crypto 2006 (August 2006), \n                    \n                      http:\/\/iss.oy.ne.ro\/HowNotToProtectPCsFromPowerAnalysis.pdf"},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1007\/978-3-642-00862-7_30","volume-title":"Topics in Cryptology \u2013 CT-RSA 2009","author":"T. Plos","year":"2009","unstructured":"Plos, T.: Evaluation of the Detached Power Supply as Side-Channel Analysis Countermeasure for Passive UHF RFID Tags. In: Fischlin, M. (ed.) RSA Conference 2009. LNCS, vol.\u00a05473, pp. 444\u2013458. Springer, Heidelberg (2009)"},{"key":"4_CR16","series-title":"VLSI Systems Series","volume-title":"Principles of CMOS VLSI Design - A Systems Perspective","author":"N.H.E. Weste","year":"1993","unstructured":"Weste, N.H.E., Eshraghian, K.: Principles of CMOS VLSI Design - A Systems Perspective, 2nd edn. VLSI Systems Series. Addison-Wesley, Reading (1993) (reprinted with corrections October 1994), ISBN 0-201-53376-6","edition":"2"},{"key":"4_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"E. Brier","year":"2004","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 16\u201329. Springer, Heidelberg (2004)"},{"key":"4_CR18","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1109\/ITCC.2004.1286711","volume-title":"Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC 2004)","author":"S.B. \u00d6rs","year":"2004","unstructured":"\u00d6rs, S.B., G\u00fcrkaynak, F.K., Oswald, E., Preneel, B.: Power-Analysis Attack on an ASIC AES Implementation. In: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC 2004), Las Vegas, Nevada, USA, April 5-7, vol.\u00a02, pp. 546\u2013552. IEEE Computer Society, Los Alamitos (2004)"},{"key":"4_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1007\/978-3-540-28632-5_12","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"K. Schramm","year":"2004","unstructured":"Schramm, K., Leander, G., Felke, P., Paar, C.: A Collision-Attack on AES: Combining Side Channel- and Differential-Attack. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 163\u2013175. Springer, Heidelberg (2004)"},{"key":"4_CR20","unstructured":"United Microelectronics Corporation: The United Microelectronics Corporation Website, \n                    \n                      http:\/\/www.umc.com\/"},{"key":"4_CR21","unstructured":"Faraday Technology Corporation: Faraday FSA0A_C 0.18 \u03bcm ASIC Standard Cell Library (2004), \n                    \n                      http:\/\/www.faraday-tech.com\n                    \n                    \n                  ."},{"issue":"4","key":"4_CR22","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1109\/TC.2003.1190589","volume":"52","author":"S. Mangard","year":"2003","unstructured":"Mangard, S., Aigner, M., Dominikus, S.: A Highly Regular and Scalable AES Hardware Architecture. IEEE Transactions on Computers\u00a052(4), 483\u2013491 (2003)","journal-title":"IEEE Transactions on Computers"},{"key":"4_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/3-540-45760-7_6","volume-title":"Topics in Cryptology - CT-RSA 2002","author":"J. Wolkerstorfer","year":"2002","unstructured":"Wolkerstorfer, J., Oswald, E., Lamberger, M.: An ASIC implementation of the AES SBoxes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol.\u00a02271, pp. 67\u201378. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Application"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12510-2_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T11:42:15Z","timestamp":1619782935000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12510-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642125096","9783642125102"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12510-2_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}