{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:39:16Z","timestamp":1725561556532},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642147111"},{"type":"electronic","value":"9783642147128"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14712-8_17","type":"book-chapter","created":{"date-parts":[[2010,7,29]],"date-time":"2010-07-29T05:17:50Z","timestamp":1280380670000},"page":"273-293","source":"Crossref","is-referenced-by-count":22,"title":["Defeating Any Secret Cryptography with SCARE Attacks"],"prefix":"10.1007","author":[{"given":"Sylvain","family":"Guilley","sequence":"first","affiliation":[]},{"given":"Laurent","family":"Sauvage","sequence":"additional","affiliation":[]},{"given":"Julien","family":"Micolod","sequence":"additional","affiliation":[]},{"given":"Denis","family":"R\u00e9al","sequence":"additional","affiliation":[]},{"given":"Fr\u00e9d\u00e9ric","family":"Valette","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/978-3-540-77360-3_8","volume-title":"Selected Areas in Cryptography","author":"F. Amiel","year":"2007","unstructured":"Amiel, F., Feix, B., Villegas, K.: Power analysis for secret recovering and reverse engineering of public key algorithms. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, vol.\u00a04876, pp. 110\u2013125. Springer, Heidelberg (2007)"},{"key":"17_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/BFb0028165","volume-title":"Security Protocols","author":"R.J. Anderson","year":"1998","unstructured":"Anderson, R.J., Kuhn, M.G.: Low Cost Attacks on Tamper Resistant Devices. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol.\u00a01361, pp. 125\u2013136. Springer, Heidelberg (1998)"},{"key":"17_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44706-7_1","volume-title":"Fast Software Encryption","author":"A. Biryukov","year":"2001","unstructured":"Biryukov, A., Shamir, A., Wagner, D.: Real Time Cryptanalysis of A5\/1 on a PC. In: Schneier, B. (ed.) FSE 2000. LNCS, vol.\u00a01978, pp. 1\u201318. Springer, Heidelberg (2001)"},{"key":"17_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"\u00c9. Brier","year":"2004","unstructured":"Brier, \u00c9., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 16\u201329. Springer, Heidelberg (2004)"},{"key":"17_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-36400-5_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S. Chari","year":"2003","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template Attacks. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 13\u201328. Springer, Heidelberg (2003)"},{"key":"17_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-540-77086-2_11","volume-title":"Information Systems Security","author":"C. Clavier","year":"2007","unstructured":"Clavier, C.: An Improved SCARE Cryptanalysis Against a Secret A3\/A8 GSM Algorithm. In: McDaniel, P., Gupta, S.K. (eds.) ICISS 2007. LNCS, vol.\u00a04812, pp. 143\u2013155. Springer, Heidelberg (2007)"},{"key":"17_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1007\/11496137_27","volume-title":"Applied Cryptography and Network Security","author":"R. Daudigny","year":"2005","unstructured":"Daudigny, R., Ledig, H., Muller, F., Valette, F.: SCARE of the DES. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol.\u00a03531, pp. 393\u2013406. Springer, Heidelberg (2005)"},{"key":"17_CR8","unstructured":"Dinur, I., Shamir, A.: Side Channel Cube Attacks on Block Ciphers. Cryptology ePrint Archive, Report 2009\/127 (March 2009), \n                    \n                      http:\/\/eprint.iacr.org\/"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Fournigault, M., Liardet, P.-Y., Teglia, Y., Tr\u00e9meau, A., Robert-Inacio, F.: Reverse Engineering of Embedded Software Using Syntactic Pattern Recognition. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol.\u00a04277, pp. 527\u2013536. Springer, Heidelberg (2006), doi:10.1007\/11915034","DOI":"10.1007\/11915034"},{"key":"17_CR10","volume-title":"IEEE Symposium on Security and Privacy \u2014 S&P \u201909","author":"F.D. Garcia","year":"2009","unstructured":"Garcia, F.D., van Rossum, P., Verdult, R., Schreur, R.W.: Wirelessly Pickpocketing a Mifare Classic Card. In: IEEE Symposium on Security and Privacy \u2014 S&P \u201909, Oakland, California, USA, May 2009. IEEE, Los Alamitos (2009)"},{"key":"17_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/978-3-540-85053-3_27","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"B. Gierlichs","year":"2008","unstructured":"Gierlichs, B., Batina, L., Tuyls, P., Preneel, B.: Mutual information analysis. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol.\u00a05154, pp. 426\u2013442. Springer, Heidelberg (2008)"},{"key":"17_CR12","unstructured":"Goldack, M.: Side Channel Based Reverse Engineering for Microcontrollers. Ruhr-Universit\u00e4t-Bochum, Germany (January 2008), \n                    \n                      http:\/\/www.crypto.ruhr-uni-bochum.de\/en_theses.html"},{"key":"17_CR13","unstructured":"Guilley, S., Hoogvorst, P., Pacalet, R., Schmidt, J.: Improving Side-Channel Attacks by Exploiting Substitution Boxes Properties. In: BFCA, Paris, France, May 02-04, pp. 1\u201325 (2007), \n                    \n                      http:\/\/www.liafa.jussieu.fr\/bfca\/\n                    \n                    \n                  , \n                    \n                      http:\/\/www.liafa.jussieu.fr\/bfca\/books\/BFCA07.pdf"},{"key":"17_CR14","first-page":"5","volume":"9","author":"A. Kerckhoffs","year":"1883","unstructured":"Kerckhoffs, A.: La cryptographie militaire (1). Journal des sciences militaires\u00a09, 5\u201338 (1883), \n                    \n                      http:\/\/en.wikipedia.org\/wiki\/Kerckhoffs_law","journal-title":"Journal des sciences militaires"},{"issue":"2","key":"17_CR15","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1109\/TCAD.2006.884574","volume":"26","author":"I. Kuon","year":"2007","unstructured":"Kuon, I., Rose, J.: Measuring the Gap Between FPGAs and ASICs. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems\u00a026(2), 203\u2013215 (2007)","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"key":"17_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/11894063_14","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"T.-H. Le","year":"2006","unstructured":"Le, T.-H., Cl\u00e9di\u00e8re, J., Canovas, C., Robisson, B., Servi\u00e8re, C., Lacoume, J.-L.: A Proposition for Correlation Power Analysis Enhancement. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol.\u00a04249, pp. 174\u2013186. Springer, Heidelberg (2006)"},{"key":"17_CR17","unstructured":"Nohl, K., Evans, D., Starbug, Pl\u00f6tz, H.: Reverse-Engineering a Cryptographic RFID Tag. In: van Oorschot, P.C. (ed.) USENIX Security Symposium, San Jose, CA, USA, July 28-August 1, pp. 185\u2013194. USENIX Association"},{"key":"17_CR18","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"FSE 2010","author":"K. Nohl","year":"2010","unstructured":"Nohl, K., Tews, E., Weinmann, R.-P.: Cryptanalysis of the DECT Standard Cipher. In: Hong, S., Iwata, T. (eds.) FSE 2010. LNCS, vol.\u00a06147, pp. 1\u201318. Springer, Heidelberg (2010)"},{"key":"17_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/978-3-540-45203-4_24","volume-title":"Applied Cryptography and Network Security","author":"R. Novak","year":"2003","unstructured":"Novak, R.: Side-channel attack on substitution blocks. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol.\u00a02846, pp. 307\u2013318. Springer, Heidelberg (2003)"},{"key":"17_CR20","unstructured":"Novak, R.: Side-channel based reverse engineering of secret algorithms. In: Zajc, B. (ed.) Proceedings of the Twelfth International Electrotechnical and Computer Science Conference (ERK 2003), Ljubljana, Slovenia, September 25-26, pp. 445\u2013448. Slovenska sekcija IEEE (2003)"},{"key":"17_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/978-3-540-24591-9_16","volume-title":"Information Security Applications","author":"R. Novak","year":"2004","unstructured":"Novak, R.: Sign-based differential power analysis. In: Chae, K.-J., Yung, M. (eds.) WISA 2003. LNCS, vol.\u00a02908, pp. 203\u2013216. Springer, Heidelberg (2004)"},{"key":"17_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-540-85893-5_16","volume-title":"Smart Card Research and Advanced Applications","author":"D. R\u00e9al","year":"2008","unstructured":"R\u00e9al, D., Dubois, V., Guilloux, A.-M., Valette, F., Drissi, M.: SCARE of an Unknown Hardware Feistel Implementation. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol.\u00a05189, pp. 218\u2013227. Springer, Heidelberg (2008)"},{"key":"17_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/11545262_3","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"W. Schindler","year":"2005","unstructured":"Schindler, W., Lemke, K., Paar, C.: A Stochastic Model for Differential Side Channel Cryptanalysis. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol.\u00a03659, pp. 30\u201346. Springer, Heidelberg (2005)"},{"key":"17_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1007\/978-3-540-28632-5_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"F.-X. Standaert","year":"2004","unstructured":"Standaert, F.-X., \u00d6rs, S.B., Preneel, B.: Power analysis of an FPGA. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 30\u201344. Springer, Heidelberg (2004)"},{"key":"17_CR25","doi-asserted-by":"crossref","unstructured":"Standaert, F.-X., Peeters, \u00c9., Rouvroy, G., Quisquater, J.-J.: An Overview of Power Analysis Attacks Against Field Programmable Gate Arrays. Proceedings of the IEEE\u00a094(2), 383\u2013394 (2006) (invited Paper)","DOI":"10.1109\/JPROC.2005.862437"},{"key":"17_CR26","unstructured":"TELECOM ParisTech SEN research group. DPA Contest, 1st edn. (2008\/2009) \n                    \n                      http:\/\/www.DPAcontest.org\/"},{"key":"17_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/978-3-540-72354-7_12","volume-title":"Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems","author":"D. Vermoen","year":"2007","unstructured":"Vermoen, D., Witteman, M. F., Gaydadjiev, G.: Reverse Engineering Java Card Applets using Power Analysis. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. LNCS, vol.\u00a04462, pp. 138\u2013149. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 LATINCRYPT 2010"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14712-8_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T16:49:25Z","timestamp":1558284565000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14712-8_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642147111","9783642147128"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14712-8_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}