{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:38:14Z","timestamp":1761647894413},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642252822"},{"type":"electronic","value":"9783642252839"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-25283-9_17","type":"book-chapter","created":{"date-parts":[[2011,11,17]],"date-time":"2011-11-17T11:31:18Z","timestamp":1321529478000},"page":"253-270","source":"Crossref","is-referenced-by-count":14,"title":["Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software"],"prefix":"10.1007","author":[{"given":"Jean-Fran\u00e7ois","family":"Gallais","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Johann","family":"Gro\u00dfsch\u00e4dl","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Neil","family":"Hanley","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Markus","family":"Kasper","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marcel","family":"Medwed","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Francesco","family":"Regazzoni","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"J\u00f6rn-Marc","family":"Schmidt","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Stefan","family":"Tillich","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marcin","family":"W\u00f3jcik","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"17_CR1","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1109\/SP.2007.36","volume-title":"Proceedings of the 28th IEEE Symposium on Security and Privacy (S&P 2007)","author":"D. Agrawal","year":"2007","unstructured":"Agrawal, D., Bakt\u0131r, S., Karakoyunlu, D., Rohatgi, P., Sunar, B.: Trojan detection using IC fingerprinting. In: Proceedings of the 28th IEEE Symposium on Security and Privacy (S&P 2007), pp. 296\u2013310. IEEE Computer Society Press, Los Alamitos (2007)"},{"key":"17_CR2","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/HST.2010.5513117","volume-title":"Proceedings of the 3rd IEEE International Workshop on Hardware-Oriented Security and Trust (HOST 2010)","author":"G.T. Becker","year":"2010","unstructured":"Becker, G.T., Kasper, M., Moradi, A., Paar, C.: Side-channel based watermarks for integrated circuits. In: Proceedings of the 3rd IEEE International Workshop on Hardware-Oriented Security and Trust (HOST 2010), pp. 30\u201335. IEEE Computer Society Press, Los Alamitos (2010)"},{"key":"17_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/BFb0053428","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Bellare","year":"1995","unstructured":"Bellare, M., Rogaway, P.: Optimal asymmetric encryption. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 92\u2013111. Springer, Heidelberg (1995)"},{"key":"17_CR4","unstructured":"Bernstein, D.J.: Cache-timing attacks on AES (2005) (preprint), http:\/\/cr.yp.to\/papers.html#cachetiming"},{"key":"17_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/978-3-540-85174-5_13","volume-title":"Advances in Cryptology \u2013 CRYPTO 2008","author":"E. Biham","year":"2008","unstructured":"Biham, E., Carmeli, Y., Shamir, A.: Bug attacks. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol.\u00a05157, pp. 221\u2013240. Springer, Heidelberg (2008)"},{"key":"17_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"E. Biham","year":"1997","unstructured":"Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 513\u2013525. Springer, Heidelberg (1997)"},{"key":"17_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"D. Boneh","year":"1997","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 37\u201351. Springer, Heidelberg (1997)"},{"key":"17_CR8","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1109\/HLDVT.2009.5340158","volume-title":"Proceedings of the 14th IEEE International High Level Design Validation and Test Workshop (HLDVT 2009)","author":"R.S. Chakraborty","year":"2009","unstructured":"Chakraborty, R.S., Narasimhan, S., Bhunia, S.K.: Hardware Trojan: Threats and emerging solutions. In: Proceedings of the 14th IEEE International High Level Design Validation and Test Workshop (HLDVT 2009), pp. 166\u2013171. IEEE Computer Society Press, Los Alamitos (2009)"},{"key":"17_CR9","unstructured":"Choukri, H., Tunstall, M.: Round reduction using faults. In: Proceedings of the 2nd Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2005), pp. 13\u201324 (2005)"},{"key":"17_CR10","unstructured":"Defense Science Board Task Force. High performance microchip supply. Technical report, Defense Science Board (DSB), Washington, DC, USA (February 2005), http:\/\/www.acq.osd.mil\/dsb\/reports\/ADA435563.pdf"},{"key":"17_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/978-3-540-45203-4_23","volume-title":"Applied Cryptography and Network Security","author":"P. Dusart","year":"2003","unstructured":"Dusart, P., Letourneux, G., Vivolo, O.: Differential fault analysis on A.E.S. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol.\u00a02846, pp. 293\u2013306. Springer, Heidelberg (2003)"},{"key":"17_CR12","unstructured":"Gladman, B.R.: A specification for Rijndael, the AES algorithm. Algorithm specification (2007), http:\/\/gladman.plushost.co.uk\/oldsite\/cryptography_technology\/rijndael\/aes.spec.v316.pdf"},{"key":"17_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-642-14423-3_13","volume-title":"Information, Security and Cryptology \u2013 ICISC 2009","author":"J. Gro\u00dfsch\u00e4dl","year":"2010","unstructured":"Gro\u00dfsch\u00e4dl, J., Oswald, E., Page, D., Tunstall, M.: Side-channel analysis of cryptographic software via early-terminating multiplications. In: Lee, D., Hong, S. (eds.) ICISC 2009. LNCS, vol.\u00a05984, pp. 176\u2013192. Springer, Heidelberg (2010)"},{"key":"17_CR14","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/HST.2009.5224971","volume-title":"Proceedings of the 2nd IEEE International Workshop on Hardware-Oriented Security and Trust (HOST 2009)","author":"Y. Jin","year":"2009","unstructured":"Jin, Y., Kupp, N., Makris, Y.: Experiences in hardware Trojan design and implementation. In: Proceedings of the 2nd IEEE International Workshop on Hardware-Oriented Security and Trust (HOST 2009), pp. 50\u201357. IEEE Computer Society Press, Los Alamitos (2009)"},{"issue":"1","key":"17_CR15","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MDT.2010.21","volume":"27","author":"Y. Jin","year":"2010","unstructured":"Jin, Y., Makris, Y.: Hardware Trojans in wireless cryptographic ICs. IEEE Design and Test of Computers\u00a027(1), 26\u201335 (2010)","journal-title":"IEEE Design and Test of Computers"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"King, S.T., Tucek, J., Cozzie, A., Grier, C., Jiang, W., Zhou, Y.: Designing and implementing malicious hardware. In: Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 2008), pp. 1\u20138. USENIX Association (2008)","DOI":"10.1145\/1346281.2181012"},{"key":"17_CR17","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1145\/1687399.1687425","volume-title":"Proceedings of the 27th IEEE\/ACM International Conference on Computer-Aided Design (ICCAD 2009)","author":"L. Lin","year":"2009","unstructured":"Lin, L., Burleson, W.P., Paar, C.: MOLES: Malicious off-chip leakage enabled by side-channels. In: Proceedings of the 27th IEEE\/ACM International Conference on Computer-Aided Design (ICCAD 2009), pp. 117\u2013122. ACM Press, New York (2009)"},{"key":"17_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1007\/978-3-642-04138-9_27","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"L. Lin","year":"2009","unstructured":"Lin, L., Kasper, M., G\u00fcneysu, T., Paar, C., Burleson, W.P.: Trojan side-channels: Lightweight hardware trojans through side-channel engineering. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol.\u00a05747, pp. 382\u2013395. Springer, Heidelberg (2009)"},{"key":"17_CR19","volume-title":"Power Analysis Attacks: Revealing the Secrets of Smart Cards","author":"S. Mangard","year":"2007","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer, Heidelberg (2007)"},{"issue":"1","key":"17_CR20","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/TIT.1978.1055817","volume":"24","author":"S.C. Pohlig","year":"1978","unstructured":"Pohlig, S.C., Hellman, M.E.: An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Transactions on Information Theory\u00a024(1), 106\u2013110 (1978)","journal-title":"IEEE Transactions on Information Theory"},{"key":"17_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-540-45238-6_7","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"J.-J. Quisquater","year":"2003","unstructured":"Quisquater, J.-J., Piret, G.: A differential fault attack technique against SPN structures, with application to the AES and KHAZAD. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 77\u201388. Springer, Heidelberg (2003)"},{"issue":"2","key":"17_CR22","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"key":"17_CR23","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/FDTC.2009.37","volume-title":"Proceedings of the 6th International Workshop on Fault Diagnosis and Tolerance in Cryptography (FDT 2009)","author":"J.-M. Schmidt","year":"2009","unstructured":"Schmidt, J.-M., Hutter, M., Plos, T.: Optical fault attacks on AES: A threat in violet. In: Proceedings of the 6th International Workshop on Fault Diagnosis and Tolerance in Cryptography (FDT 2009), pp. 13\u201322. IEEE Computer Society Press, Los Alamitos (2009)"},{"key":"17_CR24","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1109\/FDTC.2009.38","volume-title":"Proceedings of the 6th International Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2009)","author":"J.-M. Schmidt","year":"2009","unstructured":"Schmidt, J.-M., Medwed, M.: A fault attack on ECDSA. In: Proceedings of the 6th International Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2009), pp. 93\u201399. IEEE Computer Society Press, Los Alamitos (2009)"},{"issue":"1","key":"17_CR25","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MDT.2010.7","volume":"27","author":"M. Tehranipoor","year":"2010","unstructured":"Tehranipoor, M., Koushanfar, F.: A survey of hardware Trojan taxonomy and detection. IEEE Design and Test of Computers\u00a027(1), 10\u201325 (2010)","journal-title":"IEEE Design and Test of Computers"},{"key":"17_CR26","unstructured":"Trusted Computing Group. TCG Specification Architecture Overview (Revision 1.2) (2004), https:\/\/www.trustedcomputinggroup.org\/groups\/TCG_1_0_Architecture_Overview.pdf"},{"key":"17_CR27","doi-asserted-by":"crossref","unstructured":"Tunstall, M., Mukhopadhyay, D.: Differential fault analysis of the Advanced Encryption Standard using a single fault. Cryptology ePrint Archive, Report 2009\/575 (2009), http:\/\/www.eprint.iacr.org","DOI":"10.1007\/978-3-642-02384-2_26"},{"key":"17_CR28","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1109\/SP.2010.19","volume-title":"Proceedings of the 31st IEEE Symposium on Security and Privacy (S&P 2010)","author":"A. Waksman","year":"2010","unstructured":"Waksman, A., Sethumadhavan, S.: Tamper evident microprocessors. In: Proceedings of the 31st IEEE Symposium on Security and Privacy (S&P 2010), pp. 173\u2013188. IEEE Computer Society Press, Los Alamitos (2010)"},{"key":"17_CR29","doi-asserted-by":"crossref","first-page":"1362","DOI":"10.1145\/1403375.1403703","volume-title":"Proceedings of the 11th Conference on Design, Automation and Test in Europe (DATE 2008)","author":"F.G. Wolff","year":"2008","unstructured":"Wolff, F.G., Papachristou, C.A., Bhunia, S.K., Chakraborty, R.S.: Towards Trojan-free trusted ICs: Problem analysis and detection scheme. In: Proceedings of the 11th Conference on Design, Automation and Test in Europe (DATE 2008), pp. 1362\u20131365. IEEE Computer Society Press, Los Alamitos (2008)"},{"key":"17_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/3-540-68697-5_8","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"A. Young","year":"1996","unstructured":"Young, A., Yung, M.: The dark side of \u201cBlack-box\u201d cryptography, or: Should we trust capstone? In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 89\u2013103. Springer, Heidelberg (1996)"}],"container-title":["Lecture Notes in Computer Science","Trusted Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25283-9_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,11]],"date-time":"2023-06-11T01:51:47Z","timestamp":1686448307000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25283-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642252822","9783642252839"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25283-9_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}