{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T06:59:19Z","timestamp":1760079559810},"publisher-location":"Berlin, Heidelberg","reference-count":62,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642252822"},{"type":"electronic","value":"9783642252839"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-25283-9_18","type":"book-chapter","created":{"date-parts":[[2011,11,17]],"date-time":"2011-11-17T11:31:18Z","timestamp":1321529478000},"page":"271-289","source":"Crossref","is-referenced-by-count":8,"title":["An Emerging Threat: Eve Meets a Robot"],"prefix":"10.1007","author":[{"given":"Kahraman D.","family":"Akdemir","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Deniz","family":"Karakoyunlu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Taskin","family":"Padir","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Berk","family":"Sunar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"18_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/978-3-642-10838-9_17","volume-title":"Information Security Applications","author":"K.D. Akdemir","year":"2009","unstructured":"Akdemir, K.D., Hammouri, G., Sunar, B.: Non-linear Error Detection for Finite State Machines. In: Youm, H.Y., Yung, M. (eds.) WISA 2009. LNCS, vol.\u00a05932, pp. 226\u2013238. Springer, Heidelberg (2009)"},{"key":"18_CR2","unstructured":"Aldebaran Robotics, http:\/\/www.aldebaran-robotics.com\/en\/"},{"key":"18_CR3","unstructured":"Anderson, R., Kuhn, M.: Tamper Resistance\u2013a Cautionary Note. In: The Second USENIX Workshop on Electronic Commerce, Oakland, CA, USA, vol.\u00a02, pp. 1\u201311 (1996)"},{"key":"18_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/BFb0028165","volume-title":"Security Protocols","author":"R. Anderson","year":"1998","unstructured":"Anderson, R., Kuhn, M.: Low Cost Attacks on Tamper Resistant Devices. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol.\u00a01361, pp. 125\u2013136. Springer, Heidelberg (1998)"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Asonov, D., Agrawal, R.: Keyboard acoustic emanations. In: IEEE Symposium on Security and Privacy, pp. 3\u201311. Citeseer (2004)","DOI":"10.1109\/SECPRI.2004.1301311"},{"key":"18_CR6","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1109\/JPROC.2005.862424","volume":"94","author":"H. Bar-El","year":"2006","unstructured":"Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The sorcerer\u2019s apprentice guide to fault attacks. Proceedings of the IEEE\u00a094, 370\u2013382 (2006)","journal-title":"Proceedings of the IEEE"},{"issue":"4","key":"18_CR7","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1109\/TC.2003.1190590","volume":"52","author":"G. Bertoni","year":"2003","unstructured":"Bertoni, G., Breveglieri, L., Koren, I., Maistri, P., Piuri, V.: Error analysis and detection procedures for a hardware implementation of the advanced encryption standard. IEEE Transactions on Computers\u00a052(4), 492\u2013505 (2003)","journal-title":"IEEE Transactions on Computers"},{"key":"18_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"D. Boneh","year":"1997","unstructured":"Boneh, D., DeMillo, R., Lipton, R.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 37\u201351. Springer, Heidelberg (1997)"},{"key":"18_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-36400-5_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S. Chari","year":"2003","unstructured":"Chari, S., Rao, J., Rohatgi, P.: Template Attacks. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 13\u201328. Springer, Heidelberg (2003)"},{"key":"18_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/3-540-44499-8_20","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2000","author":"C. Clavier","year":"2000","unstructured":"Clavier, C., Coron, J., Dabbous, N.: Differential Power Analysis in the Presence of Hardware Countermeasures. In: Paar, C., Ko\u00e7, \u00c7.K. (eds.) CHES 2000. LNCS, vol.\u00a01965, pp. 252\u2013263. Springer, Heidelberg (2000)"},{"key":"18_CR11","unstructured":"Computing Community Consortium, A.R.f.U.R.F.I.t.R.: (2009), http:\/\/www.us-robotics.us"},{"key":"18_CR12","volume-title":"Proceedings of the 8th International Symposium on Asynchronus Circuits and Systems","author":"P. Cunningham","year":"2002","unstructured":"Cunningham, P., Anderson, R., Mullins, R., Taylor, G., Moore, S.: Improving Smart Card Security Using Self-Timed Circuits. In: Proceedings of the 8th International Symposium on Asynchronus Circuits and Systems. IEEE Computer Society, Washington, DC, USA (2002)"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Denning, T., Matuszek, C., Koscher, K., Smith, J., Kohno, T.: A Spotlight on Security and Privacy Risks with Future Household Robots: Attacks and Lessons. In: Proceedings of the 11th International Conference on Ubiquitous Computing (Ubicomp 2009), Orlando, FL, USA, pp. 105\u2013114 (2009)","DOI":"10.1145\/1620545.1620564"},{"key":"18_CR14","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1145\/1516046.1516055","volume":"52","author":"K. Fu","year":"2009","unstructured":"Fu, K.: Inside risks, reducing the risks of implantable medical devices: A prescription to improve security and privacy of pervasive health care. Communications of the ACM\u00a052, 25\u201327 (2009)","journal-title":"Communications of the ACM"},{"key":"18_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-44709-1_21","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2001","author":"K. Gandolfi","year":"2001","unstructured":"Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic Analysis: Concrete Results. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.\u00a02162, pp. 251\u2013261. Springer, Heidelberg (2001)"},{"key":"18_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/11889700_18","volume-title":"Fault Diagnosis and Tolerance in Cryptography","author":"G. Gaubatz","year":"2006","unstructured":"Gaubatz, G., Sunar, B.: Robust finite field arithmetic for fault-tolerant public-key cryptography. In: Breveglieri, L., Koren, I. (eds.) FDTC 2006. LNCS, vol.\u00a04236, pp. 196\u2013210. Springer, Heidelberg (2006)"},{"issue":"1","key":"18_CR17","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/TC.2007.70784","volume":"57","author":"G. Gaubatz","year":"2008","unstructured":"Gaubatz, G., Sunar, B., Savas, E.: Sequential circuit design for embedded cryptographic applications resilient to adversarial faults. IEEE Transactions on Computers\u00a057(1), 126\u2013138 (2008)","journal-title":"IEEE Transactions on Computers"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"G\u00fcrkaynak, F., Oetiker, S., Kaeslin, H., Felber, N., Fichtner, W.: Improving DPA Security by Using Globally-Asynchronous Locally-Synchronous Systems. European Solid-State Circuits Conference (ESSCIRC 2005), Grenoble, France, pp. 407\u2013410 (2005)","DOI":"10.1109\/ESSCIR.2005.1541646"},{"key":"18_CR19","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1109\/ICAS.2009.62","volume-title":"Fifth International Conference on Autonomic and Autonomous Systems, ICAS 2009","author":"F. Higgins","year":"2009","unstructured":"Higgins, F., Tomlinson, A., Martin, K.: Survey on Security Challenges for Swarm Robotics. In: Fifth International Conference on Autonomic and Autonomous Systems, ICAS 2009, pp. 307\u2013312. IEEE, Los Alamitos (2009)"},{"key":"18_CR20","unstructured":"General purpose type distance measuring sensors. SparkFun Database (December 2009), http:\/\/www.sparkfun.com\/datasheets\/Components\/GP2Y0A21YK.pdf , http:\/\/www.sparkfun.com\/datasheets\/Components\/GP2Y0A21YK.pdf"},{"key":"18_CR21","unstructured":"Pir sensor. Parallax Database (December 2009), http:\/\/www.parallax.com\/dl\/docs\/prod\/audiovis\/pirsensor-v1.2.pdf , http:\/\/www.parallax.com\/dl\/docs\/prod\/audiovis\/pirsensor-v1.2.pdf"},{"key":"18_CR22","unstructured":"Infrared flame sensor for vex. Techno-stuff Database (December 2009), http:\/\/www.techno-stuff.com\/VIRFL.htm , http:\/\/www.techno-stuff.com\/VIRFL.htm"},{"key":"18_CR23","unstructured":"Ju, A.: Researchers raise uncomfortable questions by showing how GPS navigation devices can be duped. Cornell University Chronicle (2008), http:\/\/www.news.cornell.edu\/stories\/Sept08\/GPSSpoofing.aj.html"},{"key":"18_CR24","first-page":"93","volume-title":"DSN 2004: Proceedings of the 2004 International Conference on Dependable Systems and Networks","author":"M. Karpovsky","year":"2004","unstructured":"Karpovsky, M., Kulikowski, K., Taubin, A.: Robust protection against fault-injection attacks on smart cards implementing the advanced encryption standard. In: DSN 2004: Proceedings of the 2004 International Conference on Dependable Systems and Networks, p. 93. IEEE Computer Society, Washington, DC, USA (2004)"},{"key":"18_CR25","doi-asserted-by":"crossref","unstructured":"Karpovsky, M., Kulikowski, K.J., Taubin, A.: Differential fault analysis attack resistant architectures for the advanced encryption standard. In: Proc. World Computing Congress (2004)","DOI":"10.1007\/1-4020-8147-2_12"},{"issue":"8","key":"18_CR26","doi-asserted-by":"publisher","first-page":"1818","DOI":"10.1109\/TIT.2004.831844","volume":"50","author":"M. Karpovsky","year":"2004","unstructured":"Karpovsky, M., Taubin, A.: A new class of nonlinear systematic error detecting codes. IEEE Trans. Info Theory\u00a050(8), 1818\u20131820 (2004)","journal-title":"IEEE Trans. Info Theory"},{"issue":"12","key":"18_CR27","doi-asserted-by":"publisher","first-page":"1509","DOI":"10.1109\/TCAD.2002.804378","volume":"21","author":"R. Karri","year":"2002","unstructured":"Karri, R., Wu, K., Mishra, P., Kim, Y.: Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphers. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems\u00a021(12), 1509\u20131517 (2002)","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"key":"18_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"P. Kocher","year":"1996","unstructured":"Kocher, P.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 104\u2013113. Springer, Heidelberg (1996)"},{"key":"18_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P. Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"18_CR30","doi-asserted-by":"crossref","unstructured":"Kuhn, M.: Optical time-domain eavesdropping risks of CRT displays. In: IEEE Symposium on Security and Privacy, pp. 3\u201318. Citeseer (2002)","DOI":"10.1109\/SECPRI.2002.1004358"},{"key":"18_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/11423409_7","volume-title":"Privacy Enhancing Technologies","author":"M. Kuhn","year":"2005","unstructured":"Kuhn, M.: Electromagnetic eavesdropping risks of flat-panel displays. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol.\u00a03424, pp. 88\u2013107. Springer, Heidelberg (2005)"},{"key":"18_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11545262_20","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"M. Kuhn","year":"2005","unstructured":"Kuhn, M.: Security limits for compromising emanations. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol.\u00a03659, pp. 265\u2013279. Springer, Heidelberg (2005)"},{"key":"18_CR33","doi-asserted-by":"crossref","unstructured":"Kulikowski, K., Venkataraman, V., Wang, Z., Taubin, A., Karpovsky, M.: Asynchronous balanced gates tolerant to interconnect variability. In: IEEE International Symposium on Circuits and Systems, ISCAS 2008, pp. 3190\u20133193 (2008)","DOI":"10.1109\/ISCAS.2008.4542136"},{"key":"18_CR34","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/FDTC.2008.13","volume-title":"Proceedings of the 2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography","author":"K. Kulikowski","year":"2008","unstructured":"Kulikowski, K., Wang, Z., Karpovsky, M.: Comparative Analysis of Robust Fault Attack Resistant Architectures for Public and Private Cryptosystems. In: Proceedings of the 2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 41\u201350. IEEE Computer Society, Washington, DC, USA (2008)"},{"key":"18_CR35","doi-asserted-by":"crossref","unstructured":"Kulikowski, K., Karpovsky, M., Taubin, A.: Robust codes for fault attack resistant cryptographic hardware. In: Workshop on Fault Diagnosis and Tolerance in Cryptography (FTDC 2005) (2005)","DOI":"10.1007\/11889700_17"},{"key":"18_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/11889700_17","volume-title":"Fault Diagnosis and Tolerance in Cryptography","author":"K.J. Kulikowski","year":"2006","unstructured":"Kulikowski, K.J., Karpovsky, M.G., Taubin, A.: Fault attack resistant cryptographic hardware with uniform error detection. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2006. LNCS, vol.\u00a04236, pp. 185\u2013195. Springer, Heidelberg (2006)"},{"key":"18_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/11430230_19","volume-title":"Testing of Communicating Systems","author":"J. Lee","year":"2005","unstructured":"Lee, J., Jung, S., Lim, J.: Detecting Trapdoors in Smart Cards Using Timing and Power Analysis. In: Khendek, F., Dssouli, R. (eds.) TestCom 2005. LNCS, vol.\u00a03502, pp. 275\u2013288. Springer, Heidelberg (2005)"},{"key":"18_CR38","unstructured":"Line follower kit. VEX Robotics Database (December 2009), http:\/\/www.vexrobotics.com\/docs\/inventors-guide\/line-follower-5-1-06.pdf , http:\/\/www.vexrobotics.com\/docs\/inventors-guide\/line-follower-5-1-06.pdf"},{"issue":"11","key":"18_CR39","doi-asserted-by":"publisher","first-page":"1528","DOI":"10.1109\/TC.2008.149","volume":"57","author":"P. Maistri","year":"2008","unstructured":"Maistri, P., Leveugle, R.: Double-Data-Rate Computation as a Countermeasure against Fault Analysis. IEEE Transactions on Computers\u00a057(11), 1528\u20131539 (2008)","journal-title":"IEEE Transactions on Computers"},{"key":"18_CR40","doi-asserted-by":"crossref","unstructured":"Maistri, P., Vanhauwaert, P., Leveugle, R.: Evaluation of Register-Level Protection Techniques for the Advanced Encryption Standard by Multi-Level Fault Injections. In: 22nd IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems, DFT 2007, pp. 499\u2013507 (2007)","DOI":"10.1109\/DFT.2007.41"},{"key":"18_CR41","doi-asserted-by":"crossref","unstructured":"Matthews, A.: Low cost attacks on smart cards: The electromagnetic side-channel. Next Generation Security Software (September 2006)","DOI":"10.1016\/S1353-4858(06)70465-2"},{"key":"18_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/3-540-44706-7_11","volume-title":"Fast Software Encryption","author":"T. Messerges","year":"2001","unstructured":"Messerges, T.: Securing the AES Finalists Against Power Analysis Attacks. In: Schneier, B. (ed.) FSE 2000. LNCS, vol.\u00a01978, pp. 150\u2013164. Springer, Heidelberg (2001)"},{"key":"18_CR43","first-page":"985","volume-title":"Proc. Int. Test Conference (ITC)","author":"S. Mitra","year":"2000","unstructured":"Mitra, S., McCluskey, E.: Which concurrent error detection scheme to choose? In: Proc. Int. Test Conference (ITC), pp. 985\u2013994. IEEE, IEEE Press, Los Alamitos (2000)"},{"issue":"5","key":"18_CR44","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/MSP.2005.122","volume":"3","author":"D. Naccache","year":"2005","unstructured":"Naccache, D.: Finding faults. IEEE Security and Privacy\u00a03(5), 61\u201365 (2005)","journal-title":"IEEE Security and Privacy"},{"key":"18_CR45","unstructured":"Noubir, G.: SWARM: Secure Wireless Ad hoc Robots on Mission A course where wireless security meets robotics. In: Proceedings of the 10th Colloquium for Information Systems Security Education (CISSE 2006), Adelphi, MD, USA, pp. 82\u201389 (2006)"},{"key":"18_CR46","unstructured":"Oswald, E., Mangard, S., Pramstaller, N.: Secure and Efficient Masking of AES-A Mission Impossible. Tech. rep., Technical Report IAIK-TR 2003\/11\/1 (2004), http:\/\/www.eprint.iacr.org\/"},{"key":"18_CR47","doi-asserted-by":"crossref","unstructured":"Pramstaller, N., Gurkaynak, F., Haene, S., Kaeslin, H., Felber, N., Fichtner, W.: Towards an AES Crypto-chip Resistant to Differential Power Analysis. In: European Solid-State Circuits Conference (ESSCIRC 2004), Leuven, Belgium, pp. 307\u2013310 (2004)","DOI":"10.1109\/ESSCIR.2004.1356679"},{"key":"18_CR48","unstructured":"Quisquater, J.J., Samyde, D.: Eddy current for magnetic analysis with active sensor. In: Proceedings of Esmart, pp. 185\u2013194 (2002)"},{"key":"18_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/3-540-45418-7_17","volume-title":"Smart Card Programming and Security","author":"J. Quisquater","year":"2001","unstructured":"Quisquater, J., Samyde, D.: ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards. In: Attali, S., Jensen, T. (eds.) E-smart 2001. LNCS, vol.\u00a02140, pp. 200\u2013210. Springer, Heidelberg (2001)"},{"key":"18_CR50","doi-asserted-by":"crossref","unstructured":"Regazzoni, F., Badel, S., Eisenbarth, T., Grobschadl, J., Poschmann, A., Toprak, Z., Macchetti, M., Pozzi, L., Paar, C., Leblebici, Y., et al.: A Simulation-Based Methodology for Evaluating the DPA-Resistance of Cryptographic Functional Units with Application to CMOS and MCML Technologies. In: International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation (IC-SAMOS 2007), Samos, Greece, pp. 209\u2013214 (2007)","DOI":"10.1109\/ICSAMOS.2007.4285753"},{"key":"18_CR51","doi-asserted-by":"crossref","unstructured":"Sankai, Y.: Leading edge of cybernics: Robot suit hal. In: SICE-ICASE International Joint Conference (2006)","DOI":"10.1109\/SICE.2006.314982"},{"key":"18_CR52","unstructured":"Schmidt, J., Hutter, M.: Optical and em fault-attacks on crt-based rsa: Concrete results. In: Austrochip 2007: Proceedings of the 15th Austrian Workshop on Microelectronics (2007)"},{"key":"18_CR53","unstructured":"Schmidt, J., Hutter, M.: Optical and em fault-attacks on crt-based rsa: Concrete results. In: Proceedings of the Austrochip, pp. 61\u201367. Citeseer (2007)"},{"key":"18_CR54","unstructured":"Shamir, A., Tromer, E.: Acoustic cryptanalysis: on nosy people and noisy machines, http:\/\/www.people.csail.mit.edu\/tromer\/acoustic"},{"key":"18_CR55","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/3-540-36400-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S. Skorobogatov","year":"2003","unstructured":"Skorobogatov, S., Anderson, R.: Optical Fault Induction Attacks. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 2\u201312. Springer, Heidelberg (2003)"},{"key":"18_CR56","unstructured":"Tiri, K., Akmal, M., Verbauwhede, I.: A Dynamic and Differential CMOS Logic with Signal Independent Power Consumption to Withstand Differential Power Analysis on Smart Cards. In: European Solid-State Circuits Conference (ESSCIRC 2002), Florence, Italy, pp. 403\u2013406 (2002)"},{"key":"18_CR57","doi-asserted-by":"crossref","unstructured":"Toprak, Z., Leblebici, Y.: Low-Power Current Mode Logic for Improved DPA-Resistance in Embedded Systems. In: International Symposium on Circuits and Systems (ISCAS 2005), Kobe, Japan, vol.\u00a02, pp. 1059\u20131062 (2005)","DOI":"10.1109\/ISCAS.2005.1464774"},{"key":"18_CR58","unstructured":"Inventor\u2019s guide. VEX Robotics Database (December 2009), http:\/\/www.vexrobotics.com\/docs\/inventors-guide\/main-2008\/vex-inventors-guide-07022008.pdf , http:\/\/www.vexrobotics.com\/docs\/inventors-guide\/main-2008\/vex-inventors-guide-07022008.pdf"},{"key":"18_CR59","unstructured":"Ultrasonic sensor kit. VEX Robotics Database (December 2009), http:\/\/www.vexrobotics.com\/docs\/inventors-guide\/vex-robotics-ultra-sonic-5-2-06.pdf , http:\/\/www.vexrobotics.com\/docs\/inventors-guide\/vex-robotics-ultra-sonic-5-2-06.pdf"},{"key":"18_CR60","unstructured":"Executive Summary World Robotics 2008 (2008), http:\/\/www.worldrobotics.org\/downloads\/2008_executive_summary.pdf"},{"issue":"9","key":"18_CR61","doi-asserted-by":"publisher","first-page":"967","DOI":"10.1109\/12.869328","volume":"49","author":"S. Yen","year":"2000","unstructured":"Yen, S., Joye, M.: Checking Before Output Not Be Enough Against Fault-Based Cryptanalysis. IEEE Transactions on Computers\u00a049(9), 967\u2013970 (2000)","journal-title":"IEEE Transactions on Computers"},{"key":"18_CR62","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1145\/1102120.1102169","volume-title":"Proceedings of the 12th ACM Conference on Computer and Communications Security","author":"L. Zhuang","year":"2005","unstructured":"Zhuang, L., Zhou, F., Tygar, J.: Keyboard acoustic emanations revisited. In: Proceedings of the 12th ACM Conference on Computer and Communications Security, pp. 373\u2013382. ACM, New York (2005)"}],"container-title":["Lecture Notes in Computer Science","Trusted Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25283-9_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,16]],"date-time":"2021-12-16T19:29:39Z","timestamp":1639682979000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25283-9_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642252822","9783642252839"],"references-count":62,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25283-9_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}