{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:25:28Z","timestamp":1761675928920,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642279539"},{"type":"electronic","value":"9783642279546"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-27954-6_2","type":"book-chapter","created":{"date-parts":[[2012,2,22]],"date-time":"2012-02-22T09:23:15Z","timestamp":1329902595000},"page":"19-34","source":"Crossref","is-referenced-by-count":31,"title":["Power Analysis of Atmel CryptoMemory \u2013 Recovering Keys from Secure EEPROMs"],"prefix":"10.1007","author":[{"given":"Josep","family":"Balasch","sequence":"first","affiliation":[]},{"given":"Benedikt","family":"Gierlichs","sequence":"additional","affiliation":[]},{"given":"Roel","family":"Verdult","sequence":"additional","affiliation":[]},{"given":"Lejla","family":"Batina","sequence":"additional","affiliation":[]},{"given":"Ingrid","family":"Verbauwhede","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"AT88SC0204 ChipResetter, http:\/\/chipreset.atw.hu\/6\/index61.html"},{"key":"2_CR2","unstructured":"Coinamatic, http:\/\/www.coinamatic.com"},{"key":"2_CR3","unstructured":"ISO\/IEC 7816-3: Identification cards - integrated circuit(s) cards with contacts - part 3: Electronic signals and transmission protocols (1997)"},{"key":"2_CR4","unstructured":"Labgear HDSR300 High Definition Satellite Receiver. User Guide, http:\/\/www.free-instruction-manuals.com\/pdf\/p4789564.pdf"},{"key":"2_CR5","unstructured":"Anderson, D.: Understanding CryptoMemory - The World\u2019s Only Secure Serial EEPROM, http:\/\/www.atmel.com\/atmel\/acrobat\/doc5064.pdf"},{"key":"2_CR6","unstructured":"Atmel. CryptoMemory features, http:\/\/www.atmel.com\/microsite_cryptomemory\/iwe\/index.html?source=tout_other2"},{"key":"2_CR7","unstructured":"Atmel. CryptoMemory Specification, http:\/\/www.atmel.com\/atmel\/acrobat\/doc5211.pdf"},{"key":"2_CR8","unstructured":"Atmel. CryptoMemory Powerful Security at Low Cost, http:\/\/www.atmel.com\/atmel\/acrobat\/doc5259.pdf"},{"key":"2_CR9","unstructured":"Atmel. CryptoRF Specification, http:\/\/www.atmel.com\/atmel\/acrobat\/doc5276.pdf"},{"key":"2_CR10","unstructured":"Atmel. News Release, http:\/\/www.cryptomemorykey.com\/pdfs\/AtmelPR.pdf"},{"key":"2_CR11","unstructured":"Atmel. Secure Memory with Authentication AT88SC153, http:\/\/www.atmel.com\/atmel\/acrobat\/doc1016.pdf"},{"key":"2_CR12","unstructured":"Atmel. Secure Memory with Authentication AT88SC1608, http:\/\/www.atmel.com\/atmel\/acrobat\/doc0971.pdf"},{"key":"2_CR13","unstructured":"Atmel Corporation. Plug-and-Play Crypto Chip for Host-Side Security, http:\/\/www.atmel.com\/dyn\/corporate\/view_detail.asp?ref=&FileName=Cryptocompanion_2_26.html&SEC_NAME=Product"},{"key":"2_CR14","unstructured":"Benhammou, J.P., Jarboe, M.: Security at an affordable price. Atmel Applications Journal, 29\u201330 (2004)"},{"key":"2_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/978-3-642-21554-4_6","volume-title":"Applied Cryptography and Network Security","author":"A. Biryukov","year":"2011","unstructured":"Biryukov, A., Kizhvatov, I., Zhang, B.: Cryptanalysis of the Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF. In: Lopez, J., Tsudik, G. (eds.) ACNS 2011. LNCS, vol.\u00a06715, pp. 91\u2013109. Springer, Heidelberg (2011)"},{"key":"2_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/978-3-540-79499-8_7","volume-title":"Information Security and Cryptology","author":"A. Bogdanov","year":"2008","unstructured":"Bogdanov, A.: Linear Slide Attacks on the KeeLoq Block Cipher. In: Pei, D., Yung, M., Lin, D., Wu, C. (eds.) Inscrypt 2007. LNCS, vol.\u00a04990, pp. 66\u201380. Springer, Heidelberg (2008)"},{"key":"2_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"E. Brier","year":"2004","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 16\u201329. Springer, Heidelberg (2004)"},{"key":"2_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-36400-5_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S. Chari","year":"2003","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template Attacks. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 13\u201328. Springer, Heidelberg (2003)"},{"key":"2_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-3-540-85174-5_12","volume-title":"Advances in Cryptology \u2013 CRYPTO 2008","author":"T. Eisenbarth","year":"2008","unstructured":"Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., Shalmani, M.T.M.: On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol.\u00a05157, pp. 203\u2013220. Springer, Heidelberg (2008)"},{"key":"2_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-540-88313-5_7","volume-title":"Computer Security - ESORICS 2008","author":"F.D. Garcia","year":"2008","unstructured":"Garcia, F.D., de Koning Gans, G., Muijrers, R., van Rossum, P., Verdult, R., Schreur, R.W., Jacobs, B.: Dismantling MIFARE Classic. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol.\u00a05283, pp. 97\u2013114. Springer, Heidelberg (2008)"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Garcia, F.D., van Rossum, P., Verdult, R., Schreur, R.W.: Dismantling SecureMemory, CryptoMemory and CryptoRF. In: Keromytis, A., Shmatikov, V. (eds.) Proceedings of ACM CCS 2010, pp. 250\u2013259. ACM Press (2010)","DOI":"10.1145\/1866307.1866336"},{"key":"2_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1007\/978-3-642-02384-2_25","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2009","author":"M. Kasper","year":"2009","unstructured":"Kasper, M., Kasper, T., Moradi, A., Paar, C.: Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol.\u00a05580, pp. 403\u2013420. Springer, Heidelberg (2009)"},{"key":"2_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P.C. Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"2_CR24","unstructured":"Lee, J., Pahl, N.: Bypassing Smart-Card Authentication and Blocking Debiting: Vulnerabilities in Atmel CryptoMemory based Stored-Value Systems. DEFCON\u00a018 (2010)"},{"key":"2_CR25","unstructured":"Messerges, T.: Power analysis attack countermeasures and their weaknesses. In: CEPS Workshop (2000)"},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Moradi, A., Barenghi, A., Kasper, T., Paar, C.: On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks Extracting Keys from Xilinx Virtex-II FPGAs. In: Danezis, G., Shmatikov, V. (eds.) Proceedings of ACM CCS 2011, pp. 111\u2013124. ACM Press (2011)","DOI":"10.1145\/2046707.2046722"},{"key":"2_CR27","unstructured":"Nohl, K., Evans, D., Starbug, Pl\u00f6tz, H.: Reverse-engineering a cryptographic RFID tag. In: Proceedings of USENIX 2008, pp. 185\u2013193. USENIX Association (2008)"},{"key":"2_CR28","unstructured":"NVIDIA. Checklist for Building a PC that Plays HD DVD or Blu-ray Movies, ftp:\/\/download.nvidia.com\/downloads\/pvzone\/Checklist_for_Building_a_HDPC.pdf"},{"key":"2_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/978-3-642-23951-9_14","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"D. Oswald","year":"2011","unstructured":"Oswald, D., Paar, C.: Breaking Mifare DESFire MF3ICD40: Power Analysis and Templates in the Real World. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol.\u00a06917, pp. 207\u2013222. Springer, Heidelberg (2011)"},{"key":"2_CR30","unstructured":"Hearst\u00a0Electronic Products. Microsoft Zune HD 16GB, what\u2019s inside, http:\/\/www2.electronicproducts.com\/Microsoft_Zune_HD_16GB-whatsinside_text-89.aspx"},{"key":"2_CR31","unstructured":"Tektronix. DPO7000C Oscilloscope Series, http:\/\/www.tek.com\/products\/oscilloscopes\/dpo7000\/"},{"key":"2_CR32","unstructured":"Viksler, H.: Web Laundry (In)Security, http:\/\/ihackiam.blogspot.com\/2010\/09\/web-laundry-insecurity.html"},{"key":"2_CR33","unstructured":"Xilinx. XUP Virtex-II Pro Development System User Manual, http:\/\/www.xilinx.com\/univ\/XUPV2P\/Documentation\/ug069.pdf"}],"container-title":["Lecture Notes in Computer Science","Topics in Cryptology \u2013 CT-RSA 2012"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27954-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,23]],"date-time":"2019-06-23T23:19:35Z","timestamp":1561331975000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27954-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642279539","9783642279546"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27954-6_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}