{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T16:01:52Z","timestamp":1770220912376,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642319112","type":"print"},{"value":"9783642319129","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31912-9_4","type":"book-chapter","created":{"date-parts":[[2012,7,14]],"date-time":"2012-07-14T07:57:56Z","timestamp":1342252676000},"page":"48-60","source":"Crossref","is-referenced-by-count":11,"title":["An Efficient Method for Eliminating Random Delays in Power Traces of Embedded Software"],"prefix":"10.1007","author":[{"given":"Daehyun","family":"Strobel","sequence":"first","affiliation":[]},{"given":"Christof","family":"Paar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"ATMEL. ATmega8 datasheet: 8-bit AVR with 8k bytes in-system programmable flash"},{"key":"4_CR2","doi-asserted-by":"publisher","first-page":"762","DOI":"10.1145\/359842.359859","volume":"20","author":"R.S. Boyer","year":"1977","unstructured":"Boyer, R.S., Moore, J.S.: A fast string searching algorithm. Commun. ACM\u00a020, 762\u2013772 (1977)","journal-title":"Commun. ACM"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"E. Brier","year":"2004","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 16\u201329. Springer, Heidelberg (2004)"},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-3-642-15031-9_7","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"J.-S. Coron","year":"2010","unstructured":"Coron, J.-S., Kizhvatov, I.: Analysis and Improvement of the Random Delay Countermeasure of CHES 2009. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol.\u00a06225, pp. 95\u2013109. Springer, Heidelberg (2010)"},{"key":"4_CR5","volume-title":"Pattern Classification","author":"R.O. Duda","year":"2001","unstructured":"Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification, 2nd edn. Wiley, New York (2001)","edition":"2"},{"key":"4_CR6","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1002\/spe.4380100608","volume":"10","author":"R.N. Horspool","year":"1980","unstructured":"Horspool, R.N.: Practical fast searching in strings. Software Practice and Experience\u00a010, 501\u2013506 (1980)","journal-title":"Software Practice and Experience"},{"key":"4_CR7","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks - Revealing the Secrets of Smart Cards. Springer (2007)"},{"key":"4_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1007\/978-3-642-27257-8_17","volume-title":"Smart Card Research and Advanced Applications","author":"R.A. Muijrers","year":"2011","unstructured":"Muijrers, R.A., van Woudenberg, J.G.J., Batina, L.: RAM: Rapid Alignment Method. In: Prouff, E. (ed.) CARDIS 2011. LNCS, vol.\u00a07079, pp. 266\u2013282. Springer, Heidelberg (2011)"},{"key":"4_CR9","unstructured":"Salvador, S., Chan, P.: FastDTW: Toward accurate dynamic time warping in linear time and space. In: KDD Workshop on Mining Temporal and Sequential Data. ACM (2004)"},{"key":"4_CR10","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1137\/0222018","volume":"22","author":"J. Tarhio","year":"1993","unstructured":"Tarhio, J., Ukkonen, E.: Approximate Boyer-Moore string matching. SIAM J. Comput.\u00a022, 243\u2013260 (1993)","journal-title":"SIAM J. Comput."},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-3-540-72354-7_3","volume-title":"Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems","author":"M. Tunstall","year":"2007","unstructured":"Tunstall, M., Benoit, O.: Efficient Use of Random Delays in Embedded Software. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. LNCS, vol.\u00a04462, pp. 27\u201338. Springer, Heidelberg (2007)"},{"key":"4_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/978-3-642-19074-2_8","volume-title":"Topics in Cryptology \u2013 CT-RSA 2011","author":"J.G.J. Woudenberg van","year":"2011","unstructured":"van Woudenberg, J.G.J., Witteman, M.F., Bakker, B.: Improving Differential Power Analysis by Elastic Alignment. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol.\u00a06558, pp. 104\u2013119. Springer, Heidelberg (2011)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology - ICISC 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31912-9_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:50:59Z","timestamp":1620129059000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31912-9_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642319112","9783642319129"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31912-9_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}