{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T04:25:52Z","timestamp":1745987152466,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642371189"},{"type":"electronic","value":"9783642371196"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37119-6_22","type":"book-chapter","created":{"date-parts":[[2013,3,27]],"date-time":"2013-03-27T00:34:59Z","timestamp":1364344499000},"page":"341-356","source":"Crossref","is-referenced-by-count":10,"title":["A Case Study of Side-Channel Analysis Using Decoupling Capacitor Power Measurement with the OpenADC"],"prefix":"10.1007","author":[{"given":"Colin","family":"O\u2019Flynn","sequence":"first","affiliation":[]},{"given":"Zhizhang","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P. Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"22_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-36400-5_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S. Chari","year":"2003","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template Attacks. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 13\u201328. Springer, Heidelberg (2003)"},{"key":"22_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"E. Brier","year":"2004","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 16\u201329. Springer, Heidelberg (2004)"},{"key":"22_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-44709-1_21","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2001","author":"K. Gandolfi","year":"2001","unstructured":"Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic Analysis: Concrete Results. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.\u00a02162, pp. 251\u2013261. Springer, Heidelberg (2001)"},{"key":"22_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/978-3-540-85053-3_26","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"F.-X. Standaert","year":"2008","unstructured":"Standaert, F.-X., Archambeau, C.: Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol.\u00a05154, pp. 411\u2013425. Springer, Heidelberg (2008)"},{"key":"22_CR6","unstructured":"Jun, B., Kenworthy, G.: Is your mobile device radiating keys? In: RSA Conference 2012 (2012)"},{"key":"22_CR7","unstructured":"De\u00a0Mulder, E.: Electromagnetic Techniques and Probes for Side-Channel Analysis on Cryptographic Devices. PhD thesis, KU Leuven (2010)"},{"key":"22_CR8","unstructured":"Mateos, E., Gebotys, C.: Side channel analysis using giant magneto-resistive (gmr) sensors. In: International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE (2011)"},{"key":"22_CR9","unstructured":"Duc, G., Guilley, S., Sauvage, L., Flament, F., Nassar, M., Selmane, N., Danger, J.L., Graba, T., Mathieu, Y., Renaud, P.: Results of the 2009-2010 \u201ddpa contest v2\u201d. In: International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE (February 2011)"},{"key":"22_CR10","unstructured":"Carluccio, D.: Electromagnetic Side Channel Analysis of Embedded Crypto Devices. PhD thesis, Ruhr University Bochum (2005)"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Souissi, Y., Danger, J., Guilley, S., Bhasin, S., Nassar, M.: Embedded systems security: An evaluation methodology against side channel attacks. In: 2011 Conference on Design and Architectures for Signal and Image Processing (DASIP), pp. 1\u20138. IEEE (2011)","DOI":"10.1109\/DASIP.2011.6136885"},{"key":"22_CR12","unstructured":"Agilent Technologies: Triggering Wide-Bandwidth Sampling Oscilloscopes for Accurate Displays of High-Speed Digital Communications Waveforms (2005)"},{"key":"22_CR13","unstructured":"O\u2019Flynn, C.: Openadc (2012), http:\/\/www.newae.com\/openadc"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Smith, D.: Signal and noise measurement techniques using magnetic field probes. In: 1999 IEEE International Symposium on Electromagnetic Compatibility, vol.\u00a01, pp. 559\u2013563. IEEE (1999)","DOI":"10.1109\/ISEMC.1999.812967"},{"key":"22_CR15","unstructured":"Katashita, T., Satoh, A., Kikuchi, K., Nakagawa, H., Aoyagi, M.: Evaluation of dpa characteristics of sasebo for board level simulations. In: International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE), pp. 36\u201339 (2010)"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Danis, A., Ors, B.: Differential power analysis attack considering decoupling capacitance effect. In: European Conference on Circuit Theory and Design, ECCTD 2009, pp. 359\u2013362. IEEE (2009)","DOI":"10.1109\/ECCTD.2009.5274996"},{"key":"22_CR17","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1098\/rstl.1832.0006","volume":"122","author":"M. Faraday","year":"1832","unstructured":"Faraday, M.: Experimental researches in electricity. Phil. Trans. R. Soc. Lond.\u00a0122, 125\u2013162 (1832)","journal-title":"Phil. Trans. R. Soc. Lond."},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Weaver, J., Horowitz, M.: Measurement of via currents in printed circuit boards using inductive loops. In: 2006 IEEE Electrical Performance of Electronic Packaging, pp. 37\u201340. IEEE (2006)","DOI":"10.1109\/EPEP.2006.321184"},{"key":"22_CR19","doi-asserted-by":"crossref","unstructured":"Weaver, J., Horowitz, M.: Measurement of supply pin current distributions in integrated circuit packages. In: 2007 IEEE Electrical Performance of Electronic Packaging, pp. 7\u201310. IEEE (2007)","DOI":"10.1109\/EPEP.2007.4387109"},{"key":"22_CR20","doi-asserted-by":"crossref","unstructured":"Li, L., Kim, J., Wang, H., Wu, S., Takita, Y., Takeuchi, H., Araki, K., Fan, J.: Measurement of multiple switching current components through a bulk decoupling capacitor using a lab-made low-cost current probe. In: 2011 IEEE International Symposium on Electromagnetic Compatibility (EMC), pp. 417\u2013421. IEEE (2011)","DOI":"10.1109\/ISEMC.2011.6038347"},{"key":"22_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-642-15031-9_9","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"A. Moradi","year":"2010","unstructured":"Moradi, A., Mischke, O., Eisenbarth, T.: Correlation-Enhanced Power Analysis Collision Attack. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol.\u00a06225, pp. 125\u2013139. Springer, Heidelberg (2010)"},{"key":"22_CR22","unstructured":"Satoh, A.: Side-channel attack standard evaluation board (sasebo) - dpa contest (2011), http:\/\/www.morita-tech.co.jp\/SASEBO\/en\/index.html"},{"key":"22_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/978-3-642-01001-9_26","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"F.-X. Standaert","year":"2009","unstructured":"Standaert, F.-X., Malkin, T.G., Yung, M.: A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol.\u00a05479, pp. 443\u2013461. Springer, Heidelberg (2009)"},{"key":"22_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-3-540-85174-5_12","volume-title":"Advances in Cryptology \u2013 CRYPTO 2008","author":"T. Eisenbarth","year":"2008","unstructured":"Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., Shalmani, M.T.M.: On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol.\u00a05157, pp. 203\u2013220. Springer, Heidelberg (2008)"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37119-6_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T02:13:12Z","timestamp":1745979192000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37119-6_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642371189","9783642371196"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37119-6_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}