{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T14:44:36Z","timestamp":1725461076149},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642372872"},{"type":"electronic","value":"9783642372889"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37288-9_2","type":"book-chapter","created":{"date-parts":[[2013,3,5]],"date-time":"2013-03-05T13:37:43Z","timestamp":1362490663000},"page":"16-30","source":"Crossref","is-referenced-by-count":5,"title":["Dynamic Fault Injection Countermeasure"],"prefix":"10.1007","author":[{"given":"Guillaume","family":"Barbu","sequence":"first","affiliation":[]},{"given":"Philippe","family":"Andouard","sequence":"additional","affiliation":[]},{"given":"Christophe","family":"Giraud","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"P. Kocher","year":"1996","unstructured":"Kocher, P.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 104\u2013113. Springer, Heidelberg (1996)"},{"key":"2_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P. Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"2_CR3","unstructured":"Quisquater, J.J., Samyde, D.: A New Tool for Non-intrusive Analysis of Smart Cards Based on Electro-magnetic Emissions, the SEMA and DEMA Methods. Presented during EUROCRYPT 2000 Rump Session (2000)"},{"key":"2_CR4","unstructured":"Bellcore: New Threat Model Breaks Crypto Codes. Press Release (1996)"},{"key":"2_CR5","unstructured":"du\u00a0Castel, B.: Personal History of the Java Card (2012), French version originally published in MISC magazine, HS-2 (November 2008)"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Joye, M., Tunstall, M.: Fault Analysis in Cryptography. Information Security and Cryptography. Springer (2012)","DOI":"10.1007\/978-3-642-29656-7"},{"key":"2_CR7","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1109\/JPROC.2005.862424","volume":"94","author":"H. Bar-El","year":"2006","unstructured":"Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The Sorcerer\u2019s Apprentice Guide to Fault Attacks. IEEE\u00a094, 370\u2013382 (2006)","journal-title":"IEEE"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Giraud, C., Thiebeauld, H.: A Survey on Fault Attacks. In: Quisquater, J.J., Paradinas, P., Deswarte, Y., Kalam, A.E. (eds.) Smart Card Research and Advanced Applications VI \u2013 CARDIS 2004, pp. 159\u2013176. Kluwer Academic Publishers (2004)","DOI":"10.1007\/1-4020-8147-2_11"},{"key":"2_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-85893-5_1","volume-title":"Smart Card Research and Advanced Applications","author":"W. Mostowski","year":"2008","unstructured":"Mostowski, W., Poll, E.: Malicious Code on Java Card Smartcards: Attacks and Countermeasures. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol.\u00a05189, pp. 1\u201316. Springer, Heidelberg (2008)"},{"key":"2_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/978-3-642-27257-8_19","volume-title":"Smart Card Research and Advanced Applications","author":"G. Barbu","year":"2011","unstructured":"Barbu, G., Duc, G., Hoogvorst, P.: Java Card Operand Stack:\u00a0Fault Attacks, Combined Attacks and Countermeasures. In: Prouff, E. (ed.) CARDIS 2011. LNCS, vol.\u00a07079, pp. 297\u2013313. Springer, Heidelberg (2011)"},{"key":"2_CR11","unstructured":"Common Criteria: Application of Attack Potential to Smartcards (2009)"},{"key":"2_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-642-12510-2_11","volume-title":"Smart Card Research and Advanced Application","author":"G. Barbu","year":"2010","unstructured":"Barbu, G., Thiebeauld, H., Guerin, V.: Attacks on Java Card 3.0 Combining Fault and Logical Attacks. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol.\u00a06035, pp. 148\u2013163. Springer, Heidelberg (2010)"},{"key":"2_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-642-12510-2_10","volume-title":"Smart Card Research and Advanced Application","author":"E. Vetillard","year":"2010","unstructured":"Vetillard, E., Ferrari, A.: Combined Attacks and Countermeasures. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol.\u00a06035, pp. 133\u2013147. Springer, Heidelberg (2010)"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-3-642-27257-8_18","volume-title":"Smart Card Research and Advanced Applications","author":"G. Bouffard","year":"2011","unstructured":"Bouffard, G., Iguchi-Cartigny, J., Lanet, J.-L.: Combined Software and Hardware Attacks on the Java Card Control Flow. In: Prouff, E. (ed.) CARDIS 2011. LNCS, vol.\u00a07079, pp. 283\u2013296. Springer, Heidelberg (2011)"},{"key":"2_CR15","unstructured":"Sun Microsystems Inc.: Virtual Machine Specification \u2013 Java Card Plateform, Version 3.0.1 (2009)"},{"key":"2_CR16","unstructured":"The Apache Software Foundation: (Apache Commons BCEL, The Byte Code Engineering Library), \n                    \n                      http:\/\/commons.apache.org\/bcel\/"},{"key":"2_CR17","unstructured":"Smart Secure Devices (SSD) Team \u2013 XLIM, Universit\u00e9 de Limoges: CapMap \u2013 The CAP file manipulator, \n                    \n                      http:\/\/secinfo.msi.unilim.fr"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37288-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T01:28:44Z","timestamp":1558315724000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37288-9_2"}},"subtitle":["A New Conception of Java Card Security"],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642372872","9783642372889"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37288-9_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}