{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T16:42:41Z","timestamp":1725727361194},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642388644"},{"type":"electronic","value":"9783642388651"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38865-1_50","type":"book-chapter","created":{"date-parts":[[2013,5,26]],"date-time":"2013-05-26T21:42:02Z","timestamp":1369604522000},"page":"495-506","source":"Crossref","is-referenced-by-count":2,"title":["Data Security in Microprocessor Units"],"prefix":"10.1007","author":[{"given":"Andrzej","family":"Kwiecie\u0144","sequence":"first","affiliation":[]},{"given":"Micha\u0142","family":"Ma\u0107kowski","sequence":"additional","affiliation":[]},{"given":"Marcin","family":"Sidzina","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"50_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11545262_20","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"M.G. Kuhn","year":"2005","unstructured":"Kuhn, M.G.: Security limits for compromising emanations. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol.\u00a03659, pp. 265\u2013279. Springer, Heidelberg (2005)"},{"key":"50_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-540-77086-2_13","volume-title":"Information Systems Security","author":"H. Tanaka","year":"2007","unstructured":"Tanaka, H.: Information leakage via electromagnetic emanations and evaluation of tempest countermeasures. In: McDaniel, P., Gupta, S.K. (eds.) ICISS 2007. LNCS, vol.\u00a04812, pp. 167\u2013179. Springer, Heidelberg (2007)"},{"key":"50_CR3","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-642-13861-4_11","volume-title":"Computer Networks","author":"A. Kwiecie\u0144","year":"2010","unstructured":"Kwiecie\u0144, A., St\u00f3j, J.: The cost of redundancy in distributed real-time systems in steady state. In: Kwiecie\u0144, A., Gaj, P., Stera, P. (eds.) CN 2010. CCIS, vol.\u00a079, pp. 106\u2013120. Springer, Heidelberg (2010)"},{"key":"50_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-07324-7","volume-title":"Fundamentals of computer security","author":"J. Pieprzyk","year":"2003","unstructured":"Pieprzyk, J., Hardjono, T., Seberry, J.: Fundamentals of computer security. Springer, Heidelberg (2003) ISBN 978-3-540-43101-5"},{"key":"50_CR5","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/978-3-642-13861-4_30","volume-title":"Computer Networks","author":"P. Stera","year":"2010","unstructured":"Stera, P.: Company\u2019s data security \u2013 case study. In: Kwiecie\u0144, A., Gaj, P., Stera, P. (eds.) CN 2010. CCIS, vol.\u00a079, pp. 290\u2013296. Springer, Heidelberg (2010)"},{"issue":"1","key":"50_CR6","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/TII.2012.2209668","volume":"9","author":"P. Gaj","year":"2013","unstructured":"Gaj, P., Jasperneite, J., Felser, M.: Computer communication within industrial distributed environment \u2013 a survey. IEEE Transactions on Industrial Informatics\u00a09(1), 182\u2013189 (2013)","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"50_CR7","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/978-3-642-31217-5_31","volume-title":"Computer Networks","author":"M. Sidzina","year":"2012","unstructured":"Sidzina, M., Kwiecie\u0144, B.z.: The algorithms of transmission failure detection in master-slave networks. In: Kwiecie\u0144, A., Gaj, P., Stera, P. (eds.) CN 2012. CCIS, vol.\u00a0291, pp. 289\u2013298. Springer, Heidelberg (2012)"},{"key":"50_CR8","volume-title":"Introduction to electromagnetic compatibility","author":"P. Clayton","year":"2006","unstructured":"Clayton, P.: Introduction to electromagnetic compatibility, 2nd edn. John Wiley and Sons, New Jersey (2006) ISBN: 978-0-471-75500-5","edition":"2"},{"key":"50_CR9","doi-asserted-by":"publisher","DOI":"10.1002\/047164465X","volume-title":"Testing for EMC compliance: approaches and techniques","author":"M. Montrose","year":"2004","unstructured":"Montrose, M., Nakauchi, E.: Testing for EMC compliance: approaches and techniques. Wiley-IEEE Press, Canada (2004) ISBN: 978-0-471-43308-8"},{"key":"50_CR10","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/978-3-642-21771-5_46","volume-title":"Computer Networks","author":"A. Kwiecie\u0144","year":"2011","unstructured":"Kwiecie\u0144, A., Ma\u0107kowski, M., Skoroniak, K.: Instruction prediction in microprocessor unit. In: Kwiecie\u0144, A., Gaj, P., Stera, P. (eds.) CN 2011. CCIS, vol.\u00a0160, pp. 427\u2013433. Springer, Heidelberg (2011)"},{"key":"50_CR11","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-642-31217-5_21","volume-title":"Computer Networks","author":"A. Kwiecie\u0144","year":"2012","unstructured":"Kwiecie\u0144, A., Ma\u0107kowski, M., Skoroniak, K.: Reverse engineering of microprocessor program code. In: Kwiecie\u0144, A., Gaj, P., Stera, P. (eds.) CN 2012. CCIS, vol.\u00a0291, pp. 191\u2013197. Springer, Heidelberg (2012)"},{"key":"50_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/BFb0028164","volume-title":"Security Protocols","author":"F. Bao","year":"1998","unstructured":"Bao, F., Deng, H., et al.: Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults. In: Christianson, B., Crispo, B., Lomas, M., Roe, M. (eds.) IW 1997. LNCS, vol.\u00a01361, pp. 115\u2013124. Springer, Heidelberg (1998)"},{"key":"50_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"E. Biham","year":"1997","unstructured":"Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 513\u2013525. Springer, Heidelberg (1997)"},{"key":"50_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/11751595_6","volume-title":"Computational Science and Its Applications - ICCSA 2006","author":"M. Ahn","year":"2006","unstructured":"Ahn, M., Lee, H.-J.: Experiments and hardware countermeasures on power analysis attacks. In: Gavrilova, M.L., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Lagan\u00e1, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol.\u00a03982, pp. 48\u201353. Springer, Heidelberg (2006)"},{"key":"50_CR15","unstructured":"Dabbish, E.A., Messerges, T.S., Sloan, R.H.: Investigations of power analysis attacks on smartcards. In: WOST 1999, Proceedings of the USENIX Workshop on Smartcard Technology, Chicago (1999)"},{"key":"50_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/978-3-540-72354-7_12","volume-title":"Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems","author":"D. Vermoen","year":"2007","unstructured":"Vermoen, D., Witteman, M., Gaydadjiev, G.N.: Reverse engineering java card applets using power analysis. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. LNCS, vol.\u00a04462, pp. 138\u2013149. Springer, Heidelberg (2007)"},{"key":"50_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/3-540-44499-8_6","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2000","author":"R. Mayer-Sommer","year":"2000","unstructured":"Mayer-Sommer, R.: Smartly analyzing the simplicity and the power of simple power analysis on smartcards. In: Paar, C., Ko\u00e7, \u00c7.K. (eds.) CHES 2000. LNCS, vol.\u00a01965, pp. 78\u201392. Springer, Heidelberg (2000)"},{"key":"50_CR18","unstructured":"Broujerdian, M., Doostari, M., Golabpour, A., et al.: Differential power analysis in the smart card by data simulation. In: Proceedings of the 2008 International Conference on MultiMedia and Information Technology, MMIT 2008, USA, pp. 817\u2013821 (2008)"},{"key":"50_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P.C. Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"50_CR20","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/978-3-642-21771-5_45","volume-title":"Computer Networks","author":"A. Kwiecie\u0144","year":"2011","unstructured":"Kwiecie\u0144, A., Ma\u0107kowski, M., Skoroniak, K.: The analysis of microprocessor instruction cycle. In: Kwiecie\u0144, A., Gaj, P., Stera, P. (eds.) CN 2011. CCIS, vol.\u00a0160, pp. 417\u2013426. Springer, Heidelberg (2011)"}],"container-title":["Communications in Computer and Information Science","Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38865-1_50","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T03:32:00Z","timestamp":1557718320000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38865-1_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642388644","9783642388651"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38865-1_50","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2013]]}}}