{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T11:40:06Z","timestamp":1762429206422},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642412837"},{"type":"electronic","value":"9783642412844"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41284-4_11","type":"book-chapter","created":{"date-parts":[[2013,10,22]],"date-time":"2013-10-22T17:35:11Z","timestamp":1382463311000},"page":"204-222","source":"Crossref","is-referenced-by-count":19,"title":["Side-Channel Attacks on the Yubikey 2 One-Time Password Generator"],"prefix":"10.1007","author":[{"given":"David","family":"Oswald","sequence":"first","affiliation":[]},{"given":"Bastian","family":"Richter","sequence":"additional","affiliation":[]},{"given":"Christof","family":"Paar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/3-540-36400-5_4","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"D. Agrawal","year":"2003","unstructured":"Agrawal, D., Archambeault, B., Rao, J.R., Rohatgi, P.: The EM Side-Channel(s). In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 29\u201345. Springer, Heidelberg (2003)"},{"key":"11_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"608","DOI":"10.1007\/978-3-642-32009-5_36","volume-title":"Advances in Cryptology \u2013 CRYPTO 2012","author":"R. Bardou","year":"2012","unstructured":"Bardou, R., Focardi, R., Kawamoto, Y., Simionato, L., Steel, G., Tsay, J.-K.: Efficient padding oracle attacks on cryptographic hardware. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol.\u00a07417, pp. 608\u2013625. Springer, Heidelberg (2012)"},{"key":"11_CR3","unstructured":"Bos, J.W., Osvik, D.A., Stefan, D.: Fast Implementations of AES on Various Platforms. IACR Cryptology ePrint Archive, 501 (2009)"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"E. Brier","year":"2004","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 16\u201329. Springer, Heidelberg (2004)"},{"key":"11_CR5","unstructured":"Bright, P.: RSA finally comes clean: SecurID is compromised (June 2011)"},{"key":"11_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-36400-5_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S. Chari","year":"2003","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template Attacks. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 13\u201328. Springer, Heidelberg (2003)"},{"key":"11_CR7","unstructured":"Curry, S.: Don\u2019t Believe Everything You Read... Your RSA SecurID Token is Not Cracked. blog entry (June 2012)"},{"key":"11_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-3-540-85174-5_12","volume-title":"Advances in Cryptology \u2013 CRYPTO 2008","author":"T. Eisenbarth","year":"2008","unstructured":"Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., Shalmani, M.T.M.: On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol.\u00a05157, pp. 203\u2013220. Springer, Heidelberg (2008)"},{"issue":"1","key":"11_CR9","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s13389-012-0030-6","volume":"2","author":"M.A. Elaabid","year":"2012","unstructured":"Elaabid, M.A., Guilley, S.: Portability of templates. Journal of Cryptographic Engineering\u00a02(1), 63\u201374 (2012)","journal-title":"Journal of Cryptographic Engineering"},{"key":"11_CR10","unstructured":"Grand, J.: Hardware Token Compromises. Presentation at Black Hat USA 2004 (2004)"},{"key":"11_CR11","unstructured":"Kingpin. Attacks on and Countermeasures for USB Hardware Token Devices"},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P. Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"11_CR13","unstructured":"Langer EMV-Technik. LF1 Near Field Probe Set. Website"},{"key":"11_CR14","unstructured":"Langer EMV-Technik. Preamplifier PA 303. Website"},{"key":"11_CR15","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer (2007)"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Moradi, A., Barenghi, A., Kasper, T., Paar, C.: On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from Xilinx Virtex-II FPGAs. In: CCS 2011, pp. 111\u2013124. ACM (2011)","DOI":"10.1145\/2046707.2046722"},{"key":"11_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-27954-6_1","volume-title":"Topics in Cryptology \u2013 CT-RSA 2012","author":"A. Moradi","year":"2012","unstructured":"Moradi, A., Kasper, M., Paar, C.: Black-Box Side-Channel Attacks Highlight the Importance of Countermeasures. In: Dunkelman, O. (ed.) CT-RSA 2012. LNCS, vol.\u00a07178, pp. 1\u201318. Springer, Heidelberg (2012)"},{"key":"11_CR18","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1145\/2435264.2435282","volume-title":"Proceedings of the ACM\/SIGDA International Symposium on Field Programmable Gate Arrays, FPGA 2013","author":"A. Moradi","year":"2013","unstructured":"Moradi, A., Oswald, D., Paar, C., Swierczynski, P.: Side-channel attacks on the bitstream encryption mechanism of Altera Stratix II: facilitating black-box analysis using software reverse-engineering. In: Proceedings of the ACM\/SIGDA International Symposium on Field Programmable Gate Arrays, FPGA 2013, pp. 91\u2013100. ACM, New York (2013)"},{"key":"11_CR19","unstructured":"Oswald, D., Paar, C.: Breaking Mifare DESFire MF3ICD40: Power Analysis and Templates in the Real World"},{"key":"11_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/978-3-642-37288-9_15","volume-title":"Smart Card Research and Advanced Applications","author":"D. Oswald","year":"2013","unstructured":"Oswald, D., Paar, C.: Improving side-channel analysis with optimal linear transforms. In: Mangard, S. (ed.) CARDIS 2012. LNCS, vol.\u00a07771, pp. 219\u2013233. Springer, Heidelberg (2013)"},{"key":"11_CR21","unstructured":"Paterson, K., AlFardan, N.: On the Security of RC4 in TLS. Website (March 2013)"},{"key":"11_CR22","unstructured":"Pico Technology. PicoScope 5200 USB PC Oscilloscopes (2008)"},{"key":"11_CR23","unstructured":"Shanmugam, K.S.: Digital & Analog Communication Systems, ch.\u00a08.3.2. Wiley-India (2006)"},{"key":"11_CR24","unstructured":"Sunplus Innovation Technology Inc., \n                    \n                      http:\/\/www.sunplusit.com"},{"key":"11_CR25","unstructured":"Vamanu, L.: Formal Analysis of Yubikey. Master\u2019s thesis, INRIA (2012)"},{"key":"11_CR26","unstructured":"Weisstein, E.W.: Variance. Mathworld - A Wolfram Web Resource (December 2010), \n                    \n                      http:\/\/mathworld.wolfram.com\/Variance.html"},{"key":"11_CR27","unstructured":"Yubico, \n                    \n                      http:\/\/www.yubico.com"},{"key":"11_CR28","unstructured":"Yubico. Download of personalisation tool, \n                    \n                      http:\/\/www.yubico.com\/products\/services-software\/personalization-tools\/"},{"key":"11_CR29","unstructured":"Yubico. How YubiKeys are manufactured, \n                    \n                      https:\/\/www.youtube.com\/watch?v=s8_I1-ErZSQ"},{"key":"11_CR30","unstructured":"Yubico. Yubico Reference Customers: Department of Defense, \n                    \n                      http:\/\/www.yubico.com\/about\/reference-customers\/department-defence\/"},{"key":"11_CR31","unstructured":"Yubico. Yubikey Security Evaluation Version 2.0"},{"key":"11_CR32","unstructured":"Yubico. The YubiKey Manual. Yubico (May 2012)"},{"key":"11_CR33","unstructured":"Yubico. YubiKey NEO. Website (2013)"}],"container-title":["Lecture Notes in Computer Science","Research in Attacks, Intrusions, and Defenses"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41284-4_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,20]],"date-time":"2019-01-20T19:11:54Z","timestamp":1548011514000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41284-4_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642412837","9783642412844"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41284-4_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}