{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T06:21:25Z","timestamp":1748758885584},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642420009"},{"type":"electronic","value":"9783642420016"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-42001-6_12","type":"book-chapter","created":{"date-parts":[[2013,11,20]],"date-time":"2013-11-20T23:25:02Z","timestamp":1384989902000},"page":"151-165","source":"Crossref","is-referenced-by-count":7,"title":["AMASIVE: An Adaptable and Modular Autonomous Side-Channel Vulnerability Evaluation Framework"],"prefix":"10.1007","author":[{"given":"Sorin A.","family":"Huss","sequence":"first","affiliation":[]},{"given":"Marc","family":"St\u00f6ttinger","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Zohner","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Bayrak, A.G., Regazzoni, F., Brisk, P., Standaert, F.X., Ienne, P.: A first step towards automatic application of power analysis countermeasures. In: Stok, L., Dutt, N.D., Hassoun, S. (eds.) DAC, pp. 230\u2013235. ACM (2011)","DOI":"10.1145\/2024724.2024778"},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"A. Bogdanov","year":"2007","unstructured":"Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: Present: An ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 450\u2013466. Springer, Heidelberg (2007)"},{"key":"12_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-3-642-12678-9_15","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2010","author":"M.A. Elaabid","year":"2010","unstructured":"Elaabid, M.A., Guilley, S.: Practical improvements of profiled side-channel attacks on a hardware crypto-accelerator. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol.\u00a06055, pp. 243\u2013260. Springer, Heidelberg (2010)"},{"key":"12_CR4","unstructured":"Mangard, S., Popp, T., Oswald, E.: Power Analysis Attacks - Revealing the Secrets of Smart Cards. Springer (2007)"},{"key":"12_CR5","unstructured":"Moss, A., Oswald, E., Page, D., Tunstall, M.: Automatic insertion of dpa countermeasures. IACR Cryptology ePrint Archive 2011, 412 (2011)"},{"key":"12_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/978-3-642-33027-8_4","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2012","author":"A. Moss","year":"2012","unstructured":"Moss, A., Oswald, E., Page, D., Tunstall, M.: Compiler assisted masking. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol.\u00a07428, pp. 58\u201375. Springer, Heidelberg (2012)"},{"key":"12_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/978-3-642-01001-9_26","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"F.X. Standaert","year":"2009","unstructured":"Standaert, F.X., Malkin, T., Yung, M.: A unified framework for the analysis of side-channel key recovery attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol.\u00a05479, pp. 443\u2013461. Springer, Heidelberg (2009)"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Zohner, M., St\u00f6ttinger, M., Huss, S.A., Stein, O.: An adaptable, modular, and autonomous side-channel vulnerability evaluator. In: HOST, pp. 43\u201348. IEEE (2012)","DOI":"10.1109\/HST.2012.6224317"}],"container-title":["Lecture Notes in Computer Science","\u2018"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-42001-6_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,24]],"date-time":"2019-05-24T09:26:19Z","timestamp":1558689979000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-42001-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642420009","9783642420016"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-42001-6_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}