{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T22:24:43Z","timestamp":1748384683716,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662434130"},{"type":"electronic","value":"9783662434147"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43414-7_29","type":"book-chapter","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T14:57:06Z","timestamp":1400597826000},"page":"571-588","source":"Crossref","is-referenced-by-count":6,"title":["When Reverse-Engineering Meets Side-Channel Analysis \u2013 Digital Lockpicking in Practice"],"prefix":"10.1007","author":[{"given":"David","family":"Oswald","sequence":"first","affiliation":[]},{"given":"Daehyun","family":"Strobel","sequence":"additional","affiliation":[]},{"given":"Falk","family":"Schellenberg","sequence":"additional","affiliation":[]},{"given":"Timo","family":"Kasper","sequence":"additional","affiliation":[]},{"given":"Christof","family":"Paar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,5,21]]},"reference":[{"key":"29_CR1","first-page":"1","volume-title":"A Practical Attack on KeeLoq","author":"W Aerts","year":"2010","unstructured":"Aerts, W., Biham, E., De Moiti\u00e9, D., De Mulder, E., Dunkelman, O., Indesteege, S., Keller, N., Preneel, B., Vandenbosch, G., Verbauwhede, I.: A Practical Attack on KeeLoq, pp. 1\u201322. Springer, New York (2010)"},{"key":"29_CR2","volume-title":"Pr\u00e4parationstechniken F\u00fcr Die Fehleranalyse an Integrierten Halbleiterschaltungen","author":"F Beck","year":"1988","unstructured":"Beck, F.: Pr\u00e4parationstechniken F\u00fcr Die Fehleranalyse an Integrierten Halbleiterschaltungen. VCH Verlagsgesellschaft, Weinheim (1988)"},{"issue":"2","key":"29_CR3","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MSECP.2003.1193208","volume":"1","author":"M. Blaze","year":"2003","unstructured":"Blaze, M.: Rights amplification in master-keyed mechanical locks. IEEE Secur. Priv. 1(2), 24\u201332 (2003). http:\/\/www.crypto.com\/papers\/mk.pdf","journal-title":"IEEE Security & Privacy Magazine"},{"key":"29_CR4","unstructured":"Bogdanov, A.: Attacks on the keeloq block cipher and authentication systems. In Workshop on RFID Security (RFIDSec\u201908) (2007). http:\/\/rfidsec07.etsit.uma.es\/slides\/papers\/paper-22.pdf"},{"key":"29_CR5","unstructured":"Bono, S.C., Green, M., Stubblefield, A., Juels, A., Rubin, A.D., Szydlo, M.: Security analysis of a cryptographically-enabled RFID device. In: Proceedings of the 14th Conference on USENIX Security Symposium, vol. 14. USENIX Association (2005) http:\/\/www.usenix.org\/events\/sec05\/tech\/bono\/bono.pdf"},{"key":"29_CR6","series-title":"LNCS","first-page":"16","volume-title":"CHES 2004","author":"E Brier","year":"2004","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16\u201329. Springer, Heidelberg (2004)"},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"Courtois, N.: The dark side of security by obscurity - and cloning mifare classic rail and building passes, anywhere, anytime. In SECRYPT, pp. 331\u2013338. INSTICC (2009)","DOI":"10.5220\/0002238003310338"},{"key":"29_CR8","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/978-3-540-85174-5_12","volume-title":"CRYPTO 2008","author":"T Eisenbarth","year":"2008","unstructured":"Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., Shalmani, M.T.M.: On the power of power analysis in the real world: a complete break of the KeeLoq code hopping scheme. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 203\u2013220. Springer, Heidelberg (2008)"},{"key":"29_CR9","unstructured":"Ettus Research. USRP N200\/210 Networked Series (2012). https:\/\/www.ettus.com\/content\/files\/07495_Ettus_N200-210_DS_Flyer_HR_1. pdf"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"Garcia, F.D., van Rossum, P., Verdult, R., Schreur, R.W.: Wirelessly pickpocketing a mifare classic card. In: IEEE Symposium on Security and Privacy, pp. 3\u201315. IEEE (2009)","DOI":"10.1109\/SP.2009.6"},{"key":"29_CR11","unstructured":"Goldack, M.: Side-Channel Based Reverse Engineering for Microcontrollers. Diploma thesis, Ruhr-University Bochum (2008). https:\/\/www.emsec.rub.de\/media\/attachments\/files\/2012\/10\/da_goldack.pdf"},{"key":"29_CR12","unstructured":"Hex-Rays. IDA Starter Edition. http:\/\/www.hex-rays.com\/products\/ida\/processors.shtml as of 24 July 2013"},{"key":"29_CR13","unstructured":"Huang, A.: Hacking the PIC 18F1320 (2005). http:\/\/www.bunniestudios.com\/blog\/?page_id=40 as of 24 July 2013"},{"key":"29_CR14","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer (2007). http:\/\/www.dpabook.org"},{"key":"29_CR15","unstructured":"Microchip Technology Inc. PIC16F882\/883\/884\/886\/887 Data Sheet (2009). http:\/\/ww1.microchip.com\/downloads\/en\/devicedoc\/41291f.pdf"},{"key":"29_CR16","series-title":"LNCS","first-page":"207","volume-title":"CHES 2011","author":"D Oswald","year":"2011","unstructured":"Oswald, D., Paar, C.: Breaking mifare DESfire MF3ICD40: power analysis and templates in the real world. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 207\u2013222. Springer, Heidelberg (2011)"},{"key":"29_CR17","unstructured":"Pl\u00f6tz, H., Nohl, K.: Legic Prime: Obscurity in Depth (2009). http:\/\/events.ccc.de\/congress\/2009\/Fahrplan\/attachments\/1506_legic-slides.pdf"},{"key":"29_CR18","unstructured":"SimonsVoss Technologies AG. SimonsVoss posts record sales yet again in (2011). http:\/\/www.simons-voss.us\/Record-sales-in-2011.1112.0.html?&L=6 as of 24 July 2013"},{"key":"29_CR19","unstructured":"SimonsVoss Technologies AG. Infocenter - Downloads (2006). http:\/\/www.simons-voss.com\/Downloads.45.0.html?&L=1 as of 24 July 2013"},{"key":"29_CR20","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/978-3-642-40041-4_9","volume-title":"CRYPTO 2013, Part I","author":"D Strobel","year":"2013","unstructured":"Strobel, D., Driessen, B., Kasper, T., Leander, G., Oswald, D., Schellenberg, F., Paar, Ch.: Fuming acid and cryptanalysis: handy tools for overcoming a digital locking and access control system. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 147\u2013164. Springer, Heidelberg (2013)"},{"key":"29_CR21","unstructured":"Verdult, R., Garcia, F.D., Balasch, J.: Gone in 360 seconds: Hijacking with Hitag2. In USENIX Security Symposium, pp. 237\u2013252. USENIX Association, August 2012. https:\/\/www.usenix.org\/system\/files\/conference\/usenixsecurity12\/sec12-final95.pdf"},{"key":"29_CR22","unstructured":"Eric W. Weisstein. Variance. Mathworld - A Wolfram Web Resource, December 2010. http:\/\/mathworld.wolfram.com\/Variance.html"},{"key":"29_CR23","unstructured":"Wikipedia. Differential Manchester Encoding \u2013 Wikipedia, The Free Encyclopedia (2012). Accessed 12 November 2012"},{"key":"29_CR24","unstructured":"Zonenberg, A.: Microchip PIC12F683 teardown (2011). http:\/\/siliconexposed.blogspot.de\/2011\/03\/microchip-pic12f683-teardown.html"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography -- SAC 2013"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43414-7_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T23:59:06Z","timestamp":1746230346000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-43414-7_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662434130","9783662434147"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43414-7_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}