{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T09:14:00Z","timestamp":1648977240966},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2011,11,1]],"date-time":"2011-11-01T00:00:00Z","timestamp":1320105600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1007\/s11623-011-0185-9","type":"journal-article","created":{"date-parts":[[2011,11,4]],"date-time":"2011-11-04T08:43:32Z","timestamp":1320396212000},"page":"779-785","source":"Crossref","is-referenced-by-count":0,"title":["Praktische Angriffe auf die Bitstromverschl\u00fcsselung von Xilinx FPGAs"],"prefix":"10.1007","volume":"35","author":[{"given":"Markus","family":"Kasper","sequence":"first","affiliation":[]},{"given":"Timo","family":"Kasper","sequence":"additional","affiliation":[]},{"given":"Amir","family":"Moradi","sequence":"additional","affiliation":[]},{"given":"Christof","family":"Paar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,11,5]]},"reference":[{"key":"185_CR1","unstructured":"ALTERA. Using the Design Security Feature in Stratix II and Stratix II GX Devices (AN 341 version 2.3). Technical report, August 2009. http:\/\/www.altera.com\/literature\/an\/an341.pdf ."},{"key":"185_CR2","first-page":"16","volume-title":"Lecture Notes in Computer Science","author":"Eric Brier","year":"2004","unstructured":"E. Brier, C. Clavier, and F. Olivier. Correlation Power Analysis with a Leakage Model. In CHES 2004, volume 3156 of LNCS, pages 16\u201329. Springer, 2004."},{"key":"185_CR3","volume-title":"Israeli Test on Worm Called Crucial in Iran Nuclear Delay","author":"W. J. Broad","year":"2011","unstructured":"W. J. Broad, J. Markoff, and D. E. Sanger. Israeli Test on Worm Called Crucial in Iran Nuclear Delay. Technical report, New York Times, January 2011. http:\/\/www.nytimes.com\/2011\/01\/16\/world\/middleeast\/16stuxnet.html ."},{"key":"185_CR4","unstructured":"O. Coudert. Why FPGA startups keep failing, 2009. FPGA market shares according to Gartner Inc, 2008."},{"key":"185_CR5","unstructured":"S. Drimer. Security for volatile FPGAs. Technical Report UCAM-CL-TR-763, University of Cambridge, Computer Laboratory, Novembre 2009. ISSN 1476-2986. http:\/\/www.cl.cam.ac.uk\/techreports\/UCAM-CL-TR-763.pdf ."},{"key":"185_CR6","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"Paul Kocher","year":"1999","unstructured":"P. Kocher, J. Jaffe, and B. Jun. Differential Power Analysis. In CRYPTO 99, volume 1666 of LNCS, pages 388\u2013397. Springer, 1999."},{"key":"185_CR7","unstructured":"R. Krueger. Application Note XAPP766: Using High Security Features in Virtex-II Series FPGAs. Technical report, XILINX, 2004. http:\/\/www.xilinx.com\/support\/documentation\/application_notes\/xapp766.pdf ."},{"key":"185_CR8","unstructured":"A. Lesea. IP Security in FPGAs, White Paper WP261. Technical report, XILINX, February 2007."},{"key":"185_CR9","unstructured":"NIST. FIPS-46-3: Data Encryption Standard (DES), 1999."},{"key":"185_CR10","doi-asserted-by":"crossref","unstructured":"Amir Moradi, Alessandro Barenghi, Timo Kasper and Christof Paar. On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks \u2014 Extracting Keys from Xilinx Virtex-II FPGAs, ACM CCS 2011. To appear: A draft version is available in the Cryptology ePrint Archive, Report 2011\/390 http:\/\/eprint.iacr.org\/","DOI":"10.1145\/2046707.2046722"},{"key":"185_CR11","doi-asserted-by":"crossref","unstructured":"J.-B. Note and E. Rannaud. From the bitstream to the netlist. In M. Hutton and P. Chow, editors, 16th International Symposium on Field Programmable Gate Arrays, FPGA 2008. ACM, 2008.","DOI":"10.1145\/1344671.1344729"},{"key":"185_CR12","first-page":"35","volume-title":"Lecture Notes in Computer Science","author":"S\u0131dd\u0131ka Berna \u00d6rs","year":"2003","unstructured":"S. B. Ors, E. Oswald, and B. Preneel. Power-Analysis Attacks on an FPGA \u2014 First Experimental Results. In CHES 2003, volume 2779 of LNCS, pages 35\u201350. Springer, 2003."},{"key":"185_CR13","unstructured":"Side-channel Attack Standard Evaluation Board (SASEBO). http:\/\/www.rcis.aist.go.jp\/special\/SASEBO\/ ."},{"key":"185_CR14","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-540-30117-2_11","volume-title":"Field Programmable Logic and Application","author":"Fran\u00e7ois-Xavier Standaert","year":"2004","unstructured":"F.-X. Standaert, S. B. Ors, J.-J. Quisquater, and B. Preneel. Power Analysis Attacks Against FPGA Implementations of the DES. In FPL 2004, volume 3203 of LNCS, pages 84\u201394. Springer, 2004."},{"key":"185_CR15","unstructured":"Studieng\u00e4nge IT-Sicherheit des Horst G\u00f6rtz Instituts an der Ruhr-Universit\u00e4t Bochum, http:\/\/www.ei.rub.de\/studium\/its\/"},{"key":"185_CR16","unstructured":"A. Telikepalli. Is Your FPGA Design Secure? XCell Journal, XILINX, Fall 2003."},{"key":"185_CR17","unstructured":"C. W. Tseng. Lock Your Designs with the Virtex-4 Security Solution. XCell Journal, XILINX, Spring 2005."},{"issue":"3","key":"185_CR18","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1145\/1015047.1015052","volume":"3","author":"T. J. Wollinger","year":"2004","unstructured":"T. J. Wollinger, J. Guajardo, and C. Paar. Security on FPGAs: State-of-the-art implementations and attacks. ACM Transactions in Embedded Computing Systems (TECS), 3(3):534\u2013574, 2004.","journal-title":"ACM Transactions in Embedded Computing Systems (TECS)"},{"key":"185_CR19","unstructured":"XILINX. Virtex-2 Platform FPGA User Guide (UG002 version 2.2). Technical report, November 2007. http:\/\/www.xilinx.com\/support\/documentation\/user_guides\/ug002.pdf ."},{"key":"185_CR20","unstructured":"XILINX. Virtex-II Pro and Virtex-II Pro X FPGA User Guide. Technical report, 2007. http:\/\/www.xilinx.com\/support\/documentation\/user_guides\/ug012.pdf ."},{"key":"185_CR21","unstructured":"XILINX. Virtex-II Pro Platform FPGAs: Complete Data Sheet (DS 083 version 4.7). Technical report, November 2007. http:\/\/www.xilinx.com\/support\/documentation\/data_sheets\/ds083.pdf ."},{"key":"185_CR22","doi-asserted-by":"crossref","unstructured":"D. Ziener, S. Assmus, and J. Teich. Identifying FPGA IP-Cores Based on Lookup Table Content Analysis. In FPL 2006, pages 1\u20136. IEEE, 2006.","DOI":"10.1109\/FPL.2006.311255"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0185-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-011-0185-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0185-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0185-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,18]],"date-time":"2019-06-18T22:39:20Z","timestamp":1560897560000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-011-0185-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":22,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2011,11]]}},"alternative-id":["185"],"URL":"https:\/\/doi.org\/10.1007\/s11623-011-0185-9","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,11]]}}}