{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T04:27:50Z","timestamp":1741926470373,"version":"3.38.0"},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2011,11,1]],"date-time":"2011-11-01T00:00:00Z","timestamp":1320105600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1007\/s11623-011-0186-8","type":"journal-article","created":{"date-parts":[[2011,11,4]],"date-time":"2011-11-04T12:43:32Z","timestamp":1320410612000},"page":"786-790","source":"Crossref","is-referenced-by-count":1,"title":["Seitenkanalanalyse kontaktloser SmartCards"],"prefix":"10.1007","volume":"35","author":[{"given":"Timo","family":"Kasper","sequence":"first","affiliation":[]},{"given":"David","family":"Oswald","sequence":"additional","affiliation":[]},{"given":"Christof","family":"Paar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,11,5]]},"reference":[{"key":"186_CR1","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik. Messung der Abstrahleigenschaften von RFID-Systemen, Version 2.05. Technical report, 2008. https:\/\/www.bsi.bund.de\/ContentBSI\/Themen\/Elekausweise\/rfid\/MarsStudie\/marsstudie.html"},{"key":"186_CR2","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik. TR-03110 Advanced Security Mechanisms for Machine Readable Travel Documents. Technical Guideline TR-03110, V. 2.05 https:\/\/www.bsi.bund.de\/DE\/Themen\/ElektronischeAusweise\/elektronischeausweise_node.html"},{"key":"186_CR3","doi-asserted-by":"crossref","unstructured":"Nicolas Courtois. The Dark Side of Security by Obscurity - and Cloning MiFare Classic Rail and Building Passes, Anywhere, Anytime. In SECRYPT, pages 331\u2013338. INSTICC, 2009.","DOI":"10.5220\/0002238003310338"},{"key":"186_CR4","doi-asserted-by":"crossref","unstructured":"T. Eisenbarth, T. Kasper, A. Moradi, C. Paar, M. Salmasizadeh, and M. T. M. Shalmani. On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme. In CRYPTO 2008, volume 5157 of LNCS, pages 203\u2013220. Springer.","DOI":"10.1007\/978-3-540-85174-5_12"},{"key":"186_CR5","doi-asserted-by":"crossref","unstructured":"Klaus Finkenzeller. RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification. John Wiley and Sons, 2nd edition, 2003.","DOI":"10.1002\/0470868023"},{"key":"186_CR6","doi-asserted-by":"crossref","unstructured":"Gerhard P. Hancke. Practical Attacks on Proximity Identification Systems (Short Paper). In IEEE Symposium on Security and Privacy 2006. http:\/\/www.cl.cam.ac.uk\/~gh275\/SPPractical.pdf","DOI":"10.1109\/SP.2006.30"},{"key":"186_CR7","unstructured":"International Organization for Standardization (ISO). ISO\/IEC 14443: Identification Cards \u2014 Contactless Integrated Circuit(s) Cards \u2014 Proximity Cards \u2014 Part 1\u20134, 2001. www.iso.ch"},{"key":"186_CR8","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"Paul Kocher","year":"1999","unstructured":"P. Kocher, J. Jaffe, and B. Jun. Differential Power Analysis. In CRYPTO 99, volume 1666 of LNCS, pages 388\u2013397. Springer, 1999."},{"key":"186_CR9","doi-asserted-by":"crossref","unstructured":"Timo Kasper, David Oswald, and Christof Paar. A Versatile Framework for Implementation Attacks on Cryptographic RFIDs and Embedded Devices. Volume 10 of Transactions on Computational Science, LNCS 6340, pages 100\u2013130. Springer, 2010.","DOI":"10.1007\/978-3-642-17499-5_5"},{"key":"186_CR10","doi-asserted-by":"crossref","unstructured":"Timo Kasper, Michael Silbermann, and Christof Paar. All You Can Eat or Breaking a Real-World Contactless Payment System. In Financial Cryptography 2010, volume 6052 of Lecture Notes in Computer Science, pages 343\u2013350. Springer.","DOI":"10.1007\/978-3-642-14577-3_28"},{"key":"186_CR11","unstructured":"Karsten Nohl, David Evans, Starbug, and Henryk Pl\u00f6tz. Reverse-Engineering a Cryptographic RFID Tag. In USENIX Security Symposium, pages 185\u2013194, 2008."},{"key":"186_CR12","unstructured":"Karsten Nohl, Henryk Pl\u00f6tz, and Andreas Rohr. Establishing Security Best Practices in Access Control. 2011. http:\/\/www.srlabs.de\/pub\/acs"},{"key":"186_CR13","unstructured":"National Security Agency (NSA) TEMPEST: A Signal Problem. Declassified September 2007 http:\/\/www.nsa.gov\/public_info\/_files\/cryptologic_spectrum\/tempest.pdf"},{"key":"186_CR14","doi-asserted-by":"crossref","unstructured":"David Oswald and Christof Paar. Breaking Mifare DESFire MF3ICD40: Power Analysis and Templates in the Real World. In CHES 2011, to appear.","DOI":"10.1007\/978-3-642-23951-9_14"},{"key":"186_CR15","unstructured":"Henrik Pl\u00f6tz and Karsten Nohl. Legic Prime: Obscurity in Depth. 2009. http:\/\/events.ccc.de\/congress\/2009\/Fahrplan\/attachments\/1506_legic-slides.pdf"},{"key":"186_CR16","unstructured":"Adi Shamir and Eran Tromer. Acoustic cryptanalysis: On nosy people and noisy machines. http:\/\/cs.tau.ac.il\/~tromer\/acoustic\/"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0186-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-011-0186-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0186-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0186-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T19:57:34Z","timestamp":1741895854000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-011-0186-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":16,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2011,11]]}},"alternative-id":["186"],"URL":"https:\/\/doi.org\/10.1007\/s11623-011-0186-8","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"type":"print","value":"1614-0702"},{"type":"electronic","value":"1862-2607"}],"subject":[],"published":{"date-parts":[[2011,11]]}}}