{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T16:38:41Z","timestamp":1649003921071},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2012,11,24]],"date-time":"2012-11-24T00:00:00Z","timestamp":1353715200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1007\/s11623-012-0293-1","type":"journal-article","created":{"date-parts":[[2012,11,23]],"date-time":"2012-11-23T08:29:55Z","timestamp":1353659395000},"page":"872-875","source":"Crossref","is-referenced-by-count":0,"title":["Efficient and secure hardware"],"prefix":"10.1007","volume":"36","author":[{"given":"Ingrid","family":"Verbauwhede","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,11,24]]},"reference":[{"key":"293_CR1","unstructured":"Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede and Christophe Geuens, \u201cPrETP: Privacy-Preserving Electronic Toll Pricing\u201d, USENIX Security Symposium 2010."},{"issue":"2","key":"293_CR2","first-page":"203","volume":"46","author":"D. Boneh","year":"1999","unstructured":"Dan Boneh, \u201cTwenty years of attacks on the RSA cryptosystem,\u201d Notise of the American Mathematical Society (AMS), Vol 46, no. 2, pp. 203\u2013213, 1999.","journal-title":"Notise of the American Mathematical Society (AMS)"},{"key":"293_CR3","doi-asserted-by":"crossref","unstructured":"J. Fan, X. Guo, E. De Mulder, P. Schaumont, B. Preneel, and I. Verbauwhede, \u201cState-of-the-art of secure ECC implementations: a survey on known side-channel attacks and countermeasures,\u201d In 3rd IEEE International Symposium on Hardware-Oriented Security and Trust \u2014 HOST 2010, IEEE, pp. 76\u201387, 2010.","DOI":"10.1109\/HST.2010.5513110"},{"issue":"6","key":"293_CR4","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1145\/1516046.1516055","volume":"52","author":"K. Fu","year":"2009","unstructured":"K. Fu, \u201cInside risks, reducing the risks of implantable medical devices: A prescription to improve security and privacy of pervasive health care,\u201d Communications of the ACM, 52(6):25\u201327, June 2009.","journal-title":"Communications of the ACM"},{"key":"293_CR5","unstructured":"Shay Gueron, \u201cIntel Set \u2014 Rev 3.01.\u201d Last retrieved from http:\/\/software.intel.com\/sites\/default\/files\/article\/165683\/aes-wp-2012-09-22-v01.pdf ."},{"key":"293_CR6","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1007\/978-3-642-23822-2_31","volume-title":"Computer Security \u2013 ESORICS 2011","author":"Jens Hermans","year":"2011","unstructured":"J. Hermans, A. Pashalidis, F. Vercauteren, and B. Preneel, \u201cA New RFID Privacy Model,\u201d In 2011st European Symposium on Research in Computer Security (ESORICS 2011), Lecture Notes in Computer Science 6879, V. Atluri, and C. Diaz (eds.), Springer-Verlag, pp. 568\u2013587, 2011."},{"key":"293_CR7","doi-asserted-by":"crossref","unstructured":"Klaus Kursawe, George Danezis, Markulf Kohlweiss: Privacy-Friendly Aggregation for the Smart-Grid. Privacy Enhancing Technologies \u2014 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July 27\u201329, 2011. ISBN 978-3-642-22262-7: pages 175\u2013191.","DOI":"10.1007\/978-3-642-22263-4_10"},{"key":"293_CR8","unstructured":"Stefan Mangard, Elisabeth Oswald, and Thomas Popp, \u201cPower Analysis Attacks \u2014 Revealing the Secrets of Smart Cards,\u201d 2007, Springer."},{"key":"293_CR9","doi-asserted-by":"crossref","unstructured":"C. Schnorr, \u201cEfficient Identification and Signatures for Smart Cards,\u201d In Gilles Brassard, editor, Advances in Cryptology \u2014 CRYPTO\u2019 89 Proceedings, volume 435 of LNCS, pp. 239\u2013252, 1990.","DOI":"10.1007\/0-387-34805-0_22"},{"issue":"7","key":"293_CR10","doi-asserted-by":"publisher","first-page":"1197","DOI":"10.1109\/TCAD.2005.855939","volume":"25","author":"K. Tiri","year":"2006","unstructured":"K. Tiri, and I. Verbauwhede, \u201cA Digital Design Flow for Secure Integrated Circuits,\u201d IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 25(7), pp. 1197\u20131208, 2006.","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"key":"293_CR11","doi-asserted-by":"crossref","unstructured":"I. Verbauwhede, D. Karaklajic, and J. Schmidt, \u201cThe Fault Attack Jungle \u2014 A Classification Model to Guide You,\u201d In International Workshop on Fault Diagnosis and Tolerance in Cryptography 2011, IEEE, pp. 3\u20138, 2011.","DOI":"10.1109\/FDTC.2011.13"},{"issue":"11","key":"293_CR12","doi-asserted-by":"publisher","first-page":"1514","DOI":"10.1109\/TC.2008.148","volume":"57","author":"Y. K. Lee","year":"2008","unstructured":"Y. K. Lee, K. Sakiyama, L. Batina, and I. Verbauwhede, \u201cElliptic-curve based security processor for RFID,\u201d IEEE Trans. Computers, vol. 57, no. 11, pp. 1514\u20131527, 2008.","journal-title":"IEEE Trans. Computers"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0293-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-012-0293-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0293-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0293-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,6]],"date-time":"2019-07-06T01:00:47Z","timestamp":1562374847000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-012-0293-1"}},"subtitle":["For cryptographic algorithms on embedded devices"],"short-title":[],"issued":{"date-parts":[[2012,11,24]]},"references-count":12,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2012,12]]}},"alternative-id":["293"],"URL":"https:\/\/doi.org\/10.1007\/s11623-012-0293-1","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,11,24]]}}}