{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,6]],"date-time":"2022-04-06T01:31:03Z","timestamp":1649208663543},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2014,11,1]],"date-time":"2014-11-01T00:00:00Z","timestamp":1414800000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1007\/s11623-014-0298-z","type":"journal-article","created":{"date-parts":[[2014,11,14]],"date-time":"2014-11-14T13:20:33Z","timestamp":1415971233000},"page":"747-751","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Krypto-Angriffe \u00fcber Seitenkan\u00e4le"],"prefix":"10.1007","volume":"38","author":[{"given":"Hermann","family":"Drexler","sequence":"first","affiliation":[]},{"given":"Lars","family":"Hoffmann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,6]]},"reference":[{"key":"298_CR1","series-title":"LNCS","first-page":"29","volume-title":"The EM Side-Channels(s)","author":"D Agrawal","year":"2002","unstructured":"Agrawal D., Archambeault B., Rao J., Rohatgi P.; The EM Side-Channels(s); CHES 2002, LNCS 2523; pp. 29\u201345."},{"key":"298_CR2","unstructured":"ARM; Cortex A8; http:\/\/www.arm.com\/products\/processors\/cortex-a\/cortex-a8.php"},{"key":"298_CR3","unstructured":"Bar-El H., Choukri H., Naccache D., Tunstall M., Whelan C.; The Sorcerer\u2019s Apprentice Guide to Fault Attacks; www.eprint.iacr.org\/2004\/100.pdf"},{"key":"298_CR4","volume-title":"Cache-timing attacks on AES","author":"D Bernstein","year":"2005","unstructured":"Bernstein, D.; Cache-timing attacks on AES; 2005; http:\/\/cr.yp.to\/antiforgery\/cachetiming-20050414.pdf ."},{"key":"298_CR5","unstructured":"BlueKrypt; www.keylength.com"},{"key":"298_CR6","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242656","volume-title":"Exposing Private Information by Timing Web Applications","author":"A Bortz","year":"2007","unstructured":"Bortz A., Boneh D., Nandy P.; Exposing Private Information by Timing Web Applications, 2007; http:\/\/crypto.stanford.edu\/~dabo\/pubs\/papers\/webtiming.pdf ."},{"key":"298_CR7","unstructured":"Bundesnetzagentur; Algorithmenkatalog 2014; http:\/\/www.bundesnetzagentur.de\/SharedDocs\/Downloads\/DE\/Sachgebiete\/QES\/Veroeffentlichungen\/Algorithmen\/2014Algorithmenkatalog.pdf"},{"key":"298_CR8","series-title":"LNCS","first-page":"251","volume-title":"Electromagnetic Analysis: Concrete Results","author":"K Gandolfi","year":"2001","unstructured":"Gandolfi K., Mourtel C., Olivier F.; Electromagnetic Analysis: Concrete Results; CHES 2001; LNCS 2162; pp. 251\u2013261."},{"key":"298_CR9","doi-asserted-by":"crossref","unstructured":"Kocher P., Jaffe J., Jun B.; Differential Power Analysis; Crypto\u2019 99, LNCS 1666, pp. 388\u2013397.","DOI":"10.1007\/3-540-48405-1_25"},{"key":"298_CR10","volume-title":"Power Analysis Attacks: Revealing the Secrets of Smart Cards","author":"S Mangard","year":"2007","unstructured":"Mangard S., Oswald E., Popp T.; Power Analysis Attacks: Revealing the Secrets of Smart Cards; Springer 2007."},{"key":"298_CR11","unstructured":"NIST; AES; http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf"},{"key":"298_CR12","volume-title":"Handbuch der Chipkarten","author":"W Rankl","year":"2008","unstructured":"Rankl W., Effing W.; Handbuch der Chipkarten; Hanser Verlag 2008."},{"key":"298_CR13","unstructured":"Rivest R.L., Shamir A., Adleman L.; A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, http:\/\/people.csail.mit.edu\/rivest\/Rsapaper.pdf"},{"key":"298_CR14","volume-title":"Secure the Enterprise with Intel AES-NI","author":"L Xu","year":"2010","unstructured":"Xu, L.; Secure the Enterprise with Intel AES-NI; 2010; http:\/\/www.intel.de\/content\/www\/de\/de\/enterprise-security\/enterprise-security-aes-ni-white-paper.html ."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0298-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-014-0298-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0298-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0298-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,17]],"date-time":"2019-08-17T10:15:31Z","timestamp":1566036931000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-014-0298-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":14,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2014,11]]}},"alternative-id":["298"],"URL":"https:\/\/doi.org\/10.1007\/s11623-014-0298-z","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,11]]}}}