{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T15:50:52Z","timestamp":1762876252669,"version":"3.37.3"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,1,19]],"date-time":"2021-01-19T00:00:00Z","timestamp":1611014400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,19]],"date-time":"2021-01-19T00:00:00Z","timestamp":1611014400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s12095-020-00469-5","type":"journal-article","created":{"date-parts":[[2021,1,19]],"date-time":"2021-01-19T16:02:53Z","timestamp":1611072173000},"page":"363-376","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Quiescent photonics side channel analysis: Low cost SRAM readout attack"],"prefix":"10.1007","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7742-3536","authenticated-orcid":false,"given":"Mustafa","family":"Faraj","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7835-3741","authenticated-orcid":false,"given":"Catherine","family":"Gebotys","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,19]]},"reference":[{"key":"469_CR1","unstructured":"Allied Vision: G-145 Near-Infrared (NIR) camera with Sony ICX285 sensor https:\/\/www.alliedvision.com\/en\/products\/cameras\/detail\/Manta\/G-145%20NIR.html"},{"key":"469_CR2","doi-asserted-by":"crossref","unstructured":"Courbon, F., Loubet-Moundi, P., Fournier, J., Tria, A.: Adjusting Laser injections for fully controlled faults, Presentation slides, http:\/\/www.cl.cam.ac.uk\/~fr26\/Papers\/COSADE_Courbon_et_al_slides.pdf, April 2014","DOI":"10.1007\/978-3-319-10175-0_16"},{"key":"469_CR3","doi-asserted-by":"crossref","unstructured":"Di-Battista, J., Courrege, J.-C., Rouzeyre, B., Torres, L., Perdu, P.: When failure analysis meets side-channel attacks. CHES 2010, Vol. 6225 LNCS, pp. 188\u2013202. Springer Berlin\/Heidelberg (2011)","DOI":"10.1007\/978-3-642-15031-9_13"},{"key":"469_CR4","doi-asserted-by":"crossref","unstructured":"Ferrigno, J., Hlav\u00e1\u010d, M.: When AES blinks: introducing optical side channel. Information Security, IET, 2(3):94\u201398, (2008)","DOI":"10.1049\/iet-ifs:20080038"},{"key":"469_CR5","doi-asserted-by":"crossref","unstructured":"Helfmeier, C., Boit, C., Nedospasov, D., Seifert, J.-P.: Cloning Physically unclonable functions Proc. of IEEE Symp. on HOST (2013)","DOI":"10.1109\/HST.2013.6581556"},{"key":"469_CR6","doi-asserted-by":"crossref","unstructured":"Kraemer, J.I.: Why Cryptography Should Not Rely on Physical Attack Complexity. T.U. Berlin, (2015)","DOI":"10.1007\/978-981-287-787-1"},{"key":"469_CR7","doi-asserted-by":"publisher","unstructured":"Lessard S., Dion-Bertrand, L.-I.: Cooling SWIR Sensors \u2013 an overview. White paper, https:\/\/doi.org\/10.13140\/RG.2.2.31365.65764, (2017)","DOI":"10.13140\/RG.2.2.31365.65764"},{"key":"469_CR8","doi-asserted-by":"crossref","unstructured":"Nedospasov, D., Schl\u00f6sser, A., Seifert, J.-P., Orlic, S.: Functional integrated circuit analysis. IEEE Intl Symp on Hardware-Oriented Security and Trust (HOST), (2012)","DOI":"10.1109\/HST.2012.6224328"},{"key":"469_CR9","doi-asserted-by":"publisher","first-page":"700","DOI":"10.1103\/PhysRev.100.700","volume":"100","author":"R Newman","year":"1955","unstructured":"Newman, R.: Visible light from a silicon p-n junction. Phys. Rev. 100, 700\u2013703 (1955)","journal-title":"Phys. Rev."},{"key":"469_CR10","unstructured":"Nohl, K., Evans, D., Starbug, Plotz, H.: Reverse-engineering a cryptographic RFID tag. In Proc of 17th Usenix Security Symp 2008"},{"key":"469_CR11","doi-asserted-by":"crossref","unstructured":"Oswald, D., et al.: When reverse engineering meets side channel analysis digital lock picking in practice. Proc. of Selected Areas in Cryptography, LNCS 8282, Springer (2013)","DOI":"10.1007\/978-3-662-43414-7_29"},{"key":"469_CR12","unstructured":"Polonsky, S., et al.: CMOS IC diagnostics using the luminescence of off-state leakage currents. Proc. of Intl Test Conf., pp. 134\u2013139 (2004)"},{"key":"469_CR13","doi-asserted-by":"crossref","unstructured":"Polonsky, S., et al.: Photon Emissions Microscopy of inter\/intra chip device performance variations, Microelectronics reliability, 45, Elsevier (2005) 10.1016.jmicrorel.05.07.31, pp. 1471\u20131475","DOI":"10.1016\/j.microrel.2005.07.031"},{"key":"469_CR14","doi-asserted-by":"crossref","unstructured":"Schlosser, A., Nedospasov, D., Kramer, J., Orlic, S., Seifert, J.-P.: Simple photonic emissions analysis of AES (2013)","DOI":"10.1007\/s13389-013-0053-7"},{"key":"469_CR15","doi-asserted-by":"crossref","unstructured":"Shehata, A.B., et al.: Novel NIR Camera with Extended Sensitivity and Low Noise for PEM of VLSI Circuits, Proc of Intl. Symp. Testing and Failure Analysis, ASM Intl (2014)","DOI":"10.31399\/asm.cp.istfa2014p0006"},{"key":"469_CR16","doi-asserted-by":"crossref","unstructured":"Skorbogatov, S.: Using Optical Emission Analysis for Estimating Contributions to Power Analysis, IEEE Proc. of Workshop on Fault diagnosis and tolerance in cryptography (2009)","DOI":"10.1109\/FDTC.2009.39"},{"key":"469_CR17","doi-asserted-by":"crossref","unstructured":"Stellari, F., Song, P., et al.: Revealing SRAM memory content using spontaneous photon emission. In Proc of 34th VLSI Test Symp 2016","DOI":"10.1109\/VTS.2016.7477272"},{"key":"469_CR18","unstructured":"Tajik, S.: On the Physical Security of Physically Unclonable Functions, PhD Thesis, T.U. Berlin (2017)"},{"key":"469_CR19","unstructured":"Xenics: XEVA-1.7-320 Shortwave infrared (SWIR) camera, xenics.com"},{"key":"469_CR20","unstructured":"Xenics: Bobcat-320 - Shortwave infrared (SWIR) camera xenics.com"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-020-00469-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-020-00469-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-020-00469-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T17:27:15Z","timestamp":1724347635000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-020-00469-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,19]]},"references-count":20,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["469"],"URL":"https:\/\/doi.org\/10.1007\/s12095-020-00469-5","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"type":"print","value":"1936-2447"},{"type":"electronic","value":"1936-2455"}],"subject":[],"published":{"date-parts":[[2021,1,19]]},"assertion":[{"value":"27 August 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 December 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 January 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}