{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:07:39Z","timestamp":1730221659119,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/ewme.2018.8629479","type":"proceedings-article","created":{"date-parts":[[2019,1,31]],"date-time":"2019-01-31T19:36:24Z","timestamp":1548963384000},"page":"67-70","source":"Crossref","is-referenced-by-count":1,"title":["Exploring Embedded Software with Side Channels and Fault Analysis"],"prefix":"10.1109","author":[{"given":"Kerstin","family":"Lemke-Rust","sequence":"first","affiliation":[]},{"given":"Peter","family":"Samarin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15943-0_14"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/978-3-540-45238-6_7","article-title":"A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD","volume":"2779","author":"piret","year":"2003","journal-title":"Cryptographic Hardware and Embedded Systems - CHES 2003"},{"journal-title":"simsim An ATMega163 Simulator","year":"2018","author":"samarin","key":"ref10"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45931-8_13"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78556-1_9"},{"journal-title":"Chipcard Reader for Power Analysis V 1 0","year":"2009","author":"kasper","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2004.1286446"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/BFb0052259","article-title":"Differential Fault Analysis of Secret Key Cryptosystems","volume":"1294","author":"biham","year":"1997","journal-title":"Advances in Cryptology-CRYPTO?98"},{"journal-title":"GIAnT (Generic Implementation ANalysis Toolkit)","year":"2011","author":"oswald","key":"ref9"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","article-title":"Differential Power Analysis","volume":"1666","author":"kocher","year":"1999","journal-title":"Advances in Cryptology-CRYPTO?98"}],"event":{"name":"2018 12th European Workshop on Microelectronics Education (EWME)","start":{"date-parts":[[2018,9,24]]},"location":"Braunschweig, Germany","end":{"date-parts":[[2018,9,26]]}},"container-title":["2018 12th European Workshop on Microelectronics Education (EWME)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8622718\/8629388\/08629479.pdf?arnumber=8629479","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T17:35:58Z","timestamp":1643218558000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8629479\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/ewme.2018.8629479","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}