{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,23]],"date-time":"2024-05-23T05:53:58Z","timestamp":1716443638957},"reference-count":0,"publisher":"Walter de Gruyter GmbH","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,2,20]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>This work presents two implementation attacks against cryptographic algorithms. Based on these two presented attacks, this\nthesis shows that the assessment of physical attack complexity is error-prone. Hence, cryptography should not rely on\nit. Cryptographic technologies have to be protected against all implementation attacks, have they already been realized or\nnot. The development of countermeasures does not require the successful execution of an attack but can already be carried\nout as soon as the principle of a side channel or a fault attack is understood.<\/jats:p>","DOI":"10.1515\/itit-2016-0051","type":"journal-article","created":{"date-parts":[[2016,12,17]],"date-time":"2016-12-17T10:00:29Z","timestamp":1481968829000},"page":"53-56","source":"Crossref","is-referenced-by-count":1,"title":["Why cryptography should not rely on physical attack complexity"],"prefix":"10.1515","volume":"59","author":[{"given":"Juliane","family":"Kr\u00e4mer","sequence":"first","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Fachbereich Informatik, Hochschulstr. 10, 64289 Darmstadt Germany"}]}],"member":"374","published-online":{"date-parts":[[2016,12,16]]},"container-title":["it - Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.degruyter.com\/view\/j\/itit.2017.59.issue-1\/itit-2016-0051\/itit-2016-0051.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/itit-2016-0051\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/itit-2016-0051\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T11:44:41Z","timestamp":1624448681000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/itit-2016-0051\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12,16]]},"references-count":0,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2016,12,8]]},"published-print":{"date-parts":[[2017,2,20]]}},"alternative-id":["10.1515\/itit-2016-0051"],"URL":"https:\/\/doi.org\/10.1515\/itit-2016-0051","relation":{},"ISSN":["1611-2776","2196-7032"],"issn-type":[{"value":"1611-2776","type":"print"},{"value":"2196-7032","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,12,16]]}}}