aewag / physical-attack-collection

0 stars 0 forks source link

Medwed_2009 #213

Open aewag opened 2 hours ago

aewag commented 2 hours ago

WDYT? Is this publication in scope?

@inbook{Medwed_2009,
 author = {Medwed, Marcel and Oswald, Elisabeth},
 booktitle = {Information Security Applications},
 doi = {10.1007/978-3-642-00306-6_2},
 isbn = {9783642003066},
 issn = {1611-3349},
 pages = {14–27},
 publisher = {Springer Berlin Heidelberg},
 title = {Template Attacks on ECDSA},
 url = {http://dx.doi.org/10.1007/978-3-642-00306-6_2},
 year = {2009}
}

URL: http://dx.doi.org/10.1007/978-3-642-00306-6_2 Google Scholar: https://scholar.google.de/scholar?hl=en&q=10.1007/978-3-642-00306-6_2

aewag commented 2 hours ago

yes

aewag commented 1 hour ago

I didnot find DOIs for the following references:

[
    {
        "volume-title": "Power Analysis Attacks \u2013 Revealing the Secrets of Smart Cards",
        "year": "2007",
        "author": "S. Mangard",
        "key": "2_CR1",
        "unstructured": "Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks \u2013 Revealing the Secrets of Smart Cards. Springer, Heidelberg (2007)"
    },
    {
        "key": "2_CR7",
        "unstructured": "National Institute of Standards and Technology (NIST): FIPS-186-2: Digital Signature Standard (DSS) (2000), \n                    \n                      http://www.itl.nist.gov/fipspubs/"
    },
    {
        "key": "2_CR11",
        "unstructured": "Demuth, M.: Lattice attacks on ECDSA. Master\u2019s thesis, Graz University of Technology (2006)"
    },
    {
        "key": "2_CR12",
        "unstructured": "Jaffe, J.: Introduction to Differential Power Analysis. Presented at ECRYPT Summerschool on Cryptographic Hardware, Side Channel and Fault Analysis (2006)"
    }
]