%PDF-1.5 % 4 0 obj << /S /GoTo /D (section.1) >> endobj 7 0 obj (Introduction) endobj 8 0 obj << /S /GoTo /D (section.2) >> endobj 11 0 obj (Contact-based Measurement Setup) endobj 12 0 obj << /S /GoTo /D (subsection.2.1) >> endobj 15 0 obj (Fault-Injection Measurement Setup) endobj 16 0 obj << /S /GoTo /D (subsection.2.2) >> endobj 19 0 obj (Power-Consumption Measurement Setup) endobj 20 0 obj << /S /GoTo /D (section.3) >> endobj 23 0 obj (Description of the Attacks) endobj 24 0 obj << /S /GoTo /D (section.4) >> endobj 27 0 obj (Results) endobj 28 0 obj << /S /GoTo /D (subsection.4.1) >> endobj 31 0 obj (Fault Attacks using Spikes) endobj 32 0 obj << /S /GoTo /D (subsection.4.2) >> endobj 35 0 obj (Power-Analysis Attacks) endobj 36 0 obj << /S /GoTo /D (section.5) >> endobj 39 0 obj (Conclusion) endobj 40 0 obj << /S /GoTo /D (section*.2) >> endobj 43 0 obj (References) endobj 44 0 obj << /S /GoTo /D [45 0 R /FitV] >> endobj 62 0 obj << /Length 5142 /Filter /FlateDecode >> stream xڥ[[sF~#U%kI: k` Њן{pU[%3==7|_߾x>1;M;q=_ofa:jnqM2饞52Ɏ}_~Kfgb'ICmRJh=zIBZxGyh^G:N77ㆁ̈́.7ht/glkfS2§PWp}C[gvZnꤑxNS*'cj8o-Nce}@bkf7m]*f7nA_7:Q2|2¡}]_ oM{lWQhiKDX쯈=^E$J )չ*GNJ'KKdi:~'AM112cݯP
-F"pz)gh+:bYh9u$%)ݕmjX/uv8zFY1xJ~t<;.*Gȏ
v7;:(u婫_R|wZv鄐*C
Z'"J;TW۬96'J5BH/7ߩ(Cp7c/62aN߽|YmЎdI7on:8t=P%S3/ n
j!A'J ^ "*7^s9@2_nȘ(pB/F=}=,O韓R7S}(fSiXQqц3`Z86N8 U݇Y1
PJ1V((\gͣ3X?d*lN,e:ILLzj#` Jhr7TJiΚ\Z>|i*?yyfihpU.MEBN&ZjlOnt,k; a OR0>gRÏWޟ%z6veu˴imِ *}Y`#К'WgNYN-zn