{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:17:39Z","timestamp":1743009459020,"version":"3.40.3"},"publisher-location":"Cham","reference-count":9,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031228285"},{"type":"electronic","value":"9783031228292"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-22829-2_4","type":"book-chapter","created":{"date-parts":[[2022,12,6]],"date-time":"2022-12-06T09:13:44Z","timestamp":1670318024000},"page":"70-80","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Bias Cancellation of\u00a0MixColumns"],"prefix":"10.1007","author":[{"given":"Subhadeep","family":"Banik","sequence":"first","affiliation":[]},{"given":"Andrea","family":"Caforio","sequence":"additional","affiliation":[]},{"given":"Kostas","family":"Papagiannopoulos","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Regazzoni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,7]]},"reference":[{"key":"4_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-030-35869-3_4","volume-title":"Security, Privacy, and Applied Cryptography Engineering","author":"A Caforio","year":"2019","unstructured":"Caforio, A., Banik, S.: A study of persistent fault analysis. In: Bhasin, S., Mendelson, A., Nandi, M. (eds.) SPACE 2019. LNCS, vol. 11947, pp. 13\u201333. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-35869-3_4"},{"key":"4_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-68773-1_1","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"S Carr\u00e9","year":"2021","unstructured":"Carr\u00e9, S., Guilley, S., Rioul, O.: Persistent fault analysis with few encryptions. In: Bertoni, G.M., Regazzoni, F. (eds.) COSADE 2020. LNCS, vol. 12244, pp. 3\u201324. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-68773-1_1"},{"key":"4_CR3","doi-asserted-by":"publisher","unstructured":"Engels, S., Schellenberg, F., Paar, C.: SPFA: SFA on multiple persistent faults. In: 17th Workshop on Fault Detection and Tolerance in Cryptography, FDTC 2020, Milan, Italy, 13 September 2020, pp. 49\u201356. IEEE (2020). https:\/\/doi.org\/10.1109\/FDTC51366.2020.00014","DOI":"10.1109\/FDTC51366.2020.00014"},{"key":"4_CR4","doi-asserted-by":"publisher","unstructured":"Fuhr, T., Jaulmes, \u00c9., Lomn\u00e9, V., Thillard, A.: Fault attacks on AES with faulty ciphertexts only. In: Fischer, W., Schmidt, J. (eds.) 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, Los Alamitos, CA, USA, 20 August 2013, pp. 108\u2013118. IEEE Computer Society (2013). https:\/\/doi.org\/10.1109\/FDTC.2013.18","DOI":"10.1109\/FDTC.2013.18"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/978-3-319-40667-1_15","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"D Gruss","year":"2016","unstructured":"Gruss, D., Maurice, C., Mangard, S.: Rowhammer.js: a remote software-induced fault attack in JavaScript. In: Caballero, J., Zurutuza, U., Rodr\u00edguez, R.J. (eds.) DIMVA 2016. LNCS, vol. 9721, pp. 300\u2013321. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-40667-1_15"},{"issue":"3","key":"4_CR6","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1109\/TDSC.2018.2857770","volume":"16","author":"W Li","year":"2019","unstructured":"Li, W., et al.: Ciphertext-only fault analysis on the led lightweight cryptosystem in the internet of things. IEEE Trans. Dependable Secur. Comput. 16(3), 454\u2013461 (2019). https:\/\/doi.org\/10.1109\/TDSC.2018.2857770","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"4_CR7","doi-asserted-by":"publisher","unstructured":"Soleimany, H., Bagheri, N., Hadipour, H., Ravi, P., Bhasin, S., Mansouri, S.: Practical multiple persistent faults analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 367\u2013390 (2022). https:\/\/doi.org\/10.46586\/tches.v2022.i1.367-390","DOI":"10.46586\/tches.v2022.i1.367-390"},{"key":"4_CR8","doi-asserted-by":"publisher","unstructured":"Zhang, F., et al.: Persistent fault analysis on block ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 150\u2013172 (2018). https:\/\/doi.org\/10.13154\/tches.v2018.i3.150-172","DOI":"10.13154\/tches.v2018.i3.150-172"},{"key":"4_CR9","doi-asserted-by":"publisher","unstructured":"Zhang, F., et al.: Persistent fault attack in practice. IACR Trans. Cryptogr. Hardw. Embed. Syst. 172\u2013195 (2020). https:\/\/doi.org\/10.13154\/tches.v2020.i2.172-195","DOI":"10.13154\/tches.v2020.i2.172-195"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Applied Cryptography Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-22829-2_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,6]],"date-time":"2022-12-06T20:13:47Z","timestamp":1670357627000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-22829-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031228285","9783031228292"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-22829-2_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"7 December 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPACE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy, and Applied Cryptography Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Madras","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"space2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"61","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.69","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}