{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T15:26:27Z","timestamp":1743002787781,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319101743"},{"type":"electronic","value":"9783319101750"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-10175-0_15","type":"book-chapter","created":{"date-parts":[[2014,8,14]],"date-time":"2014-08-14T07:37:06Z","timestamp":1408001826000},"page":"214-228","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["A Multiple-Fault Injection Attack by Adaptive Timing Control Under Black-Box Conditions and a Countermeasure"],"prefix":"10.1007","author":[{"given":"Sho","family":"Endo","sequence":"first","affiliation":[]},{"given":"Naofumi","family":"Homma","sequence":"additional","affiliation":[]},{"given":"Yu-ichi","family":"Hayashi","sequence":"additional","affiliation":[]},{"given":"Junko","family":"Takahashi","sequence":"additional","affiliation":[]},{"given":"Hitoshi","family":"Fuji","sequence":"additional","affiliation":[]},{"given":"Takafumi","family":"Aoki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,15]]},"reference":[{"unstructured":"ARMv8 instruction set overview (2012). https:\/\/silver.arm.com\/download\/ARM_and_AMBA_Architecture\/AR100-DA-70501-r0p0-00eac5\/ARMv8_ISA_PRD03-GENC-010197-30-0.pdf","key":"15_CR1"},{"issue":"2","key":"15_CR2","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1109\/JPROC.2005.862424","volume":"94","author":"H Bar-El","year":"2006","unstructured":"Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The sorcerer\u2019s apprentice guide to fault attacks. Proc. IEEE 94(2), 370\u2013382 (2006)","journal-title":"Proc. IEEE"},{"doi-asserted-by":"crossref","unstructured":"Barenghi, A., Breveglieri, L., Koren, I., Pelosi, G., Regazzoni, F.: Countermeasures against fault attacks on software implemented AES: effectiveness and cost. In: Proceedings of the 5th Workshop on Embedded Systems Security (WESS), pp. 7:1\u20137:10, October 2010","key":"15_CR3","DOI":"10.1145\/1873548.1873555"},{"key":"15_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"E Biham","year":"1997","unstructured":"Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513\u2013525. Springer, Heidelberg (1997)"},{"key":"15_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"D Boneh","year":"1997","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37\u201351. Springer, Heidelberg (1997)"},{"unstructured":"Ciet, M., Joye, M.: Practical fault countermeasures for Chinese remaindering based RSA. In: FDTC 2005, pp. 124\u2013131, September 2005","key":"15_CR6"},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-540-74735-2_13","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"C Clavier","year":"2007","unstructured":"Clavier, C.: Secret external encodings do not prevent transient fault analysis. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 181\u2013194. Springer, Heidelberg (2007)"},{"key":"15_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-3-642-15031-9_7","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"J-S Coron","year":"2010","unstructured":"Coron, J.-S., Kizhvatov, I.: Analysis and improvement of the random delay countermeasure of CHES 2009. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 95\u2013109. Springer, Heidelberg (2010)"},{"doi-asserted-by":"crossref","unstructured":"Dehbaoui, A., Dutertre, J.M., Robisson, B., Tria, A.: Electromagnetic transient faults injection on a hardware and a software implementations of AES. In: FDTC 2012, pp. 7\u201315, September 2012","key":"15_CR9","DOI":"10.1109\/FDTC.2012.15"},{"unstructured":"Endo, S., Hayashi, Y.i., Homma, N., Aoki, T., Katashita, T., Hori, Y., Sakiyama, K., Nagata, M., Danger, J.L., Le, T.H., Bazargan-Sabet, P.: Measurement of side-channel information from cryptographic devices on security evaluation platform: demonstration of SPACES project. In: Proceedings of SICE Annual Conference, pp. 313\u2013316, August 2012","key":"15_CR10"},{"key":"15_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1007\/978-3-540-72354-7_18","volume-title":"Information Security Theory and Practices","author":"CH Kim","year":"2007","unstructured":"Kim, C.H., Quisquater, J.-J.: Fault attacks for CRT based RSA: new attacks, new results, and new countermeasures. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. LNCS, vol. 4462, pp. 215\u2013228. Springer, Heidelberg (2007)"},{"doi-asserted-by":"crossref","unstructured":"Medwed, M., Schmidt, J.M.: A continuous fault countermeasure for AES providing a constant error detection rate. In: FDTC 2010, pp. 66\u201371, August 2010","key":"15_CR12","DOI":"10.1109\/FDTC.2010.16"},{"key":"15_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/11894063_8","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"A Moradi","year":"2006","unstructured":"Moradi, A., Shalmani, M.T.M., Salmasizadeh, M.: A generalized method of differential fault attack against AES cryptosystem. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 91\u2013100. Springer, Heidelberg (2006)"},{"doi-asserted-by":"crossref","unstructured":"Moro, N., Dehbaoui, A., Heydemann, K., Robisson, B., Encrenaz, E.: Electromagnetic fault injection: towards a fault model on a 32-bit microcontroller. In: FDTC 2013, pp. 77\u201388, August 2013","key":"15_CR14","DOI":"10.1109\/FDTC.2013.9"},{"key":"15_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-540-45238-6_7","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"G Piret","year":"2003","unstructured":"Piret, G., Quisquater, J.-J.: A differential fault attack technique against SPN structures, with application to the AES and Khazad. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 77\u201388. Springer, Heidelberg (2003)"},{"doi-asserted-by":"crossref","unstructured":"Saha, D., Mukhopadhyay, D., RoyChowdhury, D.: A diagonal fault attack on the advanced encryption standard. Cryptology ePrint Archive, Report 2009\/581, November 2009","key":"15_CR16","DOI":"10.1007\/978-3-642-02384-2_26"},{"key":"15_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1007\/978-3-540-85053-3_7","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"A Satoh","year":"2008","unstructured":"Satoh, A., Sugawara, T., Homma, N., Aoki, T.: High-performance concurrent error detection scheme for AES hardware. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 100\u2013112. Springer, Heidelberg (2008)"},{"doi-asserted-by":"crossref","unstructured":"Schmidt, J.M., Christoph, H.: A practical fault attack on square and multiply. In: FDTC 2008, pp. 53\u201358, October 2008","key":"15_CR18","DOI":"10.1109\/FDTC.2008.10"},{"doi-asserted-by":"crossref","unstructured":"Trichina, E., Korkikyan, R.: Multi fault laser attacks on protected CRT-RSA. In: FDTC 2010, pp. 75\u201386, August 2010","key":"15_CR19","DOI":"10.1109\/FDTC.2010.14"},{"unstructured":"Witteman, M.: Secure application programming in the presence of side channel attacks (2013). https:\/\/www.riscure.com\/benzine\/documents\/Paper_Side_Channel_Patterns.pdf","key":"15_CR20"}],"container-title":["Lecture Notes in Computer Science","Constructive Side-Channel Analysis and Secure Design"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-10175-0_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T09:53:42Z","timestamp":1676886822000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-10175-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319101743","9783319101750"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-10175-0_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"15 August 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}