{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:38:38Z","timestamp":1743154718306,"version":"3.40.3"},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319243146"},{"type":"electronic","value":"9783319243153"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24315-3_27","type":"book-chapter","created":{"date-parts":[[2015,10,5]],"date-time":"2015-10-05T16:20:13Z","timestamp":1444062013000},"page":"265-274","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Differential Fault Attack on LEA"],"prefix":"10.1007","author":[{"given":"Dirmanto","family":"Jap","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jakub","family":"Breier","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2015,11,19]]},"reference":[{"key":"27_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"E Biham","year":"1997","unstructured":"Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski Jr, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513\u2013525. Springer, Heidelberg (1997)"},{"key":"27_CR2","unstructured":"Bogdanov, A., Varici, K., Mouha, N., Velichkov, V., Tischhauser, E., Wang, M., Toz, D., Wang, Q., Rijmen, V.: Security evaluation of the block cipher LEA. Technical report, July 2011"},{"key":"27_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"D Boneh","year":"1997","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37\u201351. Springer, Heidelberg (1997)"},{"key":"27_CR4","series-title":"Information Security and Cryptography","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-642-29656-7_2","volume-title":"Fault Analysis in Cryptography","author":"C Clavier","year":"2012","unstructured":"Clavier, C.: Attacking block ciphers. In: Joye, M., Tunstall, M. (eds.) Fault Analysis in Cryptography. Information Security and Cryptography, pp. 19\u201335. Springer, Heidelberg (2012)"},{"issue":"1","key":"27_CR5","first-page":"56","volume":"6","author":"NK Giang","year":"2015","unstructured":"Giang, N.K., Im, J., Kim, D., Jung, M., Wolfgang, K.: Integrating the EPCIS and building automation system into the internet of things: a lightweight and interoperable approach. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 6(1), 56\u201373 (2015)","journal-title":"J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl."},{"key":"27_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-05149-9_1","volume-title":"Information Security Applications","author":"D Hong","year":"2014","unstructured":"Hong, D., Lee, J.-K., Kim, D.-C., Kwon, D., Ryu, K.H., Lee, D.-G.: LEA: a 128-bit block cipher for fast encryption on common processors. In: Kim, Y., Lee, H., Perrig, A. (eds.) WISA 2013. LNCS, vol. 8267, pp. 3\u201327. Springer, Heidelberg (2014)"},{"issue":"6","key":"27_CR7","doi-asserted-by":"publisher","first-page":"1117","DOI":"10.13089\/JKIISC.2014.24.6.1117","volume":"24","author":"P Myungseo","year":"2014","unstructured":"Myungseo, P., Jongsung, K.: Differential fault analysis of the block cipher LEA. J. Korea Inst. Info. Secur. Cryptology 24(6), 1117\u20131127 (2014)","journal-title":"J. Korea Inst. Info. Secur. Cryptology"},{"issue":"1","key":"27_CR8","first-page":"4","volume":"6","author":"T Robles","year":"2015","unstructured":"Robles, T., Alcarria, R., Mart\u00edn, D., Navarro, M., Calero, R., Iglesias, S., L\u00f3pez, M.: An IoT based reference architecture for smart water management processes. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 6(1), 4\u201323 (2015)","journal-title":"J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl."},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Tupsamudre, H., Bisht, S., Mukhopadhyay, D.: Differential fault analysis on the families of simon and speck ciphers. In: 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp. 40\u201348, September 2014","DOI":"10.1109\/FDTC.2014.14"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24315-3_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T03:49:45Z","timestamp":1569383385000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24315-3_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319243146","9783319243153"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24315-3_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"19 November 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}