{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T15:42:56Z","timestamp":1743003776608,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319494449"},{"type":"electronic","value":"9783319494456"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49445-6_3","type":"book-chapter","created":{"date-parts":[[2016,11,17]],"date-time":"2016-11-17T12:50:31Z","timestamp":1479387031000},"page":"47-65","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Comprehensive Laser Sensitivity Profiling and Data Register Bit-Flips for Cryptographic Fault Attacks in 65 Nm FPGA"],"prefix":"10.1007","author":[{"given":"Wei","family":"He","sequence":"first","affiliation":[]},{"given":"Jakub","family":"Breier","sequence":"additional","affiliation":[]},{"given":"Shivam","family":"Bhasin","sequence":"additional","affiliation":[]},{"given":"Dirmanto","family":"Jap","sequence":"additional","affiliation":[]},{"given":"Hock Guan","family":"Ong","sequence":"additional","affiliation":[]},{"given":"Chee Lip","family":"Gan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,18]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Agoyan, M., Dutertre, J.M., Mirbaha, A.P., Naccache, D., Ribotta, A.L., Tria, A.: Single-bit DFA using multiple-byte laser fault injection. In: 2010 IEEE International Conference on HST, pp. 113\u2013119 (2010)","DOI":"10.1109\/THS.2010.5655079"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Alderighi, M., Casini, F., d\u2019Angelo, S., Mancini, M., Pastore, S., Sechi, G.R.: Evaluation of single event upset mitigation schemes for sram based FPGAs using the FLIPPER fault injection platform. In: 22nd IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems, DFT 2007, pp. 105\u2013113. IEEE (2007)","DOI":"10.1109\/DFT.2007.45"},{"key":"3_CR3","unstructured":"Anderson, R.: Security engineering: A guide to building dependable distributed systems (2001)"},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201997","author":"E Biham","year":"1997","unstructured":"Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513\u2013525. Springer, Heidelberg (1997). doi: 10.1007\/BFb0052259"},{"issue":"2","key":"3_CR5","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s001450010016","volume":"14","author":"D Boneh","year":"2001","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of eliminating errors in cryptographic computations. J. Cryptology 14(2), 101\u2013119 (2001)","journal-title":"J. Cryptology"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Breier, J., Jap, D.: Testing feasibility of back-side laser fault injection on a microcontroller. In: Proceedings of the WESS 2015, pp. 5:1\u20135:6 (2015)","DOI":"10.1145\/2818362.2818367"},{"issue":"2","key":"3_CR7","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/s00145-010-9083-9","volume":"24","author":"G Canivet","year":"2011","unstructured":"Canivet, G., Maistri, P., Leveugle, R., Cldire, J., Valette, F., Renaudin, M.: Glitch and laser fault attacks onto a secure AES implementation on a SRAM-based FPGA. J. Cryptology 24(2), 247\u2013268 (2011)","journal-title":"J. Cryptology"},{"key":"3_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-3-319-10175-0_16","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"F Courbon","year":"2014","unstructured":"Courbon, F., Loubet-Moundi, P., Fournier, J.J.A., Tria, A.: Adjusting laser injections for fully controlled faults. In: Prouff, E. (ed.) COSADE 2014. LNCS, vol. 8622, pp. 229\u2013242. Springer, Heidelberg (2014). doi: 10.1007\/978-3-319-10175-0_16"},{"key":"3_CR9","unstructured":"Courtois, N.T., Jackson, K., Ware, D.: Fault-algebraic attacks on inner rounds of des. In: e-Smart\u201910 Proceedings: The Future of Digital Security Technologies (2010)"},{"key":"3_CR10","unstructured":"Dutertre, J.M., Mirbaha, A.P., Naccache, D., Tria, A.: Reproducible single-byte laser fault injection. In: 2010 Conference on PRIME, pp. 1\u20134 (2010)"},{"issue":"11","key":"3_CR11","doi-asserted-by":"publisher","first-page":"1305","DOI":"10.1016\/j.solmat.2008.06.009","volume":"92","author":"MA Green","year":"2008","unstructured":"Green, M.A.: Self-consistent optical parameters of intrinsic silicon at 300 k including temperature coefficients. Solar Energy Mater. Solar Cells 92(11), 1305\u20131310 (2008)","journal-title":"Solar Energy Mater. Solar Cells"},{"key":"3_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999). doi: 10.1007\/3-540-48405-1_25"},{"key":"3_CR13","first-page":"9","volume":"99","author":"O K\u00f6mmerling","year":"1999","unstructured":"K\u00f6mmerling, O., Kuhn, M.G.: Design principles for tamper-resistant smartcard processors. Smartcard 99, 9\u201320 (1999)","journal-title":"Smartcard"},{"issue":"6","key":"3_CR14","doi-asserted-by":"publisher","first-page":"3130","DOI":"10.1109\/TNS.2014.2369008","volume":"61","author":"F Lima Kastensmidt","year":"2014","unstructured":"Lima Kastensmidt, F., Tambara, L., Bobrovsky, D.V., Pechenkin, A.A., Nikiforov, A.Y.: Laser testing methodology for diagnosing diverse soft errors in a nanoscale sram-based fpga. Nucl. Sci. IEEE Trans. 61(6), 3130\u20133137 (2014)","journal-title":"Nucl. Sci. IEEE Trans."},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Maurine, P.: Techniques for em fault injection: equipments and experimental results. In: 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp. 3\u20134. IEEE (2012)","DOI":"10.1109\/FDTC.2012.21"},{"key":"3_CR16","unstructured":"Pouget, V., Douin, A., Lewis, D., Fouillat, P., Foucard, G., Peronnard, P., Maingot, V., Ferron, J., Anghel, L., Leveugle, R., Velazco, R.: Tools and methodology development for pulsed laser fault injection in SRAM-based FPGAs. In: 8th LATW 2007), p. Session 8. IEEE Computer Society, Cuzco, Peru (2007)"},{"key":"3_CR17","unstructured":"Quisquater, J.J., Samyde, D.: Eddy current for magnetic analysis with active sensor. In: Esmart 2002, Nice, France (2002)"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Roscian, C., Dutertre, J.M., Tria, A.: Frontside laser fault injection on cryptosystems - Application to the AES\u2019 last round. In: 2013 IEEE International Symposium on HOST, pp. 119\u2013124 (2013)","DOI":"10.1109\/HST.2013.6581576"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Roscian, C., Sarafianos, A., Dutertre, J.M., Tria, A.: Fault model analysis of laser-induced faults in SRAM memory cells. In: 2013 Workshop on FDTC, pp. 89\u201398 (2013)","DOI":"10.1109\/FDTC.2013.17"},{"key":"3_CR20","doi-asserted-by":"publisher","first-page":"5531","DOI":"10.1103\/PhysRevB.23.5531","volume":"23","author":"PE Schmid","year":"1981","unstructured":"Schmid, P.E.: Optical absorption in heavily doped silicon. Phys. Rev. B 23, 5531\u20135536 (1981)","journal-title":"Phys. Rev. B"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Selmke, B., Brummer, S., Heyszl, J., Sigl, G.: Precise laser fault injections into 90nm and 45nm SRAM-cells. In: CARDIS, pp. 1\u201313 (2015)","DOI":"10.1007\/978-3-319-31271-2_12"},{"issue":"8","key":"3_CR22","doi-asserted-by":"publisher","first-page":"1248","DOI":"10.1109\/JPROC.2014.2331672","volume":"102","author":"SM Trimberger","year":"2014","unstructured":"Trimberger, S.M., Moore, J.J.: Fpga security: Motivations, features, and applications. Proc. IEEE 102(8), 1248\u20131265 (2014)","journal-title":"Proc. IEEE"},{"key":"3_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-642-21040-2_15","volume-title":"Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication","author":"M Tunstall","year":"2011","unstructured":"Tunstall, M., Mukhopadhyay, D., Ali, S.: Differential fault analysis of the advanced encryption standard using a single fault. In: Ardagna, C.A., Zhou, J. (eds.) WISTP 2011. LNCS, vol. 6633, pp. 224\u2013233. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-21040-2_15"},{"issue":"2","key":"3_CR24","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/s10765-013-1414-2","volume":"34","author":"H Wang","year":"2013","unstructured":"Wang, H., Liu, X., Zhang, Z.: Absorption coefficients of crystalline silicon at wavelengths from 500 nm to 1000 nm. Int. J. Thermophys. 34(2), 213\u2013225 (2013)","journal-title":"Int. J. Thermophys."}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Applied Cryptography Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49445-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,14]],"date-time":"2022-07-14T00:40:49Z","timestamp":1657759249000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49445-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319494449","9783319494456"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49445-6_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"18 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPACE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy, and Applied Cryptography Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hyderabad","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"space2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}