{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T05:18:07Z","timestamp":1767849487081,"version":"3.49.0"},"publisher-location":"Cham","reference-count":48,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319752075","type":"print"},{"value":"9783319752082","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-75208-2_10","type":"book-chapter","created":{"date-parts":[[2018,1,25]],"date-time":"2018-01-25T06:34:39Z","timestamp":1516862079000},"page":"160-179","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Instruction Duplication: Leaky and Not Too Fault-Tolerant!"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8114-9875","authenticated-orcid":false,"given":"Lucian","family":"Cojocar","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5008-1756","authenticated-orcid":false,"given":"Kostas","family":"Papagiannopoulos","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Niek","family":"Timmers","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2018,1,26]]},"reference":[{"issue":"2","key":"10_CR1","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1109\/TIT.1967.1054010","volume":"13","author":"A Viterbi","year":"1967","unstructured":"Viterbi, A.: Error bounds for convolutional codes and an asymptotically optimum decoding algorithm. IEEE Trans. Inf. Theor. 13(2), 260\u2013269 (1967). https:\/\/doi.org\/10.1109\/TIT.1967.1054010 . ISSN 0018-9448","journal-title":"IEEE Trans. Inf. Theor."},{"issue":"2","key":"10_CR2","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/5.18626","volume":"77","author":"LR Rabiner","year":"1989","unstructured":"Rabiner, L.R.: A tutorial on hidden Markov models and selected applications in speech recognition. Proc. IEEE 77(2), 257\u2013286 (1989). https:\/\/doi.org\/10.1109\/5.18626 . ISSN 0018-9219","journal-title":"Proc. IEEE"},{"key":"10_CR3","doi-asserted-by":"publisher","unstructured":"Rauzy, P., Guilley, S.: Countermeasures against high-order fault-injection attacks on CRT-RSA. In: 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 68\u201382, September 2014. https:\/\/doi.org\/10.1109\/FDTC.2014.17","DOI":"10.1109\/FDTC.2014.17"},{"key":"10_CR4","doi-asserted-by":"publisher","unstructured":"Agosta, G., Barenghi, A., Pelosi, G.: Automated instantiation of side-channel attacks countermeasures for software cipher implementations. In: Proceedings of the ACM International Conference on Computing Frontiers, CF 2016, Como, pp. 455\u2013460. ACM (2016). https:\/\/doi.org\/10.1145\/2903150.2911707 . ISBN: 978-1-4503-4128-8","DOI":"10.1145\/2903150.2911707"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Amiel, F., et al.: Passive and active combined attacks: combining fault attacks and side channel analysis. In: Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2007, pp. 92\u2013102. IEEE (2007)","DOI":"10.1109\/FDTC.2007.12"},{"key":"10_CR6","unstructured":"Barenghi, A., et al.: countermeasures against fault attacks on software implemented AES: effectiveness and cost. In: Proceedings of the 5th Workshop on Embedded Systems Security, p. 7. ACM (2010). http:\/\/dl.acm.org\/citation.cfm?id=1873555 . Accessed 14 Oct 2016"},{"issue":"11","key":"10_CR7","doi-asserted-by":"crossref","first-page":"3056","DOI":"10.1109\/JPROC.2012.2188769","volume":"100","author":"A Barenghi","year":"2012","unstructured":"Barenghi, A., et al.: Fault injection attacks on cryptographic devices: theory, practice, and countermeasures. Proc. IEEE 100(11), 3056\u20133076 (2012)","journal-title":"Proc. IEEE"},{"key":"10_CR8","unstructured":"Barry, T., Courouss\u00e9, D., Robisson, B.: Compilation of a countermeasure against instruction-skip fault attacks. In: Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, pp. 1\u20136. ACM (2016). http:\/\/dl.acm.org\/citation.cfm?id=2858931 . Accessed 14 Oct 2016"},{"key":"10_CR9","doi-asserted-by":"publisher","unstructured":"Bayrak, A.G., et al.: A first step towards automatic application of power analysis countermeasures. In: Proceedings of the 48th Design Automation Conference, DAC 2011, San Diego, pp. 230\u2013235. ACM (2011). https:\/\/doi.org\/10.1145\/2024724.2024778 . ISBN: 978-1-4503-0636-2","DOI":"10.1145\/2024724.2024778"},{"issue":"2","key":"10_CR10","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1109\/TC.2013.219","volume":"64","author":"AG Bayrak","year":"2015","unstructured":"Bayrak, A.G., et al.: Automatic application of power analysis countermeasures. IEEE Trans. Comput. 64(2), 329\u2013341 (2015)","journal-title":"IEEE Trans. Comput."},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"E Brier","year":"2004","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16\u201329. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-28632-5_2"},{"key":"10_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/3-540-44499-8_20","volume-title":"Cryptographic Hardware and Embedded Systems \u2014 CHES 2000","author":"C Clavier","year":"2000","unstructured":"Clavier, C., Coron, J.-S., Dabbous, N.: Differential power analysis in the presence of hardware countermeasures. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2000. LNCS, vol. 1965, pp. 252\u2013263. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-44499-8_20"},{"key":"10_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/978-3-642-17373-8_7","volume-title":"Advances in Cryptology - ASIACRYPT 2010","author":"F-X Standaert","year":"2010","unstructured":"Standaert, F.-X., Veyrat-Charvillon, N., Oswald, E., Gierlichs, B., Medwed, M., Kasper, M., Mangard, S.: The world is not enough: another look on second-order DPA. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 112\u2013129. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-17373-8_7"},{"key":"10_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1007\/978-3-642-34961-4_44","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2012","author":"N Veyrat-Charvillon","year":"2012","unstructured":"Veyrat-Charvillon, N., Medwed, M., Kerckhof, S., Standaert, F.-X.: Shuffling against side-channel attacks: a comprehensive study with cautionary note. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 740\u2013757. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34961-4_44"},{"key":"10_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-319-08302-5_17","volume-title":"Smart Card Research and Advanced Applications","author":"O Choudary","year":"2014","unstructured":"Choudary, O., Kuhn, M.G.: Efficient template attacks. In: Francillon, A., Rohatgi, P. (eds.) CARDIS 2013. LNCS, vol. 8419, pp. 253\u2013270. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-08302-5_17"},{"key":"10_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-642-37288-9_9","volume-title":"Smart Card Research and Advanced Applications","author":"F Durvaux","year":"2013","unstructured":"Durvaux, F., Renauld, M., Standaert, F.-X., van Oldeneel tot Oldenzeel, L., Veyrat-Charvillon, N.: Efficient removal of random delays from embedded software implementations using Hidden Markov Models. In: Mangard, S. (ed.) CARDIS 2012. LNCS, vol. 7771, pp. 123\u2013140. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-37288-9_9"},{"key":"10_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11894063_1","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"C Archambeau","year":"2006","unstructured":"Archambeau, C., Peeters, E., Standaert, F.-X., Quisquater, J.-J.: Template attacks in principal subspaces. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 1\u201314. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11894063_1"},{"key":"10_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-36400-5_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S Chari","year":"2003","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski, B.S., Ko\u00e7, K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13\u201328. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36400-5_3"},{"key":"10_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-662-44709-3_6","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2014","author":"H Tupsamudre","year":"2014","unstructured":"Tupsamudre, H., Bisht, S., Mukhopadhyay, D.: Destroying fault invariant with randomization - a countermeasure for AES against differential fault attacks. In: Batina, L., Robshaw, M. (eds.) CHES 2014. LNCS, vol. 8731, pp. 93\u2013111. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44709-3_6"},{"key":"10_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-319-43283-0_9","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"A Battistello","year":"2016","unstructured":"Battistello, A., Giraud, C.: A note on the security of CHES 2014 symmetric infective countermeasure. In: Standaert, F.-X., Oswald, E. (eds.) COSADE 2016. LNCS, vol. 9689, pp. 144\u2013159. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-43283-0_9"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Lomn\u00e9, V., Roche, T., Thillard, A.: On the need of randomness in fault attack countermeasures - application to AES. In: FDTC 2012 (2012)","DOI":"10.1109\/FDTC.2012.19"},{"key":"10_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/11889700_15","volume-title":"Fault Diagnosis and Tolerance in Cryptography","author":"TG Malkin","year":"2006","unstructured":"Malkin, T.G., Standaert, F.-X., Yung, M.: A comparative cost\/security analysis of fault attack countermeasures. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2006. LNCS, vol. 4236, pp. 159\u2013172. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11889700_15"},{"key":"10_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-642-33481-8_17","volume-title":"Progress in Cryptology \u2013 LATINCRYPT 2012","author":"B Gierlichs","year":"2012","unstructured":"Gierlichs, B., Schmidt, J.-M., Tunstall, M.: Infective computation and dummy rounds: fault protection for block ciphers without check-before-output. In: Hevia, A., Neven, G. (eds.) LATINCRYPT 2012. LNCS, vol. 7533, pp. 305\u2013321. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33481-8_17"},{"key":"10_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/978-3-319-24126-5_12","volume-title":"Security, Privacy, and Applied Cryptography Engineering","author":"S Patranabis","year":"2015","unstructured":"Patranabis, S., Chakraborty, A., Mukhopadhyay, D.: Fault tolerant infective countermeasure for AES. In: Chakraborty, R.S., Schwabe, P., Solworth, J. (eds.) SPACE 2015. LNCS, vol. 9354, pp. 190\u2013209. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24126-5_12"},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Joye, M., Manet, P., Rigaud, J.-B.: Strengthening hardware AES implementations against fault attacks. In: IET Information Security (2007)","DOI":"10.1049\/iet-ifs:20060163"},{"key":"10_CR26","series-title":"Information Security and Cryptography","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/978-3-642-29656-7_15","volume-title":"Fault Analysis in Cryptography","author":"F Regazzoni","year":"2012","unstructured":"Regazzoni, F., Breveglieri, L., Ienne, P., Koren, I.: Interaction between fault attack countermeasures and the resistance against power analysis attacks. In: Joye, M., Tunstall, M. (eds.) Fault Analysis in Cryptography. Information Security and Cryptography, pp. 257\u2013272. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-29656-7_15"},{"key":"10_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-319-31271-2_7","volume-title":"Smart Card Research and Advanced Applications","author":"L Dureuil","year":"2016","unstructured":"Dureuil, L., Potet, M.-L., de Choudens, P., Dumas, C., Cl\u00e9di\u00e8re, J.: From code review to fault injection attacks: filling the gap using fault model inference. In: Homma, N., Medwed, M. (eds.) CARDIS 2015. LNCS, vol. 9514, pp. 107\u2013124. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-31271-2_7"},{"key":"10_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/978-3-540-45203-4_23","volume-title":"Applied Cryptography and Network Security","author":"P Dusart","year":"2003","unstructured":"Dusart, P., Letourneux, G., Vivolo, O.: Differential fault analysis on A.E.S. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol. 2846, pp. 293\u2013306. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45203-4_23"},{"key":"10_CR29","doi-asserted-by":"crossref","unstructured":"Korak, T., et al.: Clock glitch attacks in the presence of heating. In: FDTC 2014 (2014)","DOI":"10.1109\/FDTC.2014.20"},{"key":"10_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/978-3-642-15031-9_22","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"Y Li","year":"2010","unstructured":"Li, Y., Sakiyama, K., Gomisawa, S., Fukunaga, T., Takahashi, J., Ohta, K.: Fault sensitivity analysis. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 320\u2013334. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15031-9_22"},{"key":"10_CR31","doi-asserted-by":"crossref","unstructured":"Luo, P., et al.: Side-channel power analysis of different protection schemes against fault attacks on AES. In: ReConfig 2014 (2014)","DOI":"10.1109\/ReConFig.2014.7032555"},{"key":"10_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/978-3-642-39884-1_19","volume-title":"Financial Cryptography and Data Security","author":"J Maebe","year":"2013","unstructured":"Maebe, J., De Keulenaer, R., De Sutter, B., De Bosschere, K.: Mitigating smart card fault injection with link-time code rewriting: a feasibility study. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 221\u2013229. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39884-1_19"},{"issue":"11","key":"10_CR33","doi-asserted-by":"crossref","first-page":"1528","DOI":"10.1109\/TC.2008.149","volume":"57","author":"P Maistri","year":"2008","unstructured":"Maistri, P., Leveugle, R.: Double-data-rate computation as a countermeasure against fault analysis. IEEE Trans. Comput. 57(11), 1528\u20131539 (2008)","journal-title":"IEEE Trans. Comput."},{"issue":"6","key":"10_CR34","doi-asserted-by":"crossref","first-page":"7994","DOI":"10.3390\/s120607994","volume":"12","author":"P Malag\u00f3n","year":"2012","unstructured":"Malag\u00f3n, P., et al.: Compiler optimizations as a countermeasure against side-channel analysis in MSP430-based devices. Sensors 12(6), 7994\u20138012 (2012)","journal-title":"Sensors"},{"key":"10_CR35","doi-asserted-by":"crossref","unstructured":"Medwed, M., Schmidt, J.-M.: A generic fault countermeasure providing data and program flow integrity. In: 5th Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2008, pp. 68\u201373. IEEE (2008)","DOI":"10.1109\/FDTC.2008.11"},{"key":"10_CR36","doi-asserted-by":"crossref","unstructured":"Moro, N., et al.: Electromagnetic fault injection: towards a fault model on a 32-bit microcontroller. In: FDTC 2013 (2013)","DOI":"10.1109\/FDTC.2013.9"},{"issue":"3","key":"10_CR37","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/s13389-014-0077-7","volume":"4","author":"N Moro","year":"2014","unstructured":"Moro, N., et al.: Formal verification of a software countermeasure against instruction skip attacks. J. Cryptogr. Eng. 4(3), 145\u2013156 (2014)","journal-title":"J. Cryptogr. Eng."},{"key":"10_CR38","doi-asserted-by":"crossref","unstructured":"Moro, N., et al.: Experimental evaluation of two software countermeasures against fault attacks. In: HOST 2014 (2014)","DOI":"10.1109\/HST.2014.6855580"},{"key":"10_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/978-3-642-33027-8_4","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2012","author":"A Moss","year":"2012","unstructured":"Moss, A., Oswald, E., Page, D., Tunstall, M.: Compiler assisted masking. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol. 7428, pp. 58\u201375. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33027-8_4"},{"key":"10_CR40","doi-asserted-by":"crossref","unstructured":"Pahlevanzadeh, H., Dofe, J., Yu, Q.: Assessing CPA resistance of AES with different fault tolerance mechanisms. In: ASP-DAC 2016 (2016)","DOI":"10.1109\/ASPDAC.2016.7428087"},{"key":"10_CR41","doi-asserted-by":"crossref","unstructured":"Patranabis, S., et al.: One plus one is more than two: a practical combination of power and fault analysis attacks on PRESENT and PRESENT-like block ciphers. In: FDTC 2017. IEEE (2017)","DOI":"10.1109\/FDTC.2017.11"},{"key":"10_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1007\/978-3-642-38348-9_9","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2013","author":"E Prouff","year":"2013","unstructured":"Prouff, E., Rivain, M.: Masking against side-channel attacks: a formal security proof. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 142\u2013159. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38348-9_9"},{"key":"10_CR43","doi-asserted-by":"crossref","unstructured":"Regazzoni, F., et al.: Power attacks resistance of cryptographic s-boxes with added error detection circuits. In: DFT 2007 (2007)","DOI":"10.1109\/DFT.2007.61"},{"key":"10_CR44","doi-asserted-by":"crossref","unstructured":"Regazzoni, F., et al.: Can knowledge regarding the presence of countermeasures against fault attacks simplify power attacks on cryptographic devices? In: DFT 2008 (2008)","DOI":"10.1109\/DFT.2008.53"},{"key":"10_CR45","doi-asserted-by":"crossref","unstructured":"Riviere, L., et al.: High precision fault injections on the instruction cache of ARMv7-M architectures. In: HOST 2015 (2015)","DOI":"10.1109\/HST.2015.7140238"},{"key":"10_CR46","doi-asserted-by":"crossref","unstructured":"Timmers, N., Spruyt, A., Witteman, M.: Controlling PC on ARM Using Fault Injection. In: FDTC 2016 (2016)","DOI":"10.1109\/FDTC.2016.18"},{"key":"10_CR47","doi-asserted-by":"crossref","unstructured":"Verbauwhede, I., Karaklajic, D., Schmidt, J.-M.: The fault attack jungle-a classification model to guide you. In: FDTC 2011 (2011)","DOI":"10.1109\/FDTC.2011.13"},{"key":"10_CR48","doi-asserted-by":"crossref","unstructured":"Yuce, B., et al.: Software fault resistance is futile: effective single-glitch attacks. In: FDTC 2016, pp. 47\u201358 (2016)","DOI":"10.1109\/FDTC.2016.21"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-75208-2_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,9]],"date-time":"2019-10-09T16:20:26Z","timestamp":1570638026000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-75208-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319752075","9783319752082"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-75208-2_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}