{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T15:21:56Z","timestamp":1770218516916,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540202080","type":"print"},{"value":"9783540452034","type":"electronic"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-45203-4_23","type":"book-chapter","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T17:01:05Z","timestamp":1277830865000},"page":"293-306","source":"Crossref","is-referenced-by-count":172,"title":["Differential Fault Analysis on A.E.S"],"prefix":"10.1007","author":[{"given":"Pierre","family":"Dusart","sequence":"first","affiliation":[]},{"given":"Gilles","family":"Letourneux","sequence":"additional","affiliation":[]},{"given":"Olivier","family":"Vivolo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","unstructured":"FIPS PUB 197: Avanced Encryption Standard, \n                    \n                      http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf"},{"key":"23_CR2","first-page":"238","volume-title":"The Design of Rijndael, AES \u2013 The Advanced Encryption Standard","author":"J. Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael, AES \u2013 The Advanced Encryption Standard, p. 238. Springer, Heidelberg (2002)"},{"key":"23_CR3","unstructured":"Anderson, R.J., Kuhn, M.G.: Tamper Resistance \u2013 a Cautionary Note. In: The Second USENIX Workshop on Electronic Commerce Proceedings, Oakland, California, November 18-21, pp. 1\u201311 (1996) ISBN 1-880446-83-9"},{"key":"23_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"E. Biham","year":"1997","unstructured":"Biham, E., Shamir, A.: Differential Fault Analysis of Secret Key Cryptosystems, CS 0910. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 513\u2013525. Springer, Heidelberg (1997)"},{"key":"23_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"D. Boneh","year":"1997","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the Importance of Checking Cryptographic Protocols for Faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 37\u201351. Springer, Heidelberg (1997)"},{"key":"23_CR6","unstructured":"Daemen, J.: Annex to AES Proposal Rijndael (1998), \n                    \n                      http:\/\/www.esat.kuleuven.ac.be\/~rijmen\/rijndael\/PropCorr.PDF"},{"key":"23_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/3-540-48285-7_6","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"K. Nyberg","year":"1994","unstructured":"Nyberg, K.: Differentially uniform mappings for cryptography. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 55\u201364. Springer, Heidelberg (1994)"},{"key":"23_CR8","unstructured":"Letourneux, G.: Rapport de stage EDSI: Etude et impl\u00e9mentation de l\u2019AES, Attaques DPA et DFA, August 30 (2002)"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45203-4_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T15:31:42Z","timestamp":1558279902000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45203-4_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540202080","9783540452034"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45203-4_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2003]]}}}