{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:22:06Z","timestamp":1761708126671},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540747345"},{"type":"electronic","value":"9783540747352"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74735-2_28","type":"book-chapter","created":{"date-parts":[[2007,8,22]],"date-time":"2007-08-22T06:33:47Z","timestamp":1187764427000},"page":"413-426","source":"Crossref","is-referenced-by-count":25,"title":["Differential Behavioral Analysis"],"prefix":"10.1007","author":[{"given":"Bruno","family":"Robisson","sequence":"first","affiliation":[]},{"given":"Pascal","family":"Manet","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","unstructured":"http:\/\/cmp.imag.fr\/information\/gallery\/details.php?id_circ=64&y=2005"},{"key":"28_CR2","unstructured":"Bertoni, G., Breveglieri, L., Koren, I., Piuri, V.: Fault detection in the Advanced Encryption Standard. In: Proceedings of MPCS\u00a02002, Ischia, Italy (2002)"},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: CHES, pp. 16\u201329 (2004)","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"28_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"D. Boneh","year":"1997","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 37\u201351. Springer, Heidelberg (1997)"},{"key":"28_CR5","unstructured":"Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The sorcerer\u2019s apprentice guide to fault attacks. In: First Workshop on Fault Detection and Tolerance in Cryptography, Florence, Italy (June\u00a01, 2004)"},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"Bl\u00f6mer, J., Krummel, V.: Fault based collision attacks on aes. In: FDTC, pp. 106\u2013120 (2006)","DOI":"10.1007\/11889700_11"},{"key":"28_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"E. Biham","year":"1997","unstructured":"Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 513\u2013525. Springer, Heidelberg (1997)"},{"key":"28_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1007\/978-3-540-45126-6_12","volume-title":"Financial Cryptography","author":"J. Bl\u00f6mer","year":"2003","unstructured":"Bl\u00f6mer, J., Seifert, J.-P.: Fault based cryptanalysis of the Advanced Encryption Standard (AES). In: Wright, R.N. (ed.) FC 2003. LNCS, vol.\u00a02742, pp. 162\u2013181. Springer, Heidelberg (2003)"},{"key":"28_CR9","unstructured":"http:\/\/www.arcsis.org\/micro-packaging.0.html"},{"key":"28_CR10","unstructured":"Choukri, H., Tunstall, M.: Round reduction using faults. In: FDTC 2005: Proceedings of the second Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 13\u201324 (2005)"},{"key":"28_CR11","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael","author":"J. Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael. Springer, Heidelberg (2002)"},{"key":"28_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/11506447_4","volume-title":"Advanced Encryption Standard \u2013 AES","author":"C. Giraud","year":"2005","unstructured":"Giraud, C.: DFA on AES. In: Dobbertin, H., Rijmen, V., Sowa, A. (eds.) Advanced Encryption Standard \u2013 AES. LNCS, vol.\u00a03373, pp. 27\u201341. Springer, Heidelberg (2005)"},{"key":"28_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P. Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"28_CR14","unstructured":"K\u00f6mmerling, O., Kuhn, M.G.: Design principles for tamper-resistant smartcard processors. In: Proceedings of the USENIX Workshop on Smartcard Technology, Chicago, May 10-11, 1999, pp. 9\u201320 (1999)"},{"key":"28_CR15","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1109\/DSN.2004.1311880","volume-title":"2004 International Conference on Dependable Systems and Networks (DSN 2004)","author":"M.G. Karpovsky","year":"2004","unstructured":"Karpovsky, M.G., Kulikowski, K.J., Taubin, A.: Robust protection against fault injection attacks on smart cards implementing the Advanced Encryption Standard. In: 2004 International Conference on Dependable Systems and Networks (DSN 2004), pp. 93\u2013101. IEEE Computer Society Press, Los Alamitos (2004)"},{"issue":"12","key":"28_CR16","doi-asserted-by":"publisher","first-page":"1509","DOI":"10.1109\/TCAD.2002.804378","volume":"21","author":"R. Karri","year":"2002","unstructured":"Karri, R., Wu, K., Mishra, P., Kim, Y.: Concurrent error detection scheme for fault-based side-channel cryptanalysis of symmetric block ciphers. IEEE Transactions on Computer-Aided Design\u00a021(12), 1509\u20131517 (2002)","journal-title":"IEEE Transactions on Computer-Aided Design"},{"issue":"9","key":"28_CR17","doi-asserted-by":"publisher","first-page":"1104","DOI":"10.1109\/TC.2006.143","volume":"55","author":"Y. Monnet","year":"2006","unstructured":"Monnet, Y., Renaudin, M.: Designing resistant circuits against malicious faults injection using asynchronous logic. IEEE Trans. Comput.\u00a055(9), 1104\u20131115 (2006)","journal-title":"IEEE Trans. Comput."},{"key":"28_CR18","doi-asserted-by":"crossref","unstructured":"Monnet, Y., Renaudin, M., Leveugle, R., Clavier, C., Moitrel, P.: Case study of a fault attack on asynchronous des crypto-processors. In: FDTC, pp. 88\u201397 (2006)","DOI":"10.1007\/11889700_9"},{"key":"28_CR19","unstructured":"Malkin, T.G., Standaert, F.-X., Yung, M.: A comparative cost\/security analysis of fault attack countermeasures. In: Second Workshop on Fault Detection and Tolerance in Cryptography, Edinburgh, UK, September\u00a02, pp. 109\u2013123 (2005)"},{"key":"28_CR20","unstructured":"NIST: Announcing the Advanced Encryption Standard (AES). Federal Information Processing Standards Publication, n. 197 (November\u00a026, 2001)"},{"key":"28_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/978-3-540-45238-6_7","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"G. Piret","year":"2003","unstructured":"Piret, G., Quisquater, J.-J.: A differential fault attack technique against SPN structures, with application to the AES and Khazad. In: D.Walter, C., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 77\u201388. Springer, Heidelberg (2003)"},{"issue":"9","key":"28_CR22","doi-asserted-by":"publisher","first-page":"967","DOI":"10.1109\/12.869328","volume":"49","author":"S.-M. Yen","year":"2000","unstructured":"Yen, S.-M., Joye, M.: Checking before output may not be enough against fault-based cryptanalysis. IEEE Transactions on Computers\u00a049(9), 967\u2013970 (2000)","journal-title":"IEEE Transactions on Computers"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74735-2_28.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:35:18Z","timestamp":1619505318000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74735-2_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540747345","9783540747352"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74735-2_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}