{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T06:11:45Z","timestamp":1747807905659,"version":"3.35.0"},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540850526"},{"type":"electronic","value":"9783540850533"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-85053-3_7","type":"book-chapter","created":{"date-parts":[[2008,8,5]],"date-time":"2008-08-05T13:42:12Z","timestamp":1217943732000},"page":"100-112","source":"Crossref","is-referenced-by-count":30,"title":["High-Performance Concurrent Error Detection Scheme for AES Hardware"],"prefix":"10.1007","author":[{"given":"Akashi","family":"Satoh","sequence":"first","affiliation":[]},{"given":"Takeshi","family":"Sugawara","sequence":"additional","affiliation":[]},{"given":"Naofumi","family":"Homma","sequence":"additional","affiliation":[]},{"given":"Takafumi","family":"Aoki","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"D. Boneh","year":"1997","unstructured":"Boneh, D., Demillio, R., Liotin, R.: On the Importance of Checking Crypto-graphic Protocols for Fault. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 37\u201351. Springer, Heidelberg (1997)"},{"key":"7_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"E. Biham","year":"1997","unstructured":"Biham, E., Shamir, A.: Differential Fault Analysis of Secret Key Cryptosys-tems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 513\u2013525. Springer, Heidelberg (1997)"},{"key":"7_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/BFb0028165","volume-title":"Security Protocols","author":"R. Anderson","year":"1998","unstructured":"Anderson, R., Kuhn, M.: Low Cost Attacks on Tamper Resistant Devices. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol.\u00a01361, pp. 125\u2013136. Springer, Heidelberg (1998)"},{"key":"7_CR4","unstructured":"Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The Sorcerer\u2019s Apprentice Guide to Fault Attack. IACR ePrint archive, Report 2004\/100 (2004)"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Giraud, G., Thiebeauld, H.: A Survey on Fault Attacks. In: Proc. Sixth Smart Card Research and Advanced Application IFIP Conf. (CARDIS 2004), pp. 159\u2013176 (August 2004)","DOI":"10.1007\/1-4020-8147-2_11"},{"key":"7_CR6","unstructured":"National Institute of Standards and Technology (NIST), Advanced Encryption Standard (AES) FIPS Publication 197 (November 2001), http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1007\/978-3-540-45126-6_12","volume-title":"Financial Cryptography","author":"J. Bl\u00f6mer","year":"2003","unstructured":"Bl\u00f6mer, J., Seifert, J.-P.: Fault Based Cryptanalysis of the Advanced Encryption Standard (AES). In: Wright, R.N. (ed.) FC 2003. LNCS, vol.\u00a02742, pp. 162\u2013181. Springer, Heidelberg (2003)"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/11889700_11","volume-title":"Fault Diagnosis and Tolerance in Cryptography","author":"J. Bl\u00f6mer","year":"2006","unstructured":"Bl\u00f6mer, J., Krummel, V.: Fault Based Collision Attacks on AES. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2006. LNCS, vol.\u00a04236, pp. 106\u2013120. Springer, Heidelberg (2006)"},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/978-3-540-45238-6_7","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"G. Piret","year":"2003","unstructured":"Piret, G., Quisquater, J.-J.: A Differential Fault Attack Technique against SPN Structures, With Application to the AES avd Khazad. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 77\u201388. Springer, Heidelberg (2003)"},{"key":"7_CR10","unstructured":"Dusart, P., Letourneux, G., Vivolo, O.: Differential Fault Analysis on AES. Cryptology ePrint Archive, Report2003\/010 (2003), http:\/\/eprint.iacr.org\/2003\/010.pdf"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/3-540-45067-X_11","volume-title":"Information Security and Privacy","author":"C.-N. Chen","year":"2003","unstructured":"Chen, C.-N., Yen, S.-M.: Differential Fault Analysis on AES Key Schedule and Some Countermeasures. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol.\u00a02727, pp. 118\u2013129. Springer, Heidelberg (2003)"},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/11506447_4","volume-title":"Advanced Encryption Standard \u2013 AES","author":"C. Giraud","year":"2005","unstructured":"Giraud, C.: DFA on AES. In: Dobbertin, H., Rijmen, V., Sowa, A. (eds.) AES 2005. LNCS, vol.\u00a03373, pp. 27\u201341. Springer, Heidelberg (2005)"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Takahashi, J., Fukunaga, T., Yamakoshi, K.: DFA Mechanism on the AES Key Schedule. In: Proc. Fault Diagnosis and Tolerance in Cryptography (FDTC 2007), pp. 62\u201372 (September 2007)","DOI":"10.1109\/FDTC.2007.13"},{"issue":"4","key":"7_CR14","first-page":"492","volume":"52","author":"G. Bertoni","year":"2003","unstructured":"Bertoni, G., Breveglieri, L., Koren, I., Maistri, P., Piuri, V.: Error Analysis and Detection Procedures for a Hardware Implementation of the Advanced Encryp-tion Standard. IEEE Trans. Comp. Special Issue on Cryptographic Hardware and Embedded Software\u00a052(4), 492\u2013505 (2003)","journal-title":"IEEE Trans. Comp. Special Issue on Cryptographic Hardware and Embedded Software"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Bertoni, G., Breveglieri, L., Koren, I., Maistri, P.: An Efficient Hardware-Based Fault Diagnosis Scheme for AES Performances and Cost. In: Proc. the 19th IEEE Int. Sym. Defect and Fault Tolerance in VLSI Systems (DFT 2004), pp. 130\u2013138 (October 2004)","DOI":"10.1109\/DFTVS.2004.1347833"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Breveglieri, L., Koren, I., Maistri, P.: Incorporating Error Detection and Online Reconfiguration into a Regular Architecture for the Advanced Encryption Standard. In: Proc. the 20th IEEE Int. Sym. Defect and Fault Tolerance in VLSI Systems (DFT 2005), pp. 72\u201380 (October 2005)","DOI":"10.1109\/DFTVS.2005.41"},{"key":"7_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1007\/978-3-540-45238-6_10","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"R. Karri","year":"2003","unstructured":"Karri, R., Kuznetsov, G., Gossel, M.: Parity-Based Concurrent Error Detection of Substitution-Permutation Network Block Ciphers. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 113\u2013124. Springer, Heidelberg (2003)"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Karpovsky, M., Kulikowski, K.J., Taubin, A.: Robust Protection against Fault-Injection Attacks on Smart Cards Implementing the Advanced Encryption Standard. In: Proc. 2004 International Conference on Dependable Systems and Networks (DSN 2004), pp. 93\u2013101 (July 2004)","DOI":"10.1109\/DSN.2004.1311880"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Karpovsky, M., Kulikowski, K.J., Taubin, A.: Differential Fault Analysis Attack Resistant Architectures for the Advanced Encryption Standard. In: Proc. Sixth Smart Card Research and Advanced Application IFIP Conference (CARDIS 2004), pp. 177\u2013192 (August 2004)","DOI":"10.1007\/1-4020-8147-2_12"},{"issue":"6","key":"7_CR20","doi-asserted-by":"publisher","first-page":"720","DOI":"10.1109\/TC.2006.90","volume":"55","author":"C..-H. Yen","year":"2006","unstructured":"Yen, C.-H., Wu, B.-F.: Simple Error Detection Methods for Hardware Implementation of Advanced Encryption Standard. IEEE Trans. Comp.\u00a055(6), 720\u2013731 (2006)","journal-title":"IEEE Trans. Comp."},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Wu, K., Karri, R., Kuznetsov, G., Goessel, M.: Low Cost Concurrent Error Detection for the Advanced Encryption Standard. In: Proc. The 2004 Int. Test Conf., pp. 1242\u20131248 (October 2004)","DOI":"10.1109\/TEST.2004.1387397"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Kermani, M.M., Masoleh, A.R.: Parity-Based Fault Detection Architecture of S-box for Advanced Encryption Standard. In: Proc. the 21st IEEE Int. Symp. De-fect and Fault-Tolerance in VLSI Systems (DFT 2006), pp. 572\u2013580 (December 2006)","DOI":"10.1109\/DFT.2006.50"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Kermani, M.M., Masoleh, A.R.: A Structure-independent Approach for Fault Detection Hardware Implementations of the Advanced Encryption Standard. In: Proc. Fault Diagnosis and Tolerance in Cryptography (FDTC 2007), pp. 47\u201353 (September 2007)","DOI":"10.1109\/FDTC.2007.15"},{"issue":"1","key":"7_CR24","first-page":"31","volume":"34","author":"K. Wu","year":"2003","unstructured":"Wu, K., Mishra, P., Karri, R.: Concurrent Error Detection of Fault-Based Side-Channel Cryptanalysis of 128-Bit RC6 Block Cipher. Special Issue on Defect and Fault Tolerance in VLSI Systems. Microelectronics Journal\u00a034(1), 31\u201339 (2003)","journal-title":"Special Issue on Defect and Fault Tolerance in VLSI Systems. Microelectronics Journal"},{"issue":"12","key":"7_CR25","doi-asserted-by":"publisher","first-page":"1509","DOI":"10.1109\/TCAD.2002.804378","volume":"21","author":"R. Karri","year":"2002","unstructured":"Karri, R., Wu, K., Mishra, P., Kim, Y.: Concurrent Error Detection Schemes for Fault-Based Side-Channel Cryptanalysis of Symmetric Block Ciphers. IEEE Trans. CAD of Integrated Circuits and Systems\u00a021(12), 1509\u20131517 (2002)","journal-title":"IEEE Trans. CAD of Integrated Circuits and Systems"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Anghel, L., Nicolaidis, M.: Cost Reduction and Evaluation of a Temporary Faults Detecting Technique. In: Proc. Design Automation and Test in Europe (DATE 2000), pp. 591\u2013597 (March 2000)","DOI":"10.1145\/343647.343863"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Maistri, P., Vanhauwaert, P., Leveugle, R.: A Novel Double-Data-Rate AES Architecture Resistant against Fault Injection. In: Proc. Fault Diagnosis and Tolerance in Cryptography (FDTC 2007), pp. 54\u201361 (September 2007)","DOI":"10.1109\/FDTC.2007.8"},{"key":"7_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1007\/978-3-540-28632-5_29","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"N. Joshi","year":"2004","unstructured":"Joshi, N., Wu, K., Karri, R.: Concurrent Error Detection Schemes for Involution Ciphers. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 400\u2013412. Springer, Heidelberg (2004)"},{"key":"7_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/11889700_15","volume-title":"Fault Diagnosis and Tolerance in Cryptography","author":"T.G. Malkin","year":"2006","unstructured":"Malkin, T.G., Standaert, F.-X., Yung, M.: A Comparative Cost\/Security Analysis of Fault Attack Countermeasures. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2006. LNCS, vol.\u00a04236, pp. 159\u2013172. Springer, Heidelberg (2006)"},{"key":"7_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/3-540-45682-1_15","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"A. Satoh","year":"2001","unstructured":"Satoh, A., Morioka, S., Takano, K., Munetoh, S.: A Compact Rijndael Hardware Architecture with S-box Optimization. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 239\u2013254. Springer, Heidelberg (2001)"},{"key":"7_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1007\/978-3-540-45238-6_26","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"P. Chodowiec","year":"2003","unstructured":"Chodowiec, P., Gaj, K.: Very Compact FPGA Implementation of the AES Algorithm. In: D.Walter, C., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 319\u2013333. Springer, Heidelberg (2003)"},{"key":"7_CR32","unstructured":"Side-channel Attack Standard Evaluation Board (SASEBO), http:\/\/www.rcis.aist.go.jp\/special\/SASEBO\/"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems \u2013 CHES 2008"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85053-3_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T09:55:35Z","timestamp":1738317335000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85053-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540850526","9783540850533"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85053-3_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}