{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:34:29Z","timestamp":1743017669854,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":19,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811358258"},{"type":"electronic","value":"9789811358265"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-5826-5_37","type":"book-chapter","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T05:07:57Z","timestamp":1548306477000},"page":"483-494","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Key Retrieval from AES Architecture Through Hardware Trojan Horse"],"prefix":"10.1007","author":[{"given":"Sivappriya","family":"Manivannan","sequence":"first","affiliation":[]},{"given":"N.","family":"Nalla Anandakumar","sequence":"additional","affiliation":[]},{"given":"M.","family":"Nirmala\u00a0Devi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,24]]},"reference":[{"key":"37_CR1","unstructured":"Abusaidi, P., Klein, M., Philofsky, B.: Virtex-5 FPGA System Power Design Considerations, Xilinx White Paper WP285 (v1.0), 14 February 2008"},{"key":"37_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, D., Baktir, S., Karakoyunlu, D., Rohatgi, P., Sunar, B.: Trojan detection using IC fingerprinting. In: IEEE Symposium on Security and Privacy (SP 2007), pp. 296\u2013310, May 2007","DOI":"10.1109\/SP.2007.36"},{"key":"37_CR3","doi-asserted-by":"crossref","unstructured":"Alkabani, Y., Koushanfar, F.: Consistency-based characterization for IC Trojan detection. In: IEEE\/ACM International Conference on Computer-Aided Design - Digest of Technical Papers, pp. 123\u2013127, November 2009","DOI":"10.1145\/1687399.1687426"},{"key":"37_CR4","doi-asserted-by":"crossref","unstructured":"Anandakumar, N.N., Dillibabu, S.: Correlation power analysis attack of AES on FPGA using customized communication protocol. In: Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology, CCSEIT 2012, pp. 683\u2013688 (2012)","DOI":"10.1145\/2393216.2393330"},{"key":"37_CR5","doi-asserted-by":"crossref","unstructured":"Bhasin, S., Danger, J.L., Guilley, S., Ngo, X.T., Sauvage, L.: Hardware Trojan Horses in cryptographic IP cores. In: Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 15\u201329, August 2013","DOI":"10.1109\/FDTC.2013.15"},{"key":"37_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/978-3-540-45126-6_12","volume-title":"Financial Cryptography","author":"J Bl\u00f6mer","year":"2003","unstructured":"Bl\u00f6mer, J., Seifert, J.-P.: Fault based cryptanalysis of the advanced encryption standard (AES). In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 162\u2013181. Springer, Heidelberg (2003). \n                  https:\/\/doi.org\/10.1007\/978-3-540-45126-6_12"},{"key":"37_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1997","author":"D Boneh","year":"1997","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37\u201351. Springer, Heidelberg (1997). \n                  https:\/\/doi.org\/10.1007\/3-540-69053-0_4"},{"key":"37_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-68164-9_2","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2008","author":"P Bulens","year":"2008","unstructured":"Bulens, P., Standaert, F.-X., Quisquater, J.-J., Pellegrin, P., Rouvroy, G.: Implementation of the AES-128 on Virtex-5 FPGAs. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol. 5023, pp. 16\u201326. Springer, Heidelberg (2008). \n                  https:\/\/doi.org\/10.1007\/978-3-540-68164-9_2"},{"key":"37_CR9","unstructured":"Infosecurity: The stealthy Hardware Trojan that can affect INTEL IVY Bridge processor (2013). \n                  https:\/\/www.infosecurity-magazine.com\/news\/the-stealthy-hardware-trojan-that\/"},{"key":"37_CR10","unstructured":"Jin, Y., Makris, Y.: Hardware Trojan detection using path delay fingerprint. In: IEEE International Workshop on Hardware-Oriented Security and Trust, pp. 51\u201357, June 2008"},{"key":"37_CR11","doi-asserted-by":"crossref","unstructured":"Karunakaran, D.K., Mohankumar, N.: Malicious combinational Hardware Trojan detection by gate level characterization in 90 nm technology. In: Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT), pp. 1\u20137, July 2014","DOI":"10.1109\/ICCCNT.2014.6963036"},{"issue":"3","key":"37_CR12","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s13389-012-0040-4","volume":"2","author":"M Kasper","year":"2012","unstructured":"Kasper, M., et al.: Side channels as building blocks. J. Cryptographic Eng. 2(3), 143\u2013159 (2012)","journal-title":"J. Cryptographic Eng."},{"key":"37_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2014 CRYPTO 1999","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999). \n                  https:\/\/doi.org\/10.1007\/3-540-48405-1_25"},{"key":"37_CR14","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/978-3-319-68511-3_10","volume-title":"The Hardware Trojan War","author":"J Plusquellic","year":"2018","unstructured":"Plusquellic, J., Saqib, F.: Detecting Hardware Trojans using delay analysis. In: Bhunia, S., Tehranipoor, M.M. (eds.) The Hardware Trojan War, pp. 219\u2013267. Springer, Cham (2018). \n                  https:\/\/doi.org\/10.1007\/978-3-319-68511-3_10"},{"key":"37_CR15","doi-asserted-by":"crossref","unstructured":"Potkonjak, M., Nahapetian, A., Nelson, M., Massey, T.: Hardware Trojan Horse detection using gate-level characterization. In: 46th ACM\/IEEE Design Automation Conference, pp. 688\u2013693, July 2009","DOI":"10.1145\/1629911.1630091"},{"key":"37_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/3-540-45418-7_17","volume-title":"Smart Card Programming and Security","author":"J-J Quisquater","year":"2001","unstructured":"Quisquater, J.-J., Samyde, D.: ElectroMagnetic Analysis (EMA): measures and counter-measures for smart cards. In: Attali, I., Jensen, T. (eds.) E-smart 2001. LNCS, vol. 2140, pp. 200\u2013210. Springer, Heidelberg (2001). \n                  https:\/\/doi.org\/10.1007\/3-540-45418-7_17"},{"key":"37_CR17","doi-asserted-by":"crossref","unstructured":"Salmani, H., Tehranipoor, M., Plusquellic, J.: A layout-aware approach for improving localized switching to detect Hardware Trojans in integrated circuits. In: IEEE International Workshop on Information Forensics and Security, pp. 1\u20136, December 2010","DOI":"10.1109\/WIFS.2010.5711438"},{"key":"37_CR18","series-title":"Information Security and Cryptography","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1007\/978-3-642-29656-7","volume-title":"Fault Analysis in Cryptography","year":"2012","unstructured":"Joye, M., Tunstall, M. (eds.): Fault Analysis in Cryptography. Information Security and Cryptography, p. 356. Springer, Heidelberg (2012). \n                  https:\/\/doi.org\/10.1007\/978-3-642-29656-7"},{"key":"37_CR19","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1007\/978-3-319-22915-7_47","volume-title":"Security in Computing and Communications","author":"E Vaddi","year":"2015","unstructured":"Vaddi, E., Gaddam, K., Maniam, R.K., Mallavajjala, S.A., Dasari, S., Nirmala Devi, M.: Detection and diagnosis of Hardware Trojan using power analysis. In: Abawajy, J.H., Mukherjea, S., Thampi, S.M., Ruiz-Mart\u00ednez, A. (eds.) SSCC 2015. CCIS, vol. 536, pp. 519\u2013529. Springer, Cham (2015). \n                  https:\/\/doi.org\/10.1007\/978-3-319-22915-7_47"}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-5826-5_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T23:51:49Z","timestamp":1558396309000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-5826-5_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811358258","9789811358265"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-5826-5_37","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SSCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security in Computing and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangalore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sscc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.acn-conference.org\/sscc2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}