{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:59:57Z","timestamp":1740099597072,"version":"3.37.3"},"publisher-location":"Singapore","reference-count":12,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811508707"},{"type":"electronic","value":"9789811508714"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-15-0871-4_19","type":"book-chapter","created":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T00:14:18Z","timestamp":1573776858000},"page":"243-253","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Hardware Trojan on SIMON Architecture for Key Retrieval"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9888-0920","authenticated-orcid":false,"given":"Sivappriya","family":"Manivannan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5385-8102","authenticated-orcid":false,"given":"K. K.","family":"Soundra Pandian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,15]]},"reference":[{"key":"19_CR1","unstructured":"Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The SIMON and SPECK families of lightweight block ciphers. Cryptology ePrint Archive, Report 2013\/404 (2013). https:\/\/eprint.iacr.org\/2013\/404"},{"key":"19_CR2","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1007\/978-981-13-5826-5_37","volume-title":"Security in Computing and Communications","author":"S Manivannan","year":"2019","unstructured":"Manivannan, S., Nalla Anandakumar, N., Nirmala\u00a0Devi, M.: Key retrieval from AES architecture through hardware trojan horse. In: Thampi, S.M., Madria, S., Wang, G., Rawat, D.B., Alcaraz Calero, J.M. (eds.) SSCC 2018. CCIS, vol. 969, pp. 483\u2013494. Springer, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-13-5826-5_37"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Takahashi, J., Fukunaga, T., Yamakoshi, K.: DFA mechanism on the AES key schedule. In: Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2007), pp. 62\u201374, September 2007","DOI":"10.1109\/FDTC.2007.4318986"},{"key":"19_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-540-45238-6_7","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"G Piret","year":"2003","unstructured":"Piret, G., Quisquater, J.-J.: A differential fault attack technique against SPN structures, with application to the AES and Khazad. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 77\u201388. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45238-6_7"},{"key":"19_CR5","unstructured":"Giraud, C., Thillard, A.: Piret and quisquater\u2019s DFA on AES revisited (2010). http:\/\/eprint.iacr.org\/2010\/440 . c.giraud@oberthur.com 14834 received 13 August 2010"},{"issue":"2","key":"19_CR6","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/s13389-012-0046-y","volume":"3","author":"SS Ali","year":"2013","unstructured":"Ali, S.S., Mukhopadhyay, D., Tunstall, M.: Differential fault analysis of AES: towards reaching its limits. J. Cryptographic Eng. 3(2), 73\u201397 (2013). https:\/\/doi.org\/10.1007\/s13389-012-0046-y","journal-title":"J. Cryptographic Eng."},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Tupsamudre, H., Bisht, S., Mukhopadhyay, D.: Differential fault analysis on the families of SIMON and SPECK ciphers. In: Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 40\u201348, September 2014","DOI":"10.1109\/FDTC.2014.14"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Vasquez, J.d.C.G., Borges, F., Portugal, R., Lara, P.: An efficient one-bit model for differential fault analysis on SIMON family. In: Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp. 61\u201370, September 2015","DOI":"10.1109\/FDTC.2015.18"},{"issue":"1","key":"19_CR9","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/TIFS.2011.2161289","volume":"7","author":"CH Kim","year":"2012","unstructured":"Kim, C.H.: Improved differential fault analysis on AES key schedule. IEEE Trans. Inf. Forensics Secur. 7(1), 41\u201350 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"19_CR10","doi-asserted-by":"publisher","first-page":"93","DOI":"10.3390\/electronics8010093","volume":"8","author":"J Zhang","year":"2019","unstructured":"Zhang, J., Wu, N., Zhou, F., Yahya, M., Li, J.: A novel differential fault is on the key schedule of SIMON family. Electronics 8, 93 (2019)","journal-title":"Electronics"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Chen, H., Feng, J., Rijmen, V., Liu, Y., Fan, L., Li, W.: Improved fault analysis on SIMON block cipher family. In: Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp. 16\u201324, August 2016","DOI":"10.1109\/FDTC.2016.12"},{"issue":"3","key":"19_CR12","doi-asserted-by":"crossref","first-page":"44","DOI":"10.46586\/tches.v2018.i3.44-68","volume":"2018","author":"J Krautter","year":"2018","unstructured":"Krautter, J., Gnad, D., Tahoori, M.: FPGAhammer: remote voltage fault attacks on shared FPGAs, suitable for DFA on AES. IACR Trans. Cryptographic Hardware Embedded Syst. 2018(3), 44\u201368 (2018). https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/7268","journal-title":"IACR Trans. Cryptographic Hardware Embedded Syst."}],"container-title":["Communications in Computer and Information Science","Applications and Techniques in Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-0871-4_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,3]],"date-time":"2021-02-03T07:58:47Z","timestamp":1612339127000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-0871-4_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811508707","9789811508714"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-0871-4_19","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"15 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ATIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applications and Techniques in Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tamil Nadul","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 November 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"atis2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.sastra.edu\/atis2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}