{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T17:08:42Z","timestamp":1742922522196,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":8,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811580604"},{"type":"electronic","value":"9789811580611"}],"license":[{"start":{"date-parts":[[2020,12,11]],"date-time":"2020-12-11T00:00:00Z","timestamp":1607644800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,12,11]],"date-time":"2020-12-11T00:00:00Z","timestamp":1607644800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-15-8061-1_1","type":"book-chapter","created":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T20:08:45Z","timestamp":1607630925000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Preventing Differential Fault Analysis Attack on AEGIS Family of Ciphers"],"prefix":"10.1007","author":[{"given":"Swapan","family":"Maiti","sequence":"first","affiliation":[]},{"given":"Dipanwita","family":"Roy Chowdhury","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,11]]},"reference":[{"key":"1_CR1","unstructured":"CAESAR (Competition for Authenticated Encryption: Security, Applicability, and Robustness) (2013). http:\/\/competitions.cr.yp.to\/caesar.html"},{"key":"1_CR2","doi-asserted-by":"publisher","unstructured":"Wu H, Preneel B (2013) AEGIS: a fast authenticated encryption algorithm. In: Selected areas in cryptography\u2014SAC 2013\u201420th international conference. Burnaby, BC, Canada, Revised Selected Papers. pp 185\u2013201. https:\/\/doi.org\/10.1007\/978-3-662-43414-7_10","DOI":"10.1007\/978-3-662-43414-7_10"},{"key":"1_CR3","doi-asserted-by":"publisher","unstructured":"Daemen J, Rijmen V (2002) The design of rijndael: AES\u2014the advanced encryption standard. Information security and cryptography. Springer, Berlin. https:\/\/doi.org\/10.1007\/978-3-662-04722-4","DOI":"10.1007\/978-3-662-04722-4"},{"key":"1_CR4","doi-asserted-by":"publisher","unstructured":"Salam MI, Simpson L, Bartlett H, Dawson E, Wong KK (2018) Fault attacks on the authenticated encryption stream cipher MORUS. Cryptography 2(1):4. https:\/\/doi.org\/10.3390\/cryptography2010004","DOI":"10.3390\/cryptography2010004"},{"key":"1_CR5","unstructured":"Zhang X, Feng X, Lin D (2017) Fault attack on ACORN v3. IACR Cryptol ePrint Arch 855. http:\/\/eprint.iacr.org\/2017\/855"},{"key":"1_CR6","unstructured":"Adomnicai A, Fournier JJA, Masson L (2018) Masking the lightweight authenticated ciphers ACORN and Ascon in software. IACR Cryptol ePrint Arch 708 (2018). https:\/\/eprint.iacr.org\/2018\/708"},{"key":"1_CR7","doi-asserted-by":"publisher","unstructured":"Dey P, Rohit RS, Sarkar S, Adhikari A (2016) Differential fault analysis on tiaoxin and AEGIS family of ciphers. In: Security in computing and communications\u20144th international symposium, SSCC. Jaipur, India, Proceedings, pp 74\u201386. https:\/\/doi.org\/10.1007\/978-981-10-2738-3_7","DOI":"10.1007\/978-981-10-2738-3_7"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"El-Hadary, A., Megahed, M., ElAzeem, M.: A proposed solutions to two possible attacks over AEGIS authenticated encryption algorithm. International Journal of Computer Theory and Engineering 10, 185\u2013189 (01 2018)","DOI":"10.7763\/IJCTE.2018.V10.1223"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the Sixth International Conference on Mathematics and Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-8061-1_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T20:10:04Z","timestamp":1607631004000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-8061-1_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,11]]},"ISBN":["9789811580604","9789811580611"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-8061-1_1","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,12,11]]},"assertion":[{"value":"11 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}