{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T15:56:26Z","timestamp":1775145386676,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2016,6,25]],"date-time":"2016-06-25T00:00:00Z","timestamp":1466812800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Electron Test"],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1007\/s10836-016-5598-9","type":"journal-article","created":{"date-parts":[[2016,6,25]],"date-time":"2016-06-25T05:05:27Z","timestamp":1466831127000},"page":"611-624","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":34,"title":["A Comprehensive FPGA-Based Assessment on Fault-Resistant AES against Correlation Power Analysis Attack"],"prefix":"10.1007","volume":"32","author":[{"given":"Jaya","family":"Dofe","sequence":"first","affiliation":[]},{"given":"Hoda","family":"Pahlevanzadeh","sequence":"additional","affiliation":[]},{"given":"Qiaoyan","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,25]]},"reference":[{"key":"5598_CR1","doi-asserted-by":"crossref","unstructured":"Amiel F, Villegas K, Feix B, and Marcel L (2007) Passive and active combined attacks: Combining fault attacks and side channel analysis, in Proc. Workshop on FDTC , pp. 92\u2013102","DOI":"10.1109\/FDTC.2007.12"},{"key":"5598_CR2","doi-asserted-by":"crossref","unstructured":"Avirneni NDP, Somani AK (2014) Countering power analysis attacks using reliable and aggressive designs. IEEE Trans Comput 63(6):1408\u20131420","DOI":"10.1109\/TC.2013.9"},{"key":"5598_CR3","unstructured":"Bar-El H, Choukri H, Naccache D, Tunstall M, and Whelan C, (2004) The Sorcerer\u2019s apprentice guide to fault attacks, Cryptology ePrint Archive, Report 2004\/10"},{"key":"5598_CR4","doi-asserted-by":"crossref","unstructured":"Barenghi A, Breveglieri. L, Koren I, Naccache D (2012) Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures. Proc. IEEE 100(11):3056\u20133076","DOI":"10.1109\/JPROC.2012.2188769"},{"key":"5598_CR5","doi-asserted-by":"crossref","unstructured":"Bertoni G, Breveglieri L, Koren I, Maistri P and Piuri V (2002) A parity code based fault detection for an implementation of the Advanced Encryption Standard, In Proc. DFT Workshop, pp. 51\u201359","DOI":"10.1109\/DFTVS.2002.1173501"},{"issue":"4","key":"5598_CR6","doi-asserted-by":"crossref","first-page":"492","DOI":"10.1109\/TC.2003.1190590","volume":"52","author":"G Bertoni","year":"2003","unstructured":"Bertoni G, Brevegelieri L, Koren I, Maistri P, Piuri V (2003) Error analysis and detection procedures for a hardware implementation of the advanced encryption standard. IEEE Trans. Computers 52(4):492\u2013505","journal-title":"IEEE Trans. Computers"},{"key":"5598_CR7","doi-asserted-by":"crossref","unstructured":"Breveglieri L, Koren I, and Maistri P, (2005) Incorporating Error Detection and Online Reconfiguration into a Regular Architecture for the Advanced Encryption Standard, in Proc. DFT, pp. 72\u201380","DOI":"10.1109\/DFTVS.2005.41"},{"key":"5598_CR8","doi-asserted-by":"crossref","unstructured":"Brier E, Clavier C, and Olivier F (2004) Correlation power analysis with a leakage model, in Lecture Notes in Computer Science, 3156:16\u201329, Springer, Berlin","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"5598_CR9","doi-asserted-by":"crossref","unstructured":"Canright D (2005) A Very Compact Rijndael S-box, Technical Report: NPS-MA-05-001, Naval Postgraduate School","DOI":"10.21236\/ADA434781"},{"key":"5598_CR10","doi-asserted-by":"crossref","unstructured":"Clavier C, Feix B, Gagnerot G, and Roussellet M (2010) Passive and active combined attacks on AES: Combining fault attacks and side channel analysis, in Proc. Workshop on\u00a0FDTC , pp. 10\u201319","DOI":"10.1109\/FDTC.2010.17"},{"key":"5598_CR11","unstructured":"Daemen J and Rijmen V. (1999) Resistance against Implementation Attacks: A Comparative Study of the AES Proposals, in Proc. Second Advanced Encryption Standard (AES) Candidate Conference, pp. 1\u201311"},{"key":"5598_CR12","unstructured":"Dassance F and Venelli A (2012) Combined Attacks on the AES Key Schedule, in Proc. Workshop on\u00a0FDTC, pp. 63\u201371"},{"key":"5598_CR13","unstructured":"Goodwill G, Jun B,Jaffe J, Rohatgi P (2011) A testing methodology for SideChannel resistance validation, In Proc. NIST Non-Invasive Attack Testing Workshop"},{"key":"5598_CR14","first-page":"33","volume":"11","author":"T G\u00fcneysu","year":"2011","unstructured":"G\u00fcneysu T, Moradi A (2011) Generic side-channel counter-measures for reconfigurable devices. CHES 11:33\u201348","journal-title":"CHES"},{"key":"5598_CR15","doi-asserted-by":"crossref","unstructured":"Hajra S, Rebeiro C, Bhasin S , Bajaj G, Sharma S, Guilley S, and Mukhopadhyay D (2014) DRECON: DPA resistant encryption by construction, In AFRICACRYPT, 8469:420\u2013439","DOI":"10.1007\/978-3-319-06734-6_25"},{"key":"5598_CR16","unstructured":"https:\/\/github.com\/freecores\/aes_decrypt_fpga\/tree\/master\/rtl\/ verilog"},{"key":"5598_CR17","doi-asserted-by":"crossref","unstructured":"Joye M, Manet P, and Rigaud J, (2007) Strengthening hardware AES implementations against fault attacks, in Proc. IET Info Security, 1(3):106\u2013110","DOI":"10.1049\/iet-ifs:20060163"},{"key":"5598_CR18","unstructured":"Karri R and Guo X (2012) Invariance-based concurrent error detection for advanced encryption standard, in Proc. DAC, pp. 573\u2013578"},{"key":"5598_CR19","doi-asserted-by":"crossref","unstructured":"Karri R, Wu K, Mishra P, Kim Y (2002) Concurrent error detection schemes for fault-based Side-Channel cryptanalysis of symmetric block ciphers. IEEE Trans. CAD 21(12):1509\u20131517","DOI":"10.1109\/TCAD.2002.804378"},{"key":"5598_CR20","doi-asserted-by":"crossref","unstructured":"Karri R , Kuznetsov G and Goessel M (2003) Parity-Based Concurrent Error Detection of Substitution-Permutation Network Block Ciphers, Proc. Int\u2019l Workshop Cryptographic Hardware and Embedded Systems (CHES \u201803), pp. 113\u2013124","DOI":"10.1007\/978-3-540-45238-6_10"},{"key":"5598_CR21","doi-asserted-by":"crossref","unstructured":"Kermani M. M and Reyhani-Masoleh A (2006) Parity-Based Fault Detection Architecture of S-box for Advanced Encryption Standard, In Proc. DFT\u201906, pp. 572\u2013580","DOI":"10.1109\/DFT.2006.50"},{"key":"5598_CR22","unstructured":"Kocher P, Jaffe J, and Jun B (1999) Differential Power Analysis, in Proc. Crypto\u201999, pp.388\u2013397"},{"key":"5598_CR23","doi-asserted-by":"crossref","unstructured":"Lomne. V, Roche T, and Thillard A, (2012) On the need of randomness in fault attack countermeasures\u2014Application to AES, In: Proc. Workshop on \u00a0FDTC , pp. 85\u201394","DOI":"10.1109\/FDTC.2012.19"},{"key":"5598_CR24","unstructured":"Luo P, Fei Y, Zhang L, and Ding AA (2014) Side-channel power analysis of different protection schemes against fault attacks on AES, in Proc. ReConFigurable Computing and FPGAs (ReConFig), pp. 1\u20136"},{"key":"5598_CR25","doi-asserted-by":"crossref","unstructured":"Maingot V and Leveugle R (2006) Error detection code efficiency for secure chips, in Proc. ICECS, pp 561\u2013564","DOI":"10.1109\/ICECS.2006.379850"},{"key":"5598_CR26","doi-asserted-by":"crossref","unstructured":"Maingot V and Leveugle R (2007) On the use of error correcting and detecting codes in secured circuits, in Proc. PRIME, pp. 245\u2013248","DOI":"10.1109\/RME.2007.4401858"},{"issue":"11","key":"5598_CR27","doi-asserted-by":"crossref","first-page":"1528","DOI":"10.1109\/TC.2008.149","volume":"57","author":"P Maistri","year":"2008","unstructured":"Maistri P, Leveugle R (2008) Double-data-rate computation as a countermeasure against fault analysis. IEEE Trans Comput 57(11):1528\u20131539","journal-title":"IEEE Trans Comput"},{"key":"5598_CR28","doi-asserted-by":"crossref","unstructured":"Mathew J, Rahaman H, Jabir A. M, Mohanty A.M. S. P, and Pradhan D. K (2010) On the design of different concurrent EDC schemes for s-box and gf(p), in Proc. ISQED, pp. 211\u2013218","DOI":"10.1109\/ISQED.2010.5450467"},{"key":"5598_CR29","doi-asserted-by":"crossref","unstructured":"Moradi, A and Wild A (2015) Assessment of Hiding the Higher-Order Leakages in Hardware, In Proc. CHES pp. 453\u2013474","DOI":"10.1007\/978-3-662-48324-4_23"},{"key":"5598_CR30","doi-asserted-by":"crossref","unstructured":"Moradi A, Mischke O, Eisenbarth T (2010) Correlation-enhanced power analysis collision attack. In: Proc. CHES, pp.125\u2013139","DOI":"10.1007\/978-3-642-15031-9_9"},{"key":"5598_CR31","unstructured":"Moradi A, Mischke O, Paar C, Li Y, Ohta K, Sakiyama K (2011) On the power of fault sensitivity analysis and collision side-channel attacks in a combined setting, In CHES\u201911, LNCS, vol. 6917, pp. 292\u2013311"},{"key":"5598_CR32","doi-asserted-by":"crossref","unstructured":"Moradi. A, Shalmani M. T. M, and Salmasizadeh M, (2006) A generalized method of differential fault attack against AES cryptosystem, in Proc. CHES, 4249:91\u2013100","DOI":"10.1007\/11894063_8"},{"issue":"5","key":"5598_CR33","doi-asserted-by":"crossref","first-page":"608","DOI":"10.1109\/TC.2010.33","volume":"59","author":"M Mozaffari-Kermani","year":"2010","unstructured":"Mozaffari-Kermani M, Reyhani-Masoleh A (2010) Concurrent structure-independent fault detection schemes for the advanced encryption standard. IEEE Trans Computers 59(5):608\u2013622","journal-title":"IEEE Trans Computers"},{"key":"5598_CR34","unstructured":"National Inst. of Standards and Technology (2001) Federal Information Processing Standard Publication 197, the advanced encryption standard (AES), Nov 2001"},{"key":"5598_CR35","doi-asserted-by":"crossref","unstructured":"O\u2019Flynn C and Chen Z 2014 Chipwhisperer: An opensource platform for hardware embedded security research, in Proc. Prouff pp. 243\u2013260.","DOI":"10.1007\/978-3-319-10175-0_17"},{"key":"5598_CR36","unstructured":"O\u2019Flynn C and Chen Z.D (2015) Side channel power analysis of an AES-256 bootloader, in Proc. CCECE, pp 750\u2013755"},{"key":"5598_CR37","doi-asserted-by":"crossref","unstructured":"Oswald E, Mangard S, Pramstaller N, and Rijmen V, (2005) A side-channel analysis resistant description of the AES S-box, in Proc. Fast Software Encryption (FSE). Lecture Notes in Computer Science, (Springer, Berlin), 3557:413\u2013423","DOI":"10.1007\/11502760_28"},{"key":"5598_CR38","doi-asserted-by":"crossref","unstructured":"Pahlevanzadeh H, Dofe J, and Yu Q (2016) Assessing CPA resistance of AES with different fault tolerance mechanisms, in Proc the 21st ASP-DAC, pp 661\u2013666","DOI":"10.1109\/ASPDAC.2016.7428087"},{"key":"5598_CR39","doi-asserted-by":"crossref","unstructured":"Patranabis S, Roy DB, Mukhopadhyay D (2016) Using Tweaks to Design Fault Resistant Ciphers, In Proc.VLSID, pp. 585\u2013586","DOI":"10.1109\/VLSID.2016.58"},{"key":"5598_CR40","doi-asserted-by":"crossref","unstructured":"Prouff E and Rivain M (2013) Masking against side-channel attacks: A formal security proof, in Proc. EUROCRYPT, LNCS, 7881:142\u2013159. Springer, Heidelberg","DOI":"10.1007\/978-3-642-38348-9_9"},{"key":"5598_CR41","doi-asserted-by":"crossref","unstructured":"Regazzoni F, Eisenbarth T, Grossschadl J, and Breveglieri L, (2007) Power Attacks Resistance of Cryptographic S-boxes with added Error Detection Circuits, in Proc. DFT, pp. 508\u2013516.","DOI":"10.1109\/DFT.2007.61"},{"key":"5598_CR42","doi-asserted-by":"crossref","unstructured":"Regazzoni F, Eisenbarth T, Breveglieri L, Ienne P, and Koren I (2008) Can knowledge regarding the presence of countermeasures against fault attacks simplify power attacks on cryptographic devices, in Proc. DFT, pp 202\u2013210","DOI":"10.1109\/DFT.2008.53"},{"key":"5598_CR43","doi-asserted-by":"crossref","unstructured":"Roche T, Lomne V, and Khalfallah K, (2011) Combined Fault and Side- Channel Attack on Protected Implementations of AES, in Proc. Prouff, pp. 65\u201383","DOI":"10.1007\/978-3-642-27257-8_5"},{"key":"5598_CR44","unstructured":"Roy SS, Jarvinen K, and Verbauwhede I (2015) Lightweight Coprocessor for Koblitz Curves: 283-Bit ECC Including Scalar Conversion with only 4300 Gates, In Proc. CHES\u2019 15 102\u2013122"},{"key":"5598_CR45","doi-asserted-by":"crossref","unstructured":"Schramm K, Paar C (2006) Higher order masking of the AES. In: Pointcheval D (ed) Topics in Cryptology-CT-RSA 2006, volume 3860 of lecture notes in computer science, pp. 208\u2013225. Springer","DOI":"10.1007\/11605805_14"},{"key":"5598_CR46","doi-asserted-by":"crossref","unstructured":"Tunstall M, Mukhopadhyay D, and Ali S (2011) Differential fault analysis of the advanced encryption standard using a single fault. In Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication,\u00a0pp. 224\u2013233. Springer Berlin Heidelberg","DOI":"10.1007\/978-3-642-21040-2_15"},{"issue":"6","key":"5598_CR47","doi-asserted-by":"crossref","first-page":"720","DOI":"10.1109\/TC.2006.90","volume":"55","author":"CH Yen","year":"2006","unstructured":"Yen CH, Wu BF (2006) Simple Error Detection Methods for Hardware Implementation of Advanced Encryption Standard. IEEE Trans Computers 55(6):720\u2013731","journal-title":"IEEE Trans Computers"}],"container-title":["Journal of Electronic Testing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10836-016-5598-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-016-5598-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-016-5598-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-016-5598-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,10]],"date-time":"2019-09-10T01:27:38Z","timestamp":1568078858000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10836-016-5598-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,25]]},"references-count":47,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2016,10]]}},"alternative-id":["5598"],"URL":"https:\/\/doi.org\/10.1007\/s10836-016-5598-9","relation":{},"ISSN":["0923-8174","1573-0727"],"issn-type":[{"value":"0923-8174","type":"print"},{"value":"1573-0727","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,6,25]]}}}