{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:04:33Z","timestamp":1776099873797,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,7,18]],"date-time":"2023-07-18T00:00:00Z","timestamp":1689638400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,7,18]],"date-time":"2023-07-18T00:00:00Z","timestamp":1689638400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s11227-023-05530-7","type":"journal-article","created":{"date-parts":[[2023,7,18]],"date-time":"2023-07-18T15:12:40Z","timestamp":1689693160000},"page":"1464-1490","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Fault-tolerant and error-correcting 4-bit S-boxes for cryptography applications with multiple errors detection"],"prefix":"10.1007","volume":"80","author":[{"given":"Bahram","family":"Rashidi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,18]]},"reference":[{"issue":"3","key":"5530_CR1","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/s13389-017-0160-y","volume":"11","author":"G Hatzivasilis","year":"2018","unstructured":"Hatzivasilis G, Fysarakis K, Papaefstathiou I, Manifavas C (2018) A review of lightweight block ciphers. J Cryptogr Eng 11(3):141\u2013184","journal-title":"J Cryptogr Eng"},{"issue":"3","key":"5530_CR2","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/s41635-017-0021-2","volume":"1","author":"R Sadhukhan","year":"2017","unstructured":"Sadhukhan R, Patranabis S, Ghoshal A, Mukhopadhyay D, Saraswat V, Ghosh S (2017) An evaluation of lightweight block ciphers for resource-constrained applications: area, performance, and security. J Hardw Syst Secur 1(3):203\u2013218","journal-title":"J Hardw Syst Secur"},{"key":"5530_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The design of Rijndael: AES-the advanced encryption standard. Information security and cryptography","author":"J Daemen","year":"2002","unstructured":"Daemen J, Rijmen V (2002) The design of Rijndael: AES-the advanced encryption standard. Information security and cryptography. Springer, New York"},{"key":"5530_CR4","doi-asserted-by":"crossref","unstructured":"Aoki K, Ichikawa T, Kanda M, Matsui M, Moriai S, Nakajima J, Tokita T (2001) Camellia: a 128-bit block cipher suitable for multiple platforms-design and analysis. In: Proceedings of the Selected Areas in Cryptography (SAC), Sony Corporation. Springer, LNCS, pp 39\u201356","DOI":"10.1007\/3-540-44983-3_4"},{"key":"5530_CR5","doi-asserted-by":"crossref","unstructured":"Shirai T, Shibutani K, Akishita T, Moriai S, Iwata T (2007) The 128-bit block cipher CLEFIA (extended abstract). In: Proceedings of the International Workshop on Fast Software Encryption, LNCS, vol 4593. Luxembourg, pp 181\u2013195","DOI":"10.1007\/978-3-540-74619-5_12"},{"key":"5530_CR6","doi-asserted-by":"crossref","unstructured":"Bogdanov A, Knudsen LR, Leander G, Paar C, Poschmann A, Robshaw MJB, Seurin Y, Vikkelsoe C (2007) PRESENT: an ultra lightweight block cipher. In: Proceedings of the Cryptographic Hardware and Embedded Systems-CHES. Springer, Vienna, Austria, pp 450\u2013466","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"5530_CR7","doi-asserted-by":"crossref","unstructured":"Wu W, Zhang L (2011) LBlock: a lightweight block cipher. In: Proceedings of the Applied Cryptography and Network Security, Nerja, Spain, LNCS, vol 6715, pp 327\u2013344","DOI":"10.1007\/978-3-642-21554-4_19"},{"key":"5530_CR8","doi-asserted-by":"crossref","unstructured":"Borghoff J et al (2012) PRINCE-a low-latency block cipher for pervasive computing applications. In: Proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), LNCS, vol 7658, Beijing, China, pp 208\u2013225","DOI":"10.1007\/978-3-642-34961-4_14"},{"issue":"10","key":"5530_CR9","doi-asserted-by":"publisher","first-page":"2041","DOI":"10.1109\/TC.2012.196","volume":"62","author":"A Bogdanov","year":"2013","unstructured":"Bogdanov A, Knezevic M, Leander G, Toz D, Var\u0131c\u0131 K, Verbauwhede I (2013) SPONGENT: the design space of lightweight cryptographic hashing. IEEE Trans Comput 62(10):2041\u20132053","journal-title":"IEEE Trans Comput"},{"key":"5530_CR10","doi-asserted-by":"crossref","unstructured":"Matthews P, Lala PK (2006) A totally self-checking S-box architecture for the advanced encryption standard. In: Proceedings of the 7th International Symposium on Quality Electronic Design, San Jose, CA, USA, pp 1\u20136","DOI":"10.1109\/ISQED.2006.18"},{"key":"5530_CR11","doi-asserted-by":"crossref","unstructured":"Mozaffari Kermani M, Reyhani-Masoleh A (2006) Parity-based fault detection architecture of S-box for advanced encryption standard. In: Proceedings of the 21st IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems, Arlington, VA, USA, pp 1\u20139","DOI":"10.1109\/DFT.2006.50"},{"key":"5530_CR12","doi-asserted-by":"crossref","unstructured":"An T, Alves L, Matherat P (2013) Evaluation of fault-tolerant composite field AES S-boxes under multiple transient faults. In: Proceedings of the 11th International New Circuits and Systems Conference (NEWCAS), Paris, France, pp 1\u20134","DOI":"10.1109\/NEWCAS.2013.6573610"},{"key":"5530_CR13","doi-asserted-by":"crossref","unstructured":"Borghoff J, Knudsen LR, Leander K, Thomsen SS (2011) Cryptanalysis of PRESENT-like ciphers with secret S-boxes. In: Proceedings of the 18th International Workshop on Fast Software Encryption, Lyngby, Denmark, pp 270\u2013289","DOI":"10.1007\/978-3-642-21702-9_16"},{"issue":"4","key":"5530_CR14","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1109\/TC.2003.1190590","volume":"52","author":"G Bertoni","year":"2003","unstructured":"Bertoni G, Breveglieri L, Koren I, Maistri P, Piuri V (2003) Error analysis and detection procedures for a hardware implementation of the advanced encryption standard. IEEE Trans Comput 52(4):492\u2013505","journal-title":"IEEE Trans Comput"},{"key":"5530_CR15","doi-asserted-by":"publisher","first-page":"46045","DOI":"10.1109\/ACCESS.2019.2907717","volume":"7","author":"Z Haider","year":"2019","unstructured":"Haider Z, Javeed K, Song M, Wang X (2019) A low-cost self-test architecture integrated with PRESENT cipher core. IEEE Access 7:46045\u201346058","journal-title":"IEEE Access"},{"key":"5530_CR16","doi-asserted-by":"crossref","unstructured":"Luo H, Wen G, Su J (2018) An efficient hardware-based fault-tolerant method for SMS4. In: Proceedings of the 3rd International Conference on Measurement Instrumentation and Electronics. West Hi-Tech Zone, China, pp 1\u20135","DOI":"10.1051\/matecconf\/201820802005"},{"issue":"1","key":"5530_CR17","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1109\/TVLSI.2009.2031651","volume":"19","author":"M Mozaffari Kermani","year":"2011","unstructured":"Mozaffari Kermani M, Reyhani-Masoleh A (2011) A lightweight high-performance fault detection scheme for the advanced encryption standard using composite fields. IEEE Trans Very Large Scale Integr VLSI Syst 19(1):85\u201391","journal-title":"IEEE Trans Very Large Scale Integr VLSI Syst"},{"key":"5530_CR18","unstructured":"Ahir P (2016) Lightweight architectures for reliable and fault detection Simon and Speck cryptographic algorithms on FPGA. Master of Science Thesis, Department of Electrical and Microelectronic Engineering College of Engineering Rochester Institute of Technology"},{"issue":"10","key":"5530_CR19","doi-asserted-by":"publisher","first-page":"1750","DOI":"10.1109\/TCAD.2017.2661811","volume":"36","author":"S Subramanian","year":"2017","unstructured":"Subramanian S, Mozaffari-Kermani M, Azarderakhsh R, Nojoumian M (2017) Reliable hardware architectures for cryptographic block ciphers LED and HIGHT. IEEE Trans Comput Aided Des Integr Circuits Syst 36(10):1750\u20131758","journal-title":"IEEE Trans Comput Aided Des Integr Circuits Syst"},{"issue":"1","key":"5530_CR20","first-page":"27","volume":"4","author":"E Idzikowska","year":"2007","unstructured":"Idzikowska E, Bucholc K (2007) Concurrent error detection in S-boxes. Int J Comput Sci Appl 4(1):27\u201332","journal-title":"Int J Comput Sci Appl"},{"issue":"2","key":"5530_CR21","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1147\/rd.62.0200","volume":"6","author":"RE Lyons","year":"1962","unstructured":"Lyons RE, Vanderkulk W (1962) The use of triple-modular redundancy to improve computer reliability. IBM J Res Dev 6(2):200\u2013209","journal-title":"IBM J Res Dev"},{"issue":"6","key":"5530_CR22","doi-asserted-by":"publisher","first-page":"3435","DOI":"10.1109\/TNS.2008.2005583","volume":"55","author":"J Teifel","year":"2008","unstructured":"Teifel J (2008) Self-voting dual-modular-redundancy circuits for single-event-transient mitigation. IEEE Trans Nucl Sci 55(6):3435\u20133439","journal-title":"IEEE Trans Nucl Sci"},{"issue":"5","key":"5530_CR23","doi-asserted-by":"publisher","first-page":"608","DOI":"10.1109\/TC.2010.33","volume":"59","author":"M Mozaffari Kermani","year":"2010","unstructured":"Mozaffari Kermani M, Reyhani-Masoleh A (2010) Concurrent structure-independent fault detection schemes for the advanced encryption standard. IEEE Trans Comput 59(5):608\u2013622","journal-title":"IEEE Trans Comput"},{"key":"5530_CR24","doi-asserted-by":"crossref","unstructured":"Guo J, Peyrin T, Poschmann A, Robshaw M (2011) The LED block cipher. In: Proceedings of the Cryptographic Hardware and Embedded Systems-CHES. Springer, Nara, Japan, pp 326\u2013341","DOI":"10.1007\/978-3-642-23951-9_22"},{"key":"5530_CR25","unstructured":"Bogdanov A, Knezevic M, Leander G, Toz D, Var\u0131c\u0131 K, Verbauwhede I (2011) The PHOTON family of lightweight hash functions. In: Proceedings of the CRYPTO: 31st Annual Cryptology Conference, Santa Barbara, CA, USA, LNCS, vol 6841, pp 222\u2013239"},{"key":"5530_CR26","unstructured":"International Standardization of Organization (ISO) (2012) Information Technology-Security Techniques-Lightweight Cryptography-Part 2: Block Ciphers, document ISO\/IEC 29192-2"},{"key":"5530_CR27","unstructured":"International Standardization of Organization (ISO) (2016) Information Technology-Security Techniques-Lightweight Cryptography-Part 5: Hash-Functions, document ISO\/IEC 29192-5"},{"key":"5530_CR28","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-2113-9","volume-title":"Fault-tolerant design","author":"E Dubrova","year":"2013","unstructured":"Dubrova E (2013) Fault-tolerant design, 1st edn. Springer, New York","edition":"1"},{"key":"5530_CR29","volume-title":"Self-checking and fault tolerant digital design","author":"PK Lala","year":"2001","unstructured":"Lala PK (2001) Self-checking and fault tolerant digital design, 1st edn. Morgan Kaufmann Publishers, Waltham","edition":"1"},{"issue":"6","key":"5530_CR30","doi-asserted-by":"publisher","first-page":"731","DOI":"10.1049\/iet-cds.2018.5457","volume":"13","author":"B Rashidi","year":"2019","unstructured":"Rashidi B (2019) Efficient and high-throughput application-specific integrated circuit implementations of HIGHT and PRESENT block ciphers. IET Circuits Dev Syst 13(6):731\u2013740","journal-title":"IET Circuits Dev Syst"},{"key":"5530_CR31","doi-asserted-by":"crossref","unstructured":"Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Proceedings of the Advances in Cryptology, Berlin, Germany, pp 388\u2013397","DOI":"10.1007\/3-540-48405-1_25"},{"key":"5530_CR32","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/978-3-642-29656-7_15","volume-title":"Fault analysis in cryptography, information security and cryptography","author":"F Regazzoni","year":"2012","unstructured":"Regazzoni F, Breveglieri L, Ienne P, Koren I (2012) Interaction between fault attack countermeasures and the resistance against power analysis attacks. In: Joye M, Tunstall M (eds) Fault analysis in cryptography, information security and cryptography. Springer, Berlin, pp 257\u2013272"},{"key":"5530_CR33","doi-asserted-by":"crossref","unstructured":"Kocher PC (1996) Timing attacks on implementations of Diffie\u2013Hellman, RSA, DSS. In: Proceedings of the Advances in Cryptology, Berlin, Germany, pp 104\u2013113","DOI":"10.1007\/3-540-68697-5_9"},{"issue":"3","key":"5530_CR34","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1109\/TEMC.2012.2227486","volume":"55","author":"YI Hayashi","year":"2013","unstructured":"Hayashi YI, Homma N, Mizuki T, Aoki T, Sone H, Sauvage L, Danger JL (2013) Analysis of electromagnetic information leakage from cryptographic devices with different physical structures. IEEE Trans Electromagn Compat 55(3):571\u2013580","journal-title":"IEEE Trans Electromagn Compat"},{"issue":"3","key":"5530_CR35","doi-asserted-by":"publisher","first-page":"704","DOI":"10.1016\/j.microrel.2014.12.011","volume":"55","author":"A Mukherjee","year":"2015","unstructured":"Mukherjee A, Dhar AS (2015) Real-time fault-tolerance with hot-standby topology for conditional sum adder. Microelectron Reliab 55(3):704\u2013712","journal-title":"Microelectron Reliab"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05530-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-023-05530-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05530-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,15]],"date-time":"2024-01-15T09:19:45Z","timestamp":1705310385000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-023-05530-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,18]]},"references-count":35,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["5530"],"URL":"https:\/\/doi.org\/10.1007\/s11227-023-05530-7","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,18]]},"assertion":[{"value":"28 June 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 July 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conficts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}