{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T04:40:23Z","timestamp":1719981623785},"reference-count":5,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,1,21]],"date-time":"2017-01-21T00:00:00Z","timestamp":1484956800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2017,4]]},"DOI":"10.1007\/s11432-016-0233-0","type":"journal-article","created":{"date-parts":[[2017,1,26]],"date-time":"2017-01-26T02:40:04Z","timestamp":1485398404000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers"],"prefix":"10.1007","volume":"60","author":[{"given":"Fan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xinjie","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Wei","family":"He","sequence":"additional","affiliation":[]},{"given":"Shivam","family":"Bhasin","sequence":"additional","affiliation":[]},{"given":"Shize","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,1,21]]},"reference":[{"key":"233_CR1","first-page":"22","volume-title":"Proceedings of eSmart European Smart Card Security Conference, Sophia Antipolis","author":"N T Courtois","year":"2010","unstructured":"Courtois N T, Ware D, Jackson K. Fault algebraic attacks on inner rounds of DES. In: Proceedings of eSmart European Smart Card Security Conference, Sophia Antipolis, 2010. 22\u201324"},{"key":"233_CR2","doi-asserted-by":"crossref","first-page":"1229","DOI":"10.1109\/JPROC.2014.2334493","volume":"102","author":"S Bhunia","year":"2014","unstructured":"Bhunia S, Hsiao M, Banga M, et al. Hardware trojan attacks: threat analysis and countermeasures. Proc IEEE, 2014, 102: 1229\u20131247","journal-title":"Proc IEEE"},{"key":"233_CR3","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1007\/978-3-642-40026-1_5","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"F Zhang","year":"2013","unstructured":"Zhang F, Zhao X J, Guo S Z, et al. Improved algebraic fault analysis: a case study on piccolo and applications to other lightweight block ciphers. In: Constructive Side-Channel Analysis and Secure Design. Berlin: Springer, 2013. 62\u201379"},{"key":"233_CR4","unstructured":"Xilinx. Virtex-5 FPGA system monitor. UG192. Version 1.6, 2008"},{"key":"233_CR5","first-page":"403","volume-title":"Proceedings of IEEE European Conference on Circuit Theory and Design, Antalya","author":"T Katashita","year":"2009","unstructured":"Katashita T, Satoh A, Sugawara T, et al. Development of side-channel attack standard evaluation environment. In: Proceedings of IEEE European Conference on Circuit Theory and Design, Antalya, 2009. 403\u2013408"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-016-0233-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-016-0233-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-016-0233-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T05:05:11Z","timestamp":1498367111000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-016-0233-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,21]]},"references-count":5,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,4]]}},"alternative-id":["233"],"URL":"https:\/\/doi.org\/10.1007\/s11432-016-0233-0","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,1,21]]},"article-number":"048102"}}