{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,5,12]],"date-time":"2023-05-12T11:49:55Z","timestamp":1683892195910},"reference-count":5,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,1,5]],"date-time":"2018-01-05T00:00:00Z","timestamp":1515110400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1007\/s11432-017-9179-4","type":"journal-article","created":{"date-parts":[[2018,1,9]],"date-time":"2018-01-09T05:15:09Z","timestamp":1515474909000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Optimal model search for hardware-trojan-based bit-level fault attacks on block ciphers"],"prefix":"10.1007","volume":"61","author":[{"given":"Xinjie","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Fan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Shize","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Zheng","family":"Gong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,5]]},"reference":[{"key":"9179_CR1","doi-asserted-by":"crossref","first-page":"1229","DOI":"10.1109\/JPROC.2014.2334493","volume":"102","author":"S Bhunia","year":"2014","unstructured":"Bhunia S, Hsiao M, Banga M, et al. Hardware trojan attacks: threat analysis and countermeasures. Proc IEEE, 2014, 102: 1229\u20131247","journal-title":"Proc IEEE"},{"key":"9179_CR2","first-page":"1","volume-title":"Fault attack on AES via hardware Trojan insertion by dynamic partial reconfiguration of FPGA over ethernet","author":"A Johnson","year":"2014","unstructured":"Johnson A, Saha S, Chakraborty R, et al. Fault attack on AES via hardware Trojan insertion by dynamic partial reconfiguration of FPGA over ethernet. In: Proceedings of the 9th Workshop on Embedded Systems Security, New Delhi, 2014. 1\u20138"},{"key":"9179_CR3","first-page":"513","volume-title":"Proceedings of the 36th International Cryptology Conference","author":"E Biham","year":"1997","unstructured":"Biham E, Shamir A. Differential fault analysis of secret key cryptosystem. In: Proceedings of the 36th International Cryptology Conference. Berlin: Springer, 1997. 513\u2013525"},{"key":"9179_CR4","first-page":"450","volume-title":"PRESENT: an ultra-lightweight block cipher","author":"A Bogdanov","year":"2007","unstructured":"Bogdanov A, Knudsen L R, Leander G, et al. PRESENT: an ultra-lightweight block cipher. In: Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems, Vienna, 2007. 450\u2013466"},{"key":"9179_CR5","first-page":"62","volume-title":"Improved algebraic fault analysis: a case study on piccolo and applications to other lightweight block ciphers","author":"F Zhang","year":"2013","unstructured":"Zhang F, Zhao X J, Guo S Z, et al. Improved algebraic fault analysis: a case study on piccolo and applications to other lightweight block ciphers. In: Proceedings of the 4th International Conference on Constructive Side-Channel Analysis and Secure Design, Paris, 2013. 62\u201379"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-017-9179-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-017-9179-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-017-9179-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,9]],"date-time":"2018-01-09T05:15:11Z","timestamp":1515474911000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-017-9179-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,5]]},"references-count":5,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,3]]}},"alternative-id":["9179"],"URL":"https:\/\/doi.org\/10.1007\/s11432-017-9179-4","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,5]]},"article-number":"039106"}}