{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T06:59:30Z","timestamp":1773125970653,"version":"3.50.1"},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2011,10,21]],"date-time":"2011-10-21T00:00:00Z","timestamp":1319155200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Cryptogr Eng"],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1007\/s13389-011-0022-y","type":"journal-article","created":{"date-parts":[[2011,10,20]],"date-time":"2011-10-20T05:51:42Z","timestamp":1319089902000},"page":"265-270","source":"Crossref","is-referenced-by-count":66,"title":["An on-chip glitchy-clock generator for testing fault injection attacks"],"prefix":"10.1007","volume":"1","author":[{"given":"Sho","family":"Endo","sequence":"first","affiliation":[]},{"given":"Takeshi","family":"Sugawara","sequence":"additional","affiliation":[]},{"given":"Naofumi","family":"Homma","sequence":"additional","affiliation":[]},{"given":"Takafumi","family":"Aoki","sequence":"additional","affiliation":[]},{"given":"Akashi","family":"Satoh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,10,21]]},"reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Boneh, D., Demillio,R., Liotin, R.: On the importance of checking crypto-graphic protocols for fault. In: EUROCRYPT 1997, LNCS, vol. 1233, pp. 37\u201351. Springer, Berlin (1997)","DOI":"10.1007\/3-540-69053-0_4"},{"issue":"9","key":"22_CR2","doi-asserted-by":"crossref","first-page":"967","DOI":"10.1109\/12.869328","volume":"49","author":"S.M. Yen","year":"2000","unstructured":"Yen S.M., Joye M.: Checking before output may not be enough against fault-based cryptanalysis. IEEE Trans. Comput. 49(9), 967\u2013970 (2000)","journal-title":"IEEE Trans. Comput."},{"key":"22_CR3","first-page":"513","volume":"1294","author":"E. Biham","year":"1997","unstructured":"Biham E., Shamir A.: Differential fault analysis of secret key cryptosystems. CRYPTO 1294, 513\u2013525 (1997)","journal-title":"CRYPTO"},{"key":"22_CR4","first-page":"181","volume":"4727","author":"C. Clavier","year":"2007","unstructured":"Clavier C.: Secret external encodings do not prevent transient fault analysis. LNCS 4727, 181\u2013194 (2007)","journal-title":"LNCS"},{"key":"22_CR5","unstructured":"Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The sorcerer\u2019s apprentice guide to fault attack. IACR ePrint archive, vol. Report 2004\/100, pp. 1\u201313 (2004)"},{"key":"22_CR6","doi-asserted-by":"crossref","first-page":"544","DOI":"10.1109\/MDT.2007.186","volume":"24","author":"C.H. Kim","year":"2007","unstructured":"Kim C.H., Quisquater J.-J.: Faults, injection methods, and fault attacks. IEEE Design Test Comput. 24, 544\u2013545 (2007)","journal-title":"IEEE Design Test Comput."},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Guilley, S., Sauvage, L., Danger, J.-L., Selmane, N., Pacalet, R.: Silicon-level solutions to counteract passive and active attacks. In: Proceedings of the 5th Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 3\u201317 (2008)","DOI":"10.1109\/FDTC.2008.18"},{"key":"22_CR8","unstructured":"Endo, S., Sugawara, T., Homma, N., Aoki, T.: An on-chip glitchy-clock generator and its application to safe-error attack. In: 2nd International Workshop on Constructive Side-channel Analysis and Secure Design\u2013COSADE, pp. 175\u2013182 (2011)"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Fukunaga, T., Takahashi, J.: Practical fault attack on a cryptographic lsi with iso\/iec 18033-3 block ciphers. In: Proceedings of the 6th Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 84\u201392 (2009)","DOI":"10.1109\/FDTC.2009.34"},{"key":"22_CR10","unstructured":"Side-channel Attack Standard Evaluation Board. http:\/\/www.rcis.aist.go.jp\/special\/SASEBO\/"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Amiel, F., Villegas, K., Feix, B., Marcel, L.: Passive and active combined attacks: combining fault attacks and side channel analysis. In: Proceedings of the 4th Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 92\u2013102 (2007)","DOI":"10.1109\/FDTC.2007.4318989"},{"key":"22_CR12","first-page":"320","volume":"6225","author":"Y. Li","year":"2010","unstructured":"Li Y., Sakiyama K., Gomisawa S., Fukunaga T., Takahashi J., Ohta K.: Fault Sensitivity Analysis. Workshop on Cryptographic Hardware and Embedded Systems-CHES. LNCS 6225, 320\u2013334 (2010)","journal-title":"LNCS"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Coron, J.S.: Resistance against differential power analysis for elliptic curve cryptosystems. In: CHES 1999, LNCS, vol. 1717, pp. 292\u2013302. Springer, Berlin (1999)","DOI":"10.1007\/3-540-48059-5_25"},{"key":"22_CR14","volume-title":"Handbook of Applied Cryptography","author":"J.A. Menezes","year":"1997","unstructured":"Menezes J.A., Oorschot C.P., Vanstone A.S.: Handbook of Applied Cryptography. Boca Raton, CRC Press (1997)"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Miyamoto, A., Homma, N., Aoki, T., Satoh, A.: Systematic design of high-radix montgomery multipliers for rsa processors. In: Proceedings of the 26th IEEE International Conference on Computer Design, pp. 416\u2013422 (2008)","DOI":"10.1109\/ICCD.2008.4751894"},{"issue":"6","key":"22_CR16","doi-asserted-by":"crossref","first-page":"795","DOI":"10.1109\/TC.2009.176","volume":"59","author":"N. Homma","year":"2010","unstructured":"Homma N., Miyamoto A., Aoki T., Satoh A., Shamir A.: Comparative power analysis of modular exponentiation algorithms. IEEE Trans. Comput. 59(6), 795\u2013807 (2010)","journal-title":"IEEE Trans. Comput."}],"container-title":["Journal of Cryptographic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-011-0022-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13389-011-0022-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-011-0022-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T03:09:08Z","timestamp":1741835348000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13389-011-0022-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,21]]},"references-count":16,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2011,12]]}},"alternative-id":["22"],"URL":"https:\/\/doi.org\/10.1007\/s13389-011-0022-y","relation":{},"ISSN":["2190-8508","2190-8516"],"issn-type":[{"value":"2190-8508","type":"print"},{"value":"2190-8516","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,10,21]]}}}