{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T18:23:27Z","timestamp":1740162207842,"version":"3.37.3"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T00:00:00Z","timestamp":1606176000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T00:00:00Z","timestamp":1606176000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000161","name":"National Institute of Standards and Technology","doi-asserted-by":"publisher","award":["70NANB18H219"],"award-info":[{"award-number":["70NANB18H219"]}],"id":[{"id":"10.13039\/100000161","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptogr Eng"],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1007\/s13389-020-00249-0","type":"journal-article","created":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T05:07:26Z","timestamp":1606194446000},"page":"273-288","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Fault intensity map analysis with neural network key distinguisher"],"prefix":"10.1007","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3552-1220","authenticated-orcid":false,"given":"Keyvan","family":"Ramezanpour","sequence":"first","affiliation":[]},{"given":"Paul","family":"Ampadu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6293-5018","authenticated-orcid":false,"given":"William","family":"Diehl","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,24]]},"reference":[{"key":"249_CR1","unstructured":"197, F.I.P.S.P.: Advanced Encryption Standard (AES) (2001)"},{"key":"249_CR2","doi-asserted-by":"crossref","unstructured":"Agoyan, M., Dutertre, J.M., Naccache, D., Robisson, B., Tria, A.: When clocks fail: On critical paths and clock faults. In: International Conference on Smart Card Research and Advanced Applications, pp. 182\u2013193. Springer (2010)","DOI":"10.1007\/978-3-642-12510-2_13"},{"issue":"1","key":"249_CR3","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/s13389-016-0138-1","volume":"7","author":"S Azzi","year":"2017","unstructured":"Azzi, S., Barras, B., Christofi, M., Vigilant, D.: Using linear codes as a fault countermeasure for nonlinear operations: application to AES and formal verification. J. Cryptogr. Eng. 7(1), 75\u201385 (2017)","journal-title":"J. Cryptogr. Eng."},{"issue":"1","key":"249_CR4","first-page":"1","volume":"8","author":"HJ Bae","year":"2018","unstructured":"Bae, H.J., Kim, C.W., Kim, N., Park, B., Kim, N., Seo, J.B., Lee, S.M.: A perlin noise-based augmentation strategy for deep learning with small data samples of hrct images. Sci. Rep. 8(1), 1\u20137 (2018)","journal-title":"Sci. Rep."},{"issue":"7","key":"249_CR5","doi-asserted-by":"publisher","first-page":"1864","DOI":"10.1016\/j.jss.2013.02.021","volume":"86","author":"A Barenghi","year":"2013","unstructured":"Barenghi, A., Bertoni, G.M., Breveglieri, L., Pelosi, G.: A fault induction technique based on voltage underfeeding with application to attacks against aes and rsa. J. Syst. Softw. 86(7), 1864\u20131878 (2013)","journal-title":"J. Syst. Softw."},{"key":"249_CR6","doi-asserted-by":"crossref","unstructured":"Canright, D.: A Very Compact Rijndael S-box. Defense Technical Information Center (2005). https:\/\/apps.dtic.mil\/docs\/citations\/ADA434781","DOI":"10.21236\/ADA434781"},{"key":"249_CR7","doi-asserted-by":"crossref","unstructured":"Dobraunig, C., Eichlseder, M., Gro\u00df, H., Mangard, S., Mendel, F., Primas, R.: Statistical ineffective fault attacks on masked AES with fault countermeasures. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 315\u2013342. Springer (2018)","DOI":"10.1007\/978-3-030-03329-3_11"},{"key":"249_CR8","doi-asserted-by":"crossref","unstructured":"Dobraunig, C., Eichlseder, M., Korak, T., Mangard, S., Mendel, F., Primas, R.: SIFA: Exploiting ineffective fault inductions on symmetric cryptography. IACR Trans. Cryptogr. Hardw. Embedded Syst. 547\u2013572 (2018)","DOI":"10.46586\/tches.v2018.i3.547-572"},{"issue":"5","key":"249_CR9","doi-asserted-by":"publisher","first-page":"1156","DOI":"10.1007\/s10955-011-0234-7","volume":"145","author":"D Faranda","year":"2011","unstructured":"Faranda, D., Lucarini, V., Turchetti, G., Vaienti, S.: Numerical convergence of the block-maxima approach to the generalized extreme value distribution. J. Stat. Phys. 145(5), 1156\u20131180 (2011)","journal-title":"J. Stat. Phys."},{"key":"249_CR10","doi-asserted-by":"crossref","unstructured":"Ghalaty, N.F., Yuce, B., Taha, M., Schaumont, P.: Differential fault intensity analysis. In: 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp. 49\u201358. IEEE (2014)","DOI":"10.1109\/FDTC.2014.15"},{"issue":"6","key":"249_CR11","doi-asserted-by":"publisher","first-page":"e0155781","DOI":"10.1371\/journal.pone.0155781","volume":"11","author":"MJ Kang","year":"2016","unstructured":"Kang, M.J., Kang, J.W.: Intrusion detection system using deep neural network for in-vehicle network security. PloS one 11(6), e0155781 (2016)","journal-title":"PloS one"},{"issue":"3","key":"249_CR12","doi-asserted-by":"publisher","first-page":"696","DOI":"10.1109\/TCAD.2017.2717791","volume":"37","author":"MM Kermani","year":"2018","unstructured":"Kermani, M.M., Jalali, A., Azarderakhsh, R., Xie, J., Choo, K.K.R.: Reliable inversion in $$GF(2^8)$$ with redundant arithmetic for secure error detection of cryptographic architectures. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 37(3), 696\u2013704 (2018)","journal-title":"IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst."},{"key":"249_CR13","doi-asserted-by":"crossref","unstructured":"Kim, C.H.: Differential fault analysis against aes-192 and aes-256 with minimal faults. In: 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 3\u20139. IEEE (2010)","DOI":"10.1109\/FDTC.2010.10"},{"key":"249_CR14","doi-asserted-by":"crossref","unstructured":"Kolosnjaji, B., Demontis, A., Biggio, B., Maiorca, D., Giacinto, G., Eckert, C., Roli, F.: Adversarial malware binaries: evading deep learning for malware detection in executables. In: 2018 26th European Signal Processing Conference (EUSIPCO), pp. 533\u2013537. IEEE (2018)","DOI":"10.23919\/EUSIPCO.2018.8553214"},{"key":"249_CR15","unstructured":"Kondor, R., Trivedi, S.: On the generalization of equivariance and convolution in neural networks to the action of compact groups. Preprint arXiv:1802.03690 (2018)"},{"key":"249_CR16","doi-asserted-by":"crossref","unstructured":"Kwon, D., Kim, H., Kim, J., Suh, S.C., Kim, I., Kim, K.J.: A survey of deep learning-based network anomaly detection. Cluster Comput. 1\u201313 (2017)","DOI":"10.1007\/s10586-017-1117-8"},{"key":"249_CR17","doi-asserted-by":"crossref","unstructured":"Lashermes, R., Reymond, G., Dutertre, J.M., Fournier, J., Robisson, B., Tria, A.: A DFA on AES Based on the Entropy of Error Distributions. In: 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 34\u201343. IEEE (2012)","DOI":"10.1109\/FDTC.2012.18"},{"key":"249_CR18","doi-asserted-by":"crossref","unstructured":"Li, W., Liao, L., Gu, D., Li, C., Ge, C., Guo, Z., Liu, Y., Liu, Z.: Ciphertext-only fault analysis on the LED lightweight cryptosystem in the Internet of Things. IEEE Trans. Depend. Secure Comput. (2018)","DOI":"10.1109\/TDSC.2018.2857770"},{"issue":"1","key":"249_CR19","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/TDSC.2015.2449849","volume":"13","author":"W Li","year":"2016","unstructured":"Li, W., Zhang, W., Gu, D., Cao, Y., Tao, Z., Zhou, Z., Liu, Y., Liu, Z.: Impossible differential fault analysis on the LED lightweight cryptosystem in the vehicular ad-hoc networks. IEEE Trans. Depend. Secure Comput. 13(1), 84\u201392 (2016)","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"249_CR20","doi-asserted-by":"crossref","unstructured":"Li, Y., Sakiyama, K., Gomisawa, S., Fukunaga, T., Takahashi, J., Ohta, K.: Fault sensitivity analysis. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 320\u2013334. Springer (2010)","DOI":"10.1007\/978-3-642-15031-9_22"},{"key":"249_CR21","doi-asserted-by":"crossref","unstructured":"Liu, Y., Cui, X., Cao, J., Zhang, X.: A hybrid fault model for differential fault attack on AES. In: 2017 IEEE 12th International Conference on ASIC (ASICON), pp. 784\u2013787. IEEE (2017)","DOI":"10.1109\/ASICON.2017.8252593"},{"issue":"3","key":"249_CR22","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s13389-016-0128-3","volume":"7","author":"S Ordas","year":"2017","unstructured":"Ordas, S., Guillaume-Sage, L., Maurine, P.: Electromagnetic fault injection: the curse of flip-flops. J. Cryptogr. Eng. 7(3), 183\u2013197 (2017)","journal-title":"J. Cryptogr. Eng."},{"key":"249_CR23","doi-asserted-by":"crossref","unstructured":"Patranabis, S., Chakraborty, A., Nguyen, P.H., Mukhopadhyay, D.: A biased fault attack on the time redundancy countermeasure for AES. In: International workshop on constructive side-channel analysis and secure design, pp. 189\u2013203. Springer (2015)","DOI":"10.1007\/978-3-319-21476-4_13"},{"key":"249_CR24","doi-asserted-by":"crossref","unstructured":"Piret, G., Quisquater, J.J.: A differential fault attack technique against spn structures, with application to the aes and khazad. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 77\u201388. Springer (2003)","DOI":"10.1007\/978-3-540-45238-6_7"},{"key":"249_CR25","doi-asserted-by":"crossref","unstructured":"Ramezanpour, K., Ampadu, P., Diehl, W.: Fault intensity map analysis with neural network key distinguisher. In: Proceedings of the 3rd ACM Workshop on Attacks and Solutions in Hardware Security Workshop, pp. 33\u201342 (2019)","DOI":"10.1145\/3338508.3359572"},{"key":"249_CR26","doi-asserted-by":"crossref","unstructured":"Ramezanpour, K., Ampadu, P., Diehl, W.: FIMA: Fault intensity map analysis. In: Constructive Side-Channel Analysis and Secure Design, pp. 63\u201379. Springer (2019)","DOI":"10.1007\/978-3-030-16350-1_5"},{"key":"249_CR27","doi-asserted-by":"crossref","unstructured":"Ramezanpour, K., Ampadu, P., Diehl, W.: RS-Mask: Random space masking as an integrated countermeasure against power and fault analysis. Preprint arXiv:1911.11278 (2019)","DOI":"10.1109\/HOST45689.2020.9300266"},{"key":"249_CR28","doi-asserted-by":"crossref","unstructured":"Ramezanpour, K., Ampadu, P., Diehl, W.: SCAUL: Power side-channel analysis with unsupervised learning. Preprint arXiv:2001.05951 (2020)","DOI":"10.1109\/TC.2020.3013196"},{"key":"249_CR29","doi-asserted-by":"crossref","unstructured":"Reshma, K., Priyatharishini, M., Devi, M.N.: Hardware trojan detection using deep learning technique. In: Soft Computing and Signal Processing, pp. 671\u2013680. Springer (2019)","DOI":"10.1007\/978-981-13-3393-4_68"},{"key":"249_CR30","doi-asserted-by":"crossref","unstructured":"Schellenberg, F., Finkeldey, M., Gerhardt, N., Hofmann, M., Moradi, A., Paar, C.: Large laser spots and fault sensitivity analysis. In: 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 203\u2013208. IEEE (2016)","DOI":"10.1109\/HST.2016.7495583"},{"key":"249_CR31","doi-asserted-by":"crossref","unstructured":"Schneider, T., Moradi, A., G\u00fcneysu, T.: ParTI\u2013towards combined hardware countermeasures against side-channel and fault-injection attacks. In: Annual International Cryptology Conference, pp. 302\u2013332. Springer (2016)","DOI":"10.1007\/978-3-662-53008-5_11"},{"key":"249_CR32","doi-asserted-by":"crossref","unstructured":"Singh, A., Kar, M., Chawla, N., Mukhopadhyay, S.: Mitigating power supply glitch based fault attacks with fast all-digital clock modulation circuit. In: 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 19\u201324. IEEE (2019)","DOI":"10.23919\/DATE.2019.8715058"},{"issue":"1","key":"249_CR33","first-page":"1929","volume":"15","author":"N Srivastava","year":"2014","unstructured":"Srivastava, N., Hinton, G., Krizhevsky, A., Sutskever, I., Salakhutdinov, R.: Dropout: a simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. 15(1), 1929\u20131958 (2014)","journal-title":"J. Mach. Learn. Res."},{"key":"249_CR34","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Liu, W., Jia, Y., Sermanet, P., Reed, S., Anguelov, D., Erhan, D., Vanhoucke, V., Rabinovich, A.: Going deeper with convolutions. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1\u20139 (2015)","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"249_CR35","doi-asserted-by":"crossref","unstructured":"Tunstall, M., Mukhopadhyay, D., Ali, S.: Differential fault analysis of the advanced encryption standard using a single fault. In: IFIP International Workshop on Information Security Theory and Practices, pp. 224\u2013233. Springer (2011)","DOI":"10.1007\/978-3-642-21040-2_15"},{"issue":"7","key":"249_CR36","doi-asserted-by":"publisher","first-page":"3797","DOI":"10.1109\/TIT.2014.2320500","volume":"60","author":"T Van Erven","year":"2014","unstructured":"Van Erven, T., Harremos, P.: R\u00e9nyi divergence and Kullback-Leibler divergence. IEEE Trans. Inf. Theory 60(7), 3797\u20133820 (2014)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"249_CR37","doi-asserted-by":"crossref","unstructured":"Yuce, B., Ghalaty, N.F., Santapuri, H., Deshpande, C., Patrick, C., Schaumont, P.: Software fault resistance is futile: effective single-glitch attacks. In: 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp. 47\u201358. IEEE (2016)","DOI":"10.1109\/FDTC.2016.21"}],"container-title":["Journal of Cryptographic Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-020-00249-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13389-020-00249-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-020-00249-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,30]],"date-time":"2021-08-30T12:06:22Z","timestamp":1630325182000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13389-020-00249-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,24]]},"references-count":37,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["249"],"URL":"https:\/\/doi.org\/10.1007\/s13389-020-00249-0","relation":{},"ISSN":["2190-8508","2190-8516"],"issn-type":[{"type":"print","value":"2190-8508"},{"type":"electronic","value":"2190-8516"}],"subject":[],"published":{"date-parts":[[2020,11,24]]},"assertion":[{"value":"14 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 November 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 November 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}