{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T17:58:08Z","timestamp":1767117488998,"version":"3.37.3"},"reference-count":67,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,9,26]],"date-time":"2018-09-26T00:00:00Z","timestamp":1537920000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100002418","name":"Intel Corporation","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100002418","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Hardw Syst Secur"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s41635-018-0049-y","type":"journal-article","created":{"date-parts":[[2018,9,26]],"date-time":"2018-09-26T05:22:05Z","timestamp":1537939325000},"page":"103-131","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Lightweight Design-for-Security Strategies for Combined Countermeasures Against Side Channel and Fault Analysis in IoT Applications"],"prefix":"10.1007","volume":"3","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2309-7939","authenticated-orcid":false,"given":"Sikhar","family":"Patranabis","sequence":"first","affiliation":[]},{"given":"Debapriya Basu","family":"Roy","sequence":"additional","affiliation":[]},{"given":"Anirban","family":"Chakraborty","sequence":"additional","affiliation":[]},{"given":"Naveen","family":"Nagar","sequence":"additional","affiliation":[]},{"given":"Astikey","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Debdeep","family":"Mukhopadhyay","sequence":"additional","affiliation":[]},{"given":"Santosh","family":"Ghosh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,26]]},"reference":[{"key":"49_CR1","doi-asserted-by":"crossref","unstructured":"Kocher P, Jaffe J, Jun J (1999) Differential power analysis. In: Advances in cryptology, CRYPTO\u201999. Springer, pp 388\u2013397","DOI":"10.1007\/3-540-48405-1_25"},{"key":"49_CR2","doi-asserted-by":"crossref","unstructured":"Tunstall M, Mukhopadhyay D, Ali S (2011) Differential fault analysis of the advanced encryption standard using a single fault. In: Information security theory and practice. Security and privacy of mobile devices in wireless communication. Springer, pp 224\u2013233","DOI":"10.1007\/978-3-642-21040-2_15"},{"key":"49_CR3","doi-asserted-by":"crossref","unstructured":"Benini L, Macii A, Macii E, Omerbegovic E, Pro F, Poncino M (2003) Energy-aware design techniques for differential power analysis protection. In: Proceedings of the 40th design automation conference, DAC 2003, Anaheim, CA, USA June 2-6, 2003, pp 36\u201341","DOI":"10.1145\/775832.775845"},{"key":"49_CR4","unstructured":"Standaert F-X, Peeters E, Quisquater J-J (2005) On the masking countermeasure and higher-order power analysis attacks. In: International conference on information technology: coding and computing, 2005. ITCC 2005, vol 1. IEEE, pp 562\u2013567"},{"key":"49_CR5","doi-asserted-by":"crossref","unstructured":"Moradi A, Poschmann A (2010) Lightweight cryptography and dpa countermeasures: a survey. In: Financial cryptography and data security. Springer, pp 68\u201379","DOI":"10.1007\/978-3-642-14992-4_7"},{"issue":"10","key":"49_CR6","doi-asserted-by":"publisher","first-page":"1595","DOI":"10.1109\/TCAD.2013.2263037","volume":"32","author":"X Guo","year":"2013","unstructured":"Guo X, Karri R (2013) Recomputing with permuted operands: a concurrent error detection approach. IEEE Trans Comput-Aided Design Integ Circuits Syst 32(10):1595\u20131608","journal-title":"IEEE Trans Comput-Aided Design Integ Circuits Syst"},{"key":"49_CR7","doi-asserted-by":"crossref","unstructured":"Tupsamudre H, Bisht S, Mukhopadhyay D (2014) Destroying fault invariant with randomization. In: Cryptographic hardware and embedded systems\u2013CHES 2014. Springer, pp 93\u2013111","DOI":"10.1007\/978-3-662-44709-3_6"},{"key":"49_CR8","unstructured":"Thuy Ngo X, Bhasin S, Danger J-L, Guilley S, Najm Z (2015) Linear complementary dual code improvement to strengthen encoded circuit against hardware trojan horses. In: 2015 IEEE international symposium on hardware oriented security and trust (HOST). IEEE, pp 82\u201387"},{"key":"49_CR9","doi-asserted-by":"crossref","unstructured":"Ghalaty N, Yuce B, Taha M, Schaumont P (2014) Differential fault intensity analysis. In: Proceedings 2014 workshop on fault diagnosis and tolerance in cryptography (FDTC), vol 2014. IEEE, pp 49\u201358","DOI":"10.1109\/FDTC.2014.15"},{"key":"49_CR10","doi-asserted-by":"crossref","unstructured":"Patranabis S, Chakraborty A, Nguyen PH, Mukhopadhyay D (2015) A biased fault attack on the time redundancy countermeasure for AES. In: Constructive side-channel analysis and secure design. Springer, pp 189\u2013203","DOI":"10.1007\/978-3-319-21476-4_13"},{"key":"49_CR11","unstructured":"(2001). FIPS PUB 197. Advanced Encryption Standard. National Institute of Standards and Technology"},{"key":"49_CR12","doi-asserted-by":"crossref","unstructured":"Bogdanov A, Knudsen LR, Leander G, Paar C, Poschmann A, Robshaw MJB, Seurin Y, Vikkelsoe C (2007) PRESENT: an ultralightweight block cipher. In: Cryptographic hardware and embedded systems - CHES 2007, 9th international workshop, Vienna, Austria, September 10-13, 2007, Proceedings, pp 450\u2013466","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"49_CR13","doi-asserted-by":"crossref","unstructured":"Beaulieu R, Shors D, Smith J, Treatman-Clark S, Weeks B, Wingers L (2015) The SIMON and SPECK lightweight block ciphers. In: Proceedings of the 52nd annual design automation conference, San Francisco, CA, USA, June 7-11, 2015, pp 175: 1\u2013175:6","DOI":"10.1145\/2744769.2747946"},{"key":"49_CR14","doi-asserted-by":"crossref","unstructured":"Karpovsky M, Kulikowski KJ, Taubin A (2004) Robust protection against fault-injection attacks on smart cards implementing the advanced encryption standard. In: 2004 international conference on dependable systems and networks. IEEE, pp 93\u2013101","DOI":"10.1109\/DSN.2004.1311880"},{"key":"49_CR15","doi-asserted-by":"crossref","unstructured":"Regazzoni F, Eisenbarth T, Breveglieri L, Ienne P, Koren I (2008) Can knowledge regarding the presence of countermeasures against fault attacks simplify power attacks on cryptographic devices?. In: IEEE international symposium on defect and fault tolerance of VLSI systems, 2008. DFTVS\u201908. IEEE, pp 202\u2013210","DOI":"10.1109\/DFT.2008.53"},{"issue":"5","key":"49_CR16","doi-asserted-by":"publisher","first-page":"1092","DOI":"10.1109\/TIFS.2016.2646638","volume":"12","author":"S Patranabis","year":"2017","unstructured":"Patranabis S, Chakraborty A, Mukhopadhyay D, Chakrabarti PP (2017) Fault space transformation: a generic approach to counter differential fault analysis and differential fault intensity analysis on aes-like block ciphers. IEEE Trans Inf Forensics Secur 12(5):1092\u20131102","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"49_CR17","doi-asserted-by":"crossref","unstructured":"Albrecht MR, Driessen B, Kavun EB, Leander G, Paar C, Yal\u00e7\u0131n T (2014) Block ciphers\u2013focus on the linear layer (feat. pride). In: Advances in cryptology\u2013CRYPTO 2014. Springer, pp 57\u201376","DOI":"10.1007\/978-3-662-44371-2_4"},{"key":"49_CR18","volume-title":"PRESENT: an ultra-lightweight block cipher","author":"A Bogdanov","year":"2007","unstructured":"Bogdanov A, Knudsen LR, Leander G, Paar C, Poschmann A, Robshaw MJB, Seurin Y, Vikkelsoe C (2007) PRESENT: an ultra-lightweight block cipher. Springer, Berlin"},{"key":"49_CR19","doi-asserted-by":"crossref","unstructured":"Banik S, Pandey SK, Peyrin T, Sasaki Y, Sim SM, Todo Y (2017) GIFT: a small present - towards reaching the limit of lightweight encryption. In: CHES, volume 10529 of lecture notes in computer science. Springer, pp 321\u2013345","DOI":"10.1007\/978-3-319-66787-4_16"},{"key":"49_CR20","doi-asserted-by":"crossref","unstructured":"Maghrebi H, Danger J-L, Flament F, Guilley S, Sauvage L (2009) Evaluation of countermeasure implementations based on Boolean masking to thwart side-channel attacks. In: 2009 3rd international conference on signals, circuits and systems (SCS). IEEE, pp 1\u20136","DOI":"10.1109\/ICSCS.2009.5412597"},{"issue":"1-2","key":"49_CR21","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/s10623-016-0250-3","volume":"82","author":"K Chakraborty","year":"2017","unstructured":"Chakraborty K, Sarkar S, Maitra S, Mazumdar B, Mukhopadhyay D, Prouff E (2017) Redefining the transparency order. Des Codes Crypt 82(1-2):95\u2013115","journal-title":"Des Codes Crypt"},{"key":"49_CR22","doi-asserted-by":"crossref","unstructured":"Mangard S (2004) Hardware countermeasures against DPA\u2013a statistical analysis of their effectiveness. In: Topics in cryptology\u2013CT-RSA 2004. Springer, pp 222\u2013235","DOI":"10.1007\/978-3-540-24660-2_18"},{"issue":"7","key":"49_CR23","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1145\/2771283","volume":"58","author":"C Edwards","year":"2015","unstructured":"Edwards C (2015) Growing pains for deep learning. Commun ACM 58(7):14\u201316","journal-title":"Commun ACM"},{"key":"49_CR24","doi-asserted-by":"crossref","unstructured":"Schneider T, Moradi A (2015) Leakage assessment methodology. In: Cryptographic hardware and embedded systems\u2013CHES 2015. Springer, pp 495\u2013513","DOI":"10.1007\/978-3-662-48324-4_25"},{"key":"49_CR25","doi-asserted-by":"crossref","unstructured":"Piret G, Quisquater J-J (2003) A differential fault attack technique against SPN structures, with application to the AES and KHAZAD. In: Cryptographic hardware and embedded systems, CHES 2003. Springer, pp 77\u201388","DOI":"10.1007\/978-3-540-45238-6_7"},{"key":"49_CR26","doi-asserted-by":"crossref","unstructured":"Robisson B, Manet P (2007) Differential behavioral analysis. In: Cryptographic hardware and embedded systems - CHES 2007, 9th international workshop, Vienna, Austria, September 10-13, 2007, Proceedings, pp 413\u2013426","DOI":"10.1007\/978-3-540-74735-2_28"},{"key":"49_CR27","doi-asserted-by":"crossref","unstructured":"Bl\u00f6mer J, Seifert J-P (2003) Fault based cryptanalysis of the advanced encryption standard (AES). In: Wright RN (ed) Financial cryptography, volume 2742 of lecture notes in computer science. Springer, pp 162\u2013181","DOI":"10.1007\/978-3-540-45126-6_12"},{"key":"49_CR28","unstructured":"Malkin T, Standaert FX, Yung M (2005) A comparative cost\/security analysis of fault attack countermeasures. In: 2005 workshop on fault diagnosis and tolerance in cryptography (FDTC). IEEE, pp 109\u2013123"},{"issue":"11","key":"49_CR29","doi-asserted-by":"publisher","first-page":"1528","DOI":"10.1109\/TC.2008.149","volume":"57","author":"P Maistri","year":"2008","unstructured":"Maistri P, Leveugle R (2008) Double-data-rate computation as a countermeasure against fault analysis. IEEE Trans Comput 57(11):1528\u20131539","journal-title":"IEEE Trans Comput"},{"issue":"3","key":"49_CR30","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1049\/iet-ifs:20060163","volume":"1","author":"M Joye","year":"2007","unstructured":"Joye M, Manet P, Rigaud J-B (2007) Strengthening hardware AES implementations against fault attacks. IET Inf Secur 1(3):106\u2013110","journal-title":"IET Inf Secur"},{"key":"49_CR31","doi-asserted-by":"crossref","unstructured":"Karri R, Kuznetsov G, Goessel M (2003) Parity-based concurrent error detection of substitution-permutation network block ciphers. In: Cryptographic hardware and embedded systems-CHES 2003. Springer, pp 113\u2013124","DOI":"10.1007\/978-3-540-45238-6_10"},{"key":"49_CR32","doi-asserted-by":"crossref","unstructured":"Patranabis S, Chakraborty A, Mukhopadhyay D (2015) Fault tolerant infective countermeasure for AES. In: Security, privacy, and applied cryptography engineering. Springer, pp 190\u2013209","DOI":"10.1007\/978-3-319-24126-5_12"},{"key":"49_CR33","doi-asserted-by":"crossref","unstructured":"Bringer J, Carlet C, Chabanne H, Guilley S, Maghrebi H (2014) Orthogonal direct sum masking. In: Information security theory and practice. Securing the internet of things. Springer, pp 40\u201356","DOI":"10.1007\/978-3-662-43826-8_4"},{"key":"49_CR34","first-page":"1","volume":"00431261","author":"J-L Danger","year":"2009","unstructured":"Danger J-L, Guilley S, Bhasin S, Nassar M, Sauvage L (2009) Overview of dual rail with precharge logic styles to thwart implementation-level attacks on hardware cryptoprocessors. SCS 00431261:1\u20137","journal-title":"SCS"},{"key":"49_CR35","doi-asserted-by":"crossref","unstructured":"He W, Breier J, Bhasin S, Chattopadhyay A (2016) Bypassing parity protected cryptography using laser fault injection in cyber-physical system. In: Proceedings of the 2nd ACM international workshop on cyber-physical system security. ACM, pp 15\u201321","DOI":"10.1145\/2899015.2899019"},{"key":"49_CR36","unstructured":"Junod P, Vaudenay S (2005) Perfect diffusion primitives for block ciphers. In: Selected areas in cryptography. Springer, pp 84\u201399"},{"issue":"1-3","key":"49_CR37","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/s10623-008-9194-6","volume":"49","author":"M Brinkmann","year":"2008","unstructured":"Brinkmann M, Leander G (2008) On the classification of APN functions up to dimension five. Des Codes Crypt 49(1-3):273\u2013288","journal-title":"Des Codes Crypt"},{"issue":"3","key":"49_CR38","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1109\/TC.2010.136","volume":"60","author":"D Mukhopadhyay","year":"2011","unstructured":"Mukhopadhyay D, Chowdhury DR (2011) A parallel efficient architecture for large cryptographically robust n \u00d7 k (k>n\/2) mappings. IEEE Trans Comput 60(3):375\u2013385","journal-title":"IEEE Trans Comput"},{"key":"49_CR39","first-page":"349","volume":"174","author":"R Anderson","year":"1998","unstructured":"Anderson R, Biham E, Lars K (1998) Serpent: a proposal for the advanced encryption standard. NIST AES Proposal 174:349\u2013 354","journal-title":"NIST AES Proposal"},{"key":"49_CR40","doi-asserted-by":"crossref","unstructured":"Guo J, Peyrin T, Poschmann A (2011) The photon family of lightweight hash functions. In: Advances in cryptology\u2013CRYPTO 2011. Springer, pp 222\u2013239","DOI":"10.1007\/978-3-642-22792-9_13"},{"key":"49_CR41","doi-asserted-by":"crossref","unstructured":"Guo J, Peyrin T, Poschmann A, Robshaw M (2011) The led block cipher. In: Cryptographic hardware and embedded systems\u2013CHES 2011. Springer, pp 326\u2013341","DOI":"10.1007\/978-3-642-23951-9_22"},{"key":"49_CR42","unstructured":"Augot D, Finiasz M (2014) Direct construction of recursive MDS diffusion layers using shortened BCH codes. In: Fast software encryption. Springer, pp 3\u201317"},{"key":"49_CR43","doi-asserted-by":"crossref","unstructured":"Sim SM, Khoo K, Oggier F, Peyrin T (2015) Lightweight MDS involution matrices. In: International workshop on fast software encryption. Springer, pp 471\u2013493","DOI":"10.1007\/978-3-662-48116-5_23"},{"key":"49_CR44","doi-asserted-by":"crossref","unstructured":"Li Y, Wang M (2016) On the construction of lightweight circulant involutory MDS matrices. In: International conference on fast software encryption. Springer, pp 121\u2013139","DOI":"10.1007\/978-3-662-52993-5_7"},{"key":"49_CR45","doi-asserted-by":"crossref","unstructured":"Liu M, Sim SM (2016) Lightweight MDS generalized circulant matrices. In: International conference on fast software encryption. Springer, pp 101\u2013120","DOI":"10.1007\/978-3-662-52993-5_6"},{"issue":"1","key":"49_CR46","doi-asserted-by":"crossref","first-page":"95","DOI":"10.46586\/tosc.v2016.i1.95-113","volume":"2016","author":"S Sarkar","year":"2016","unstructured":"Sarkar S, Syed H (2016) Lightweight diffusion layer: importance of toeplitz matrices. IACR Transactions on Symmetric Cryptology 2016(1):95\u2013113","journal-title":"IACR Transactions on Symmetric Cryptology"},{"issue":"4","key":"49_CR47","doi-asserted-by":"crossref","first-page":"130","DOI":"10.46586\/tosc.v2017.i4.130-168","volume":"2017","author":"J Jean","year":"2017","unstructured":"Jean J, Peyrin T, Sim SM, Tourteaux J (2017) Optimizing implementations of lightweight building blocks. IACR Transactions on Symmetric Cryptology 2017(4):130\u2013168","journal-title":"IACR Transactions on Symmetric Cryptology"},{"issue":"1","key":"49_CR48","doi-asserted-by":"crossref","first-page":"4","DOI":"10.46586\/tosc.v2017.i1.4-44","volume":"2017","author":"R Avanzi","year":"2017","unstructured":"Avanzi R (2017) The QARMA block cipher family. almost mds matrices over rings with zero divisors, nearly symmetric even-mansour constructions with non-involutory central rounds, and search heuristics for low-latency S-Boxes. IACR Transactions on Symmetric Cryptology 2017(1):4\u201344","journal-title":"IACR Transactions on Symmetric Cryptology"},{"issue":"2","key":"49_CR49","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1147\/rd.282.0124","volume":"28","author":"C-L Chen","year":"1984","unstructured":"Chen C-L, Hsiao MY (1984) Error-correcting codes for semiconductor memory applications: a state-of-the-art review. IBM J Res Dev 28(2):124\u2013134","journal-title":"IBM J Res Dev"},{"key":"49_CR50","unstructured":"Costello D, Lin S (2004) Error control coding. New Jersey"},{"key":"49_CR51","volume-title":"Cryptographic algorithms on reconfigurable hardware","author":"F Rodr\u00edguez-Henr\u00edquez","year":"2007","unstructured":"Rodr\u00edguez-Henr\u00edquez F, Saqib NA, Perez AD, Koc CK (2007) Cryptographic algorithms on reconfigurable hardware. Springer, Berlin"},{"key":"49_CR52","doi-asserted-by":"publisher","DOI":"10.1201\/b17555","volume-title":"Hardware security : design, threats, and safeguards","author":"D Mukhopadhyay","year":"2014","unstructured":"Mukhopadhyay D, Chakraborty RS (2014) Hardware security : design, threats, and safeguards. CRC Press, Boca Raton"},{"key":"49_CR53","doi-asserted-by":"crossref","unstructured":"Guilley S, Hoogvorst P, Pacalet R (2004) Differential power analysis model and some results. In: Quisquater JJ, Paradinas P, Deswarte Y, El Kalam AA (eds) Smart card research and advanced applications VI \u2013 CARDIS 2004. Kluwer Academic Publishers, pp 127\u2013142","DOI":"10.1007\/1-4020-8147-2_9"},{"key":"49_CR54","doi-asserted-by":"crossref","unstructured":"Prouff E (2005) DPA attacks and S-Boxes. In: Handschuh H, Gilbert H (eds) Fast software encryption \u2013 FSE 2005, volume 3557 of lecture notes in computer science. Springer, pp 424\u2013442","DOI":"10.1007\/11502760_29"},{"key":"49_CR55","doi-asserted-by":"crossref","unstructured":"Whitnall C, Oswald E (2011) A comprehensive evaluation of mutual information analysis using a fair evaluation framework. In: Rogaway P (ed) CRYPTO, volume 6841 of lecture notes in computer science. Springer, pp 316\u2013334","DOI":"10.1007\/978-3-642-22792-9_18"},{"key":"49_CR56","doi-asserted-by":"crossref","unstructured":"Kavun EB, Yal\u00e7in T (2011) RAM-based ultra-lightweight FPGA implementation of PRESENT. In: 2011 international conference on reconfigurable computing and FPGAs, ReConFig 2011, Cancun, Mexico, November 30 - December 2, 2011, pp 280\u2013285","DOI":"10.1109\/ReConFig.2011.74"},{"key":"49_CR57","unstructured":"Roy DB, Das P, Mukhopadhyay D (2015) ECC on your fingertips: a single instruction approach for lightweight ECC design in GF(p). In: Selected areas in cryptography - SAC 2015 - 22nd international conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers, pp 161\u2013177"},{"key":"49_CR58","unstructured":"Borghoff J, Canteaut A, G\u00fcneysu T, Kavun EB, Knezevic M, Knudsen LR, Leander G, Nikov V, Paar C, Rechberger C, Rombouts P, Thomsen SS, Yal\u00e7in T (2012) PRINCE - a low-latency block cipher for pervasive computing applications - extended abstract. In: Wang X, Sako K (eds) Advances in cryptology - ASIACRYPT 2012 - 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2-6, 2012. Proceedings, volume 7658 of lecture notes in computer science. Springer, pp 208\u2013 225"},{"key":"49_CR59","unstructured":"Dobraunig C, Eichlseder M, Mangard S, Mendel F (2014) On the security of fresh re-keying to counteract side-channel and fault attacks. In: International conference on smart card research and advanced applications. Springer, pp 233\u2013244"},{"key":"49_CR60","first-page":"434","volume":"2016","author":"C Chen","year":"2016","unstructured":"Chen C, Farmani M, Eisenbarth T (2016) A tale of two shares: why two-share threshold implementation seems worthwhile-and why it is not. IACR Cryptology ePrint Archive 2016:434","journal-title":"IACR Cryptology ePrint Archive"},{"issue":"2","key":"49_CR61","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/s00145-010-9086-6","volume":"24","author":"A Poschmann","year":"2011","unstructured":"Poschmann A, Moradi A, Khoo K, Lim C-W, Wang H, Ling S (2011) Side-channel resistant crypto for less than 2,300 GE. J Cryptol 24(2):322\u2013345","journal-title":"J Cryptol"},{"key":"49_CR62","doi-asserted-by":"crossref","unstructured":"Moradi A, Wild A (2015) Assessment of hiding the higher-order leakages in hardware - what are the achievements versus overheads?. In: Cryptographic hardware and embedded systems - CHESS 2015 - 17th international workshop, Saint-Malo, France, September 13-16, 2015, Proceedings, pp 453\u2013474","DOI":"10.1007\/978-3-662-48324-4_23"},{"key":"49_CR63","unstructured":"Sasdrich P, Moradi A, G\u00fcneysu T (2015) Affine equivalence and its application to tightening threshold implementations. In: Selected areas in cryptography - SAC 2015 - 22nd international conference, Sackville, NB, Canada, August 12-14, 2015, revised selected papers, pp 263\u2013276"},{"key":"49_CR64","doi-asserted-by":"crossref","unstructured":"De Cnudde T, Nikova S (2016) More efficient private circuits II through threshold implementations. In: 2016 workshop on fault diagnosis and tolerance in cryptography, FDTC 2016, Santa Barbara, CA, USA, August 16, 2016, pp 114\u2013124","DOI":"10.1109\/FDTC.2016.15"},{"key":"49_CR65","doi-asserted-by":"crossref","unstructured":"Cnudde TD, Nikova S (2017) Securing the present block cipher against combined side-channel analysis and fault attacks. IEEE Trans Very Large Scale Integr VLSI Syst 25:3291\u20133301","DOI":"10.1109\/TVLSI.2017.2713483"},{"key":"49_CR66","doi-asserted-by":"crossref","unstructured":"Schneider T, Moradi A, G\u00fcneysu T (2016) Parti - towards combined hardware countermeasures against side-channel and fault-injection attacks. In: Advances in cryptology - CRYPTO 2016 - 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II, pp 302\u2013332","DOI":"10.1007\/978-3-662-53008-5_11"},{"key":"49_CR67","doi-asserted-by":"crossref","unstructured":"Guo J, Peyrin T, Poschmann A, Robshaw MJB (2011) The LED block cipher. In: Cryptographic hardware and embedded systems - CHES 2011 - 13th international workshop, Nara, Japan, September 28 - October 1, 2011, Proceedings, pp 326\u2013341","DOI":"10.1007\/978-3-642-23951-9_22"}],"container-title":["Journal of Hardware and Systems Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-018-0049-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s41635-018-0049-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-018-0049-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,11]],"date-time":"2020-11-11T02:30:23Z","timestamp":1605061823000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s41635-018-0049-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,26]]},"references-count":67,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["49"],"URL":"https:\/\/doi.org\/10.1007\/s41635-018-0049-y","relation":{},"ISSN":["2509-3428","2509-3436"],"issn-type":[{"type":"print","value":"2509-3428"},{"type":"electronic","value":"2509-3436"}],"subject":[],"published":{"date-parts":[[2018,9,26]]},"assertion":[{"value":"15 March 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 September 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 September 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}