{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T00:48:44Z","timestamp":1740185324673,"version":"3.37.3"},"reference-count":16,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCR 996139"],"award-info":[{"award-number":["CCR 996139"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Microelectronics Journal"],"published-print":{"date-parts":[[2003,1]]},"DOI":"10.1016\/s0026-2692(02)00126-x","type":"journal-article","created":{"date-parts":[[2003,1,30]],"date-time":"2003-01-30T17:32:20Z","timestamp":1043947940000},"page":"31-39","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":3,"title":["Concurrent error detection of fault-based side-channel cryptanalysis of 128-bit RC6 block cipher"],"prefix":"10.1016","volume":"34","author":[{"given":"Kaijie","family":"Wu","sequence":"first","affiliation":[]},{"given":"Piyush","family":"Mishra","sequence":"additional","affiliation":[]},{"given":"Ramesh","family":"Karri","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/S0026-2692(02)00126-X_BIB1","first-page":"3","article-title":"Differential cryptanalysis of DES-like crytptosystems","volume":"4","author":"Biham","year":"1991","journal-title":"Journal of Cryptography"},{"year":"1994","series-title":"Proceedings of Advances in Cryptology-Eurocrypt '93","author":"Matsui","key":"10.1016\/S0026-2692(02)00126-X_BIB2"},{"key":"10.1016\/S0026-2692(02)00126-X_BIB3","series-title":"Proceedings of Eurocrypt, Lecture Notes in Computer Science","volume":"vol. 1233","author":"Boneh","year":"1997"},{"key":"10.1016\/S0026-2692(02)00126-X_BIB4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-46588-1_30","article-title":"Selecting cryptographic key sizes","author":"Lenstra","year":"2000","journal-title":"Public Key Cryptography Conference"},{"key":"10.1016\/S0026-2692(02)00126-X_BIB5","doi-asserted-by":"crossref","unstructured":"R.J. Anderson, Crypto in Europe\u2014markets, law and policy, Cryptography: Policy and Algorithms, vol. 1029, Springer LNCS, pp. 75\u201389. ftp:\/\/ftp.cl.cam.ac.uk\/users\/rja14\/queensland.ps.Z.","DOI":"10.1007\/BFb0032347"},{"key":"10.1016\/S0026-2692(02)00126-X_BIB6","series-title":"Fifth International Workshop on Security Protocols","volume":"vol. 1361","author":"Bao","year":"1997"},{"key":"10.1016\/S0026-2692(02)00126-X_BIB7","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0052259","article-title":"Differential fault analysis of secret key cryptosystems","author":"Biham","year":"1997","journal-title":"Proceedings of Crypto'97"},{"key":"10.1016\/S0026-2692(02)00126-X_BIB8","unstructured":"J.J. Floyd, K.E. Fu, P. Sun, MIT, 6.857 Computer & Network Security Final Project: Differential Fault Analysis, December 1996, http:\/\/web.mit.edu\/jered\/www\/publications\/rc5-dfa-paper.ps."},{"key":"10.1016\/S0026-2692(02)00126-X_BIB9","series-title":"Fifth International Workshop on Security Protocols, Paris, April 7\u20139","volume":"vol. 1361","author":"Anderson","year":"1997"},{"key":"10.1016\/S0026-2692(02)00126-X_BIB10","doi-asserted-by":"crossref","first-page":"782","DOI":"10.1109\/TEST.1993.470624","article-title":"VINCI: secure test of a VLSI high-speed encryption system","author":"Bonnenberg","year":"1993","journal-title":"Proceedings of IEEE International Test Conference"},{"key":"10.1016\/S0026-2692(02)00126-X_BIB11","first-page":"397","article-title":"On the VLSI implementation of the International Data encryption algorithm IDEA","volume":"1","author":"Wolter","year":"1995","journal-title":"IEEE International Symposium on Circuits and Systems"},{"key":"10.1016\/S0026-2692(02)00126-X_BIB12","first-page":"979","article-title":"Concurrent error detection in block ciphers","author":"Fernandez-Gomez","year":"2000","journal-title":"IEEE International Test Conference"},{"key":"10.1016\/S0026-2692(02)00126-X_BIB13","unstructured":"R.L. Rivest, M.J.B. Robshaw, R. Sidney, Y.L. Yin, The RC6TM block cipher, ftp:\/\/ftp.rsasecurity.com\/pub\/rsalabs\/aes\/rc6v11.pdf."},{"key":"10.1016\/S0026-2692(02)00126-X_BIB14","first-page":"200","article-title":"Idle cycles based concurrent error detection of RC6 encryption","author":"Wu","year":"2001","journal-title":"Proceedings of IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems"},{"key":"10.1016\/S0026-2692(02)00126-X_BIB15","first-page":"579","article-title":"Concurrent error detection of fault-based side-channel cryptanalysis of 128-bit symmetric block ciphers","volume":"128","author":"Karri","year":"2001","journal-title":"Proceedings of Design Automation Conference"},{"year":"1996","series-title":"Applied Cryptography","author":"Schneier","key":"10.1016\/S0026-2692(02)00126-X_BIB16"}],"container-title":["Microelectronics Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S002626920200126X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S002626920200126X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,7,5]],"date-time":"2024-07-05T18:20:26Z","timestamp":1720203626000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S002626920200126X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,1]]},"references-count":16,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2003,1]]}},"alternative-id":["S002626920200126X"],"URL":"https:\/\/doi.org\/10.1016\/s0026-2692(02)00126-x","relation":{},"ISSN":["1879-2391"],"issn-type":[{"type":"print","value":"1879-2391"}],"subject":[],"published":{"date-parts":[[2003,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Concurrent error detection of fault-based side-channel cryptanalysis of 128-bit RC6 block cipher","name":"articletitle","label":"Article Title"},{"value":"Microelectronics Journal","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/S0026-2692(02)00126-X","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"converted-article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2002 Elsevier Science Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}]}}