{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T12:10:20Z","timestamp":1710331820700},"reference-count":13,"publisher":"Informa UK Limited","issue":"5","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Security Journal: A Global Perspective"],"published-print":{"date-parts":[[2017,9,3]]},"DOI":"10.1080\/19393555.2017.1371361","type":"journal-article","created":{"date-parts":[[2017,9,25]],"date-time":"2017-09-25T15:28:31Z","timestamp":1506353311000},"page":"249-265","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":2,"title":["Fault analysis on Kalyna"],"prefix":"10.1080","volume":"26","author":[{"given":"Onur","family":"Duman","sequence":"first","affiliation":[{"name":"Concordia Institute for Information Systems Engineering, Concordia University, Montr\u00e9al, Qu\u00e9bec, Canada"}]},{"given":"Amr M.","family":"Youssef","sequence":"additional","affiliation":[{"name":"Concordia Institute for Information Systems Engineering, Concordia University, Montr\u00e9al, Qu\u00e9bec, Canada"}]}],"member":"301","published-online":{"date-parts":[[2017,9,25]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1007\/s10559-016-9835-0"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2015EDL8174"},{"key":"CIT0003","volume-title":"4th Workshop on Current Trends in Cryptology, CTCrypt 2015","author":"AlTawy R.","year":"2015"},{"key":"CIT0006","first-page":"929","volume":"36","author":"Bussi K.","year":"2016","journal-title":"Italian Journal of Pure and Applied Mathematics"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2013.16"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1080\/01611194.2011.632807"},{"key":"CIT0010","volume-title":"Springer","author":"Daemen, Joan, Rijmen, Vincent, The Design of Rijndael AES \u2013 The Advanced Encryption Standard,","year":"2002"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2014.15"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-017-0353-5"},{"key":"CIT0019","volume-title":"National standard of ukraine. information technologies. cryptographic data security. symmetric block transformation algorithm. ministry of economical development and trade of ukraine","author":"Oliynykov R.","year":"2015"},{"issue":"1","key":"CIT0020","first-page":"2","volume":"8","author":"Oliynykov R.","year":"2015","journal-title":"Norsk Informasjonssikkerhetskonferanse (NISK)"},{"issue":"1","key":"CIT0021","first-page":"11","volume":"8","author":"Oliynykov R.","year":"2015","journal-title":"Norsk Informasjonssikkerhetskonferanse (NISK)"},{"issue":"2","key":"CIT0022","doi-asserted-by":"crossref","first-page":"99","DOI":"10.46586\/tosc.v2016.i2.99-124","volume":"2016","author":"Perrin L.","year":"2017","journal-title":"IACR Transactions on Symmetric Cryptology"}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393555.2017.1371361","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T10:51:58Z","timestamp":1659523918000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/19393555.2017.1371361"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,3]]},"references-count":13,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2017,7,18]]},"published-print":{"date-parts":[[2017,9,3]]}},"alternative-id":["10.1080\/19393555.2017.1371361"],"URL":"https:\/\/doi.org\/10.1080\/19393555.2017.1371361","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"value":"1939-3555","type":"print"},{"value":"1939-3547","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,9,3]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}