{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T20:20:38Z","timestamp":1740169238292,"version":"3.37.3"},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100010418","name":"Institute for Information & communications Technology Promotion (IITP) grant","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100010418","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003621","name":"Korea government","doi-asserted-by":"publisher","award":["2017-0-00520, Development of SCR-Friendly Symmetric Key Cryptosystem and Its Application Modes)"],"award-info":[{"award-number":["2017-0-00520, Development of SCR-Friendly Symmetric Key Cryptosystem and Its Application Modes)"]}],"id":[{"id":"10.13039\/501100003621","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3039805","type":"journal-article","created":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T22:49:15Z","timestamp":1606171755000},"page":"212794-212802","source":"Crossref","is-referenced-by-count":4,"title":["Improved Differential Fault Attack on LEA by Algebraic Representation of Modular Addition"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9166-3402","authenticated-orcid":false,"given":"Seonghyuck","family":"Lim","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7770-2276","authenticated-orcid":false,"given":"Jonghyeok","family":"Lee","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1695-5103","authenticated-orcid":false,"given":"Dong-Guk","family":"Han","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","first-page":"3","article-title":"Lightweight fault attack resistance in software using intra-instruction redundancy, revisited","author":"seo","year":"2017","journal-title":"Proc Int Workshop Inf Secur Appl"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/APSIPA.2016.7820845"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24315-3_27"},{"key":"ref11","first-page":"1","article-title":"SPARX: A family of arx-based lightweight block ciphers provably secure against linear and differential attacks","author":"dinu","year":"2016","journal-title":"Proc ASIACRYPT"},{"key":"ref12","first-page":"3","article-title":"CHAM: A family of lightweight block ciphers for resource-constrained devices","author":"koo","year":"2017","journal-title":"Proc Int Conf Inf Security Cryptol"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_19"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45126-6_12"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2008.05.031"},{"journal-title":"Information Security&#x2014;Lightweight Cryptography&#x2014;Part 2 Block Ciphers","year":"2019","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.6109\/jkiice.2015.19.7.1608"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103214"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88625-9_22"},{"journal-title":"Gnu Arm Embedded Toolchain Version 4 8","year":"2014","key":"ref28"},{"key":"ref4","first-page":"137","article-title":"Reijndael: The advanced encryption standard","volume":"26","author":"daemen","year":"2001","journal-title":"Dr Dobb s J Software Tools Prof Programmers"},{"journal-title":"Arm Cortex-M4F Microcontroller","year":"2020","key":"ref27"},{"key":"ref3","first-page":"3","article-title":"LEA: A 128-bit block cipher for fast encryption on common processors","author":"hong","year":"2013","journal-title":"Proc Int Workshop Inf Secur Appl"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-018-0193-x"},{"journal-title":"Singular-Computer Algebra System","year":"2020","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12778-1_15"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2881130"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.12720\/jcm.11.7.677-685"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052259"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.13089\/JKIISC.2014.24.6.1117"},{"key":"ref1","first-page":"104","article-title":"Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems","author":"kocher","year":"1996","journal-title":"Proc Annu Int Cryptol Conf"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-59048-1_2"},{"article-title":"Groebner bases and applications to the security of multivariate public key cryptosystems","year":"2016","author":"ospina","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2015.15"},{"journal-title":"Em-Fi Transient Probe","year":"2020","key":"ref24"},{"journal-title":"SpiderMonkey","year":"2020","key":"ref23"},{"journal-title":"Pinata Board","year":"2020","key":"ref26"},{"journal-title":"Inspector Subscription Fi Professional","year":"2020","key":"ref25"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09266045.pdf?arnumber=9266045","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:55:08Z","timestamp":1639770908000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9266045\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3039805","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2020]]}}}