{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:14:47Z","timestamp":1729642487485,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,7]]},"DOI":"10.1109\/asap.2010.5540765","type":"proceedings-article","created":{"date-parts":[[2010,8,10]],"date-time":"2010-08-10T15:51:40Z","timestamp":1281455500000},"page":"115-122","source":"Crossref","is-referenced-by-count":4,"title":["Dependability analysis of a countermeasure against fault attacks by means of laser shots onto a SRAM-based FPGA"],"prefix":"10.1109","author":[{"given":"G.","family":"Canivet","sequence":"first","affiliation":[]},{"given":"P.","family":"Maistri","sequence":"additional","affiliation":[]},{"given":"R.","family":"Leveugle","sequence":"additional","affiliation":[]},{"given":"F.","family":"Valette","sequence":"additional","affiliation":[]},{"given":"J.","family":"Clediere","sequence":"additional","affiliation":[]},{"given":"M.","family":"Renaudin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2001","key":"ref10","article-title":"FIPS-197: Advanced Encryption Standard"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/3-540-45682-1_15","article-title":"A compact Rijndael hardware architecture with S-Box optimization","volume":"2248","author":"satoh","year":"2001","journal-title":"Proc of ASIACRYPT Lecture Notes in Computer Science"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2007.8"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/DFTVS.2001.966771"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.149"},{"key":"ref15","first-page":"346","article-title":"Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration","author":"mentens","year":"2008","journal-title":"10th International Workshop on Cryptographic Hardware and Embedded Systems vol 5154 of Lecture Notes in Computer Science"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2002.804378"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1007\/978-3-540-28632-5_29","article-title":"Concurrent error detection schemes for involution ciphers","volume":"3156","author":"joshi","year":"2004","journal-title":"Proceedings of the 6th International Workshop on Cryptographic Hardware and Embedded Systems - CHES 2004 Lecture Notes in Computer Science"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1190590"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1007\/978-3-540-45238-6_10","article-title":"Parity based concurrent error detection of substitution-permutation network block ciphers","volume":"2779","author":"karri","year":"2003","journal-title":"Proceedings of the 5th International Workshop on Cryptographic Hardware and Embedded Systems - CHES 2003 Lecture Notes in Computer Science"},{"key":"ref4","first-page":"91","article-title":"A Generalized Method of Differential Fault Attack against AES Cryptosystem","volume":"4249","author":"moradi","year":"2006","journal-title":"LNCS"},{"key":"ref3","first-page":"77","article-title":"A Differential Fault Attack Technique against SPN Structures, with Application to the AES and Khazad","volume":"2779","author":"piret","year":"2003","journal-title":"LNCS"},{"key":"ref6","article-title":"Optical and EM Fault-Attacks on CRT-based RSA: Concrete Results","author":"schmidt","year":"2007","journal-title":"Proceedings of the 15th Austrian Workhop on Microelectronics (Austrochip 2007)"},{"key":"ref5","first-page":"2","article-title":"Optical fault induction attacks","author":"skorobogatov","year":"2003","journal-title":"Cryptographic Hardware and Embedded Systems - CHES 2002 4th International Workshop vol 2523 of Lecture Notes in Computer Science"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2008.41"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.microrel.2007.07.074"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s001450010016"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.862424"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2008.39"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"572","DOI":"10.1109\/DFT.2006.50","article-title":"Parity-Based Fault Detection Architecture of S-box for Advanced Encryption Standard","author":"kermani","year":"2006","journal-title":"Proc of the 21st IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2006)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2004.1311880"}],"event":{"name":"2010 21st IEEE International Conference on Application-specific Systems, Architectures and Processors (ASAP)","start":{"date-parts":[[2010,7,7]]},"location":"Rennes, France","end":{"date-parts":[[2010,7,9]]}},"container-title":["ASAP 2010 - 21st IEEE International Conference on Application-specific Systems, Architectures and Processors"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5523683\/5540749\/05540765.pdf?arnumber=5540765","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T12:22:35Z","timestamp":1497874955000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5540765\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/asap.2010.5540765","relation":{},"subject":[],"published":{"date-parts":[[2010,7]]}}}