{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:04:47Z","timestamp":1729609487057,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/dtis.2014.6850665","type":"proceedings-article","created":{"date-parts":[[2014,7,29]],"date-time":"2014-07-29T18:24:23Z","timestamp":1406658263000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["Layout-aware laser fault injection simulation and modeling: From physical level to gate level"],"prefix":"10.1109","author":[{"given":"Feng","family":"Lu","sequence":"first","affiliation":[]},{"given":"Giorgio Di","family":"Natale","sequence":"additional","affiliation":[]},{"given":"Marie-Lise","family":"Flottes","sequence":"additional","affiliation":[]},{"given":"Bruno","family":"Rouzeyre","sequence":"additional","affiliation":[]},{"given":"Guillaume","family":"Hubert","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","first-page":"153","volume":"17","year":"2001","journal-title":"National Institute of Standards and Technology (NIST)"},{"journal-title":"Fault Injection by Laser Impulsions in Secured Microcontrollers","year":"2013","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2013.72"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.microrel.2009.07.037"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.microrel.2012.06.047"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TNS.2013.2287299"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TNS.2009.2034148"},{"key":"1","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/978-3-540-45238-6_7","article-title":"A differential fault attack technique against SPN Structures, with Application to the AES and Khazad","volume":"2779","author":"piret","year":"2003","journal-title":"Crypto Hardware and Embedded Sys -CHES 2003 Lecture Notes in Comp Sci"},{"key":"10","article-title":"Analog-digital simulation of transient-induced logic errors and upset susceptibility of an advanced control system","volume":"4241","author":"carreno","year":"1990","journal-title":"NASA Technical Memo"},{"year":"0","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TNS.2011.2144622"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevB.23.5531"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TNS.2011.2109966"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TNS.1982.4336490"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TNS.1965.4323904"}],"event":{"name":"2014 9th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS)","start":{"date-parts":[[2014,5,6]]},"location":"Santorini, Greece","end":{"date-parts":[[2014,5,8]]}},"container-title":["2014 9th IEEE International Conference on Design &amp; Technology of Integrated Systems in Nanoscale Era (DTIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6844517\/6850634\/06850665.pdf?arnumber=6850665","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T17:30:40Z","timestamp":1498152640000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6850665\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/dtis.2014.6850665","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}