{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T13:10:36Z","timestamp":1765113036098,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,6]]},"DOI":"10.1109\/host55342.2024.10545417","type":"proceedings-article","created":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T17:21:52Z","timestamp":1717694512000},"page":"112-121","source":"Crossref","is-referenced-by-count":2,"title":["DOMREP II"],"prefix":"10.1109","author":[{"given":"Matthias","family":"Probst","sequence":"first","affiliation":[{"name":"School of Computation, Information and Technology, Technical University of Munich,Munich,Germany"}]},{"given":"Manuel","family":"Brosch","sequence":"additional","affiliation":[{"name":"School of Computation, Information and Technology, Technical University of Munich,Munich,Germany"}]},{"given":"Michael","family":"Gruber","sequence":"additional","affiliation":[{"name":"School of Computation, Information and Technology, Technical University of Munich,Munich,Germany"}]},{"given":"Georg","family":"Sigl","sequence":"additional","affiliation":[{"name":"School of Computation, Information and Technology, Technical University of Munich,Munich,Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s001450010016"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i3.547-572"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/HOST45689.2020.9300260"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/HOST45689.2020.9300266"},{"key":"ref6","first-page":"2022\/1131","article-title":"Cini minis: Domain isolation for fault and combined security","volume-title":"Cryptology ePrint Archive","author":"Feldtkeller","year":"2022"},{"key":"ref7","first-page":"2023\/1558","article-title":"Stati: Protecting against fault attacks using stable threshold implementations","volume-title":"Cryptology ePrint Archive","author":"Dhooghe","year":"2023"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3089875"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2952262"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.23919\/DATE56975.2023.10137176"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49890-3_10"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24660-2_18"},{"journal-title":"A testing methodology for side channel resistance","year":"2011","author":"Goodwill","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_25"},{"key":"ref15","volume-title":"Power analysis attacks: Revealing the secrets of smart cards","volume":"31","author":"Mangard","year":"2008"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47989-6_37"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i3.89-120"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2971153"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_22"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978427"},{"key":"ref21","article-title":"Domain-oriented masking: Com-pact masked hardware implementations with arbitrary protection order","author":"Gro\u03b2","year":"2016","journal-title":"Cryptology ePrint Archive"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2016.15"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_19"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53008-5_11"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96884-1_5"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i1.25-50"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/tcsii.2020.2989184"},{"key":"ref28","first-page":"2019\/937","article-title":"Fault template attacks on block ciphers exploiting fault propagation","volume-title":"Cryptology ePrint Archive","author":"Saha","year":"2019"},{"key":"ref29","first-page":"2020\/892","article-title":"Divided we stand, united we fall: Security analysis of some sca+sifa countermeasures against sca-enhanced fault template attacks","volume-title":"Cryptology ePrint Archive","author":"Saha","year":"2020"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3089875"}],"event":{"name":"2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","start":{"date-parts":[[2024,5,6]]},"location":"Tysons Corner, VA, USA","end":{"date-parts":[[2024,5,9]]}},"container-title":["2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10545333\/10545347\/10545417.pdf?arnumber=10545417","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T18:29:11Z","timestamp":1719340151000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10545417\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,6]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/host55342.2024.10545417","relation":{},"subject":[],"published":{"date-parts":[[2024,5,6]]}}}