{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T06:12:34Z","timestamp":1747807954717,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/hst.2012.6224334","type":"proceedings-article","created":{"date-parts":[[2012,7,9]],"date-time":"2012-07-09T19:35:17Z","timestamp":1341862517000},"page":"140-145","source":"Crossref","is-referenced-by-count":19,"title":["Fault Round Modification Analysis of the advanced encryption standard"],"prefix":"10.1109","author":[{"given":"Jean-Max","family":"Dutertre","sequence":"first","affiliation":[]},{"given":"Amir-Pasha","family":"Mirbaha","sequence":"additional","affiliation":[]},{"given":"David","family":"Naccache","sequence":"additional","affiliation":[]},{"given":"Anne-Lise","family":"Ribotta","sequence":"additional","affiliation":[]},{"given":"Assia","family":"Tria","sequence":"additional","affiliation":[]},{"given":"Thierry","family":"Vaschalde","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","first-page":"387","article-title":"Single-event sensitivity of a single sram cell","author":"darracq","year":"2001","journal-title":"Radiation and Its Effects on Components and Systems 2001 6th European Conference on"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2010.5560194"},{"key":"11","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/3-540-36400-5_2","article-title":"Optical fault induction attacks","volume":"2523","author":"skorobogatov","year":"2002","journal-title":"4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TNS.1965.4323904"},{"key":"3","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/BFb0052259","article-title":"Differential Fault Analysis of Secret Key Cryptosystems","author":"biham","year":"1997","journal-title":"Lecture Notes in Computer Science"},{"key":"2","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","article-title":"On the Importance of Checking Cryptographic Protocols for Faults","author":"boneh","year":"1997","journal-title":"Lecture Notes in Computer Science"},{"journal-title":"New Threat Model Breaks Crypto Codes","year":"1996","author":"boneh","key":"1"},{"journal-title":"Sosse-simple Operating System for Smartcard Education","year":"2002","author":"bruestle","key":"10"},{"key":"7","first-page":"88","article-title":"Case study of a fault attack on asynchronous des crypto-processors","volume":"4236 lncs","author":"monnet","year":"2006","journal-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"6","first-page":"13","article-title":"Round reduction using faults","author":"choukri","year":"2005","journal-title":"Fault Diagnosis An Tolerance in Cryptography FDTC 2005"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2011.9"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.862424"},{"volume":"197","journal-title":"Announcing the Advanced Encryption Standard (AES)","year":"2001","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.11.0110.0478"}],"event":{"name":"2012 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","start":{"date-parts":[[2012,6,3]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2012,6,4]]}},"container-title":["2012 IEEE International Symposium on Hardware-Oriented Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6218991\/6224308\/06224334.pdf?arnumber=6224334","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T21:07:25Z","timestamp":1497992845000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6224334\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/hst.2012.6224334","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}