{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T08:48:04Z","timestamp":1725612484635},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/hst.2014.6855581","type":"proceedings-article","created":{"date-parts":[[2014,7,29]],"date-time":"2014-07-29T16:26:31Z","timestamp":1406651191000},"page":"118-123","source":"Crossref","is-referenced-by-count":7,"title":["NREPO: Normal basis Recomputing with Permuted Operands"],"prefix":"10.1109","author":[{"given":"Xiaofei","family":"Guo","sequence":"first","affiliation":[]},{"given":"Debdeep","family":"Mukhopadhyay","sequence":"additional","affiliation":[]},{"given":"Chenglu","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Ramesh","family":"Karri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"19","DOI":"10.1007\/s13389-012-0046-y"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1109\/TC.2008.149"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1109\/TVLSI.2012.2231707"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1109\/TCAD.2013.2263037"},{"year":"2001","journal-title":"Advanced Encryption Standard (AES)","key":"16"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1109\/TCAD.2002.804378"},{"key":"14","first-page":"100","article-title":"High-performance concurrent error detection scheme for AES hardware","author":"satoh","year":"2008","journal-title":"Proc CHES"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1109\/TVLSI.2009.2031651"},{"key":"12","first-page":"1","article-title":"Robust codes for fault attack resistant cryptographic hardware","author":"kulikowski","year":"2005","journal-title":"Proc IEEE FDTC"},{"year":"0","key":"21"},{"key":"20","article-title":"Provably secure concurrent error detection against differential fault analysis","author":"guo","year":"2012","journal-title":"Cryptology EPrint Archive Report 2012\/552"},{"key":"22","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/3-540-44983-3_4","article-title":"Camellia: A 128-bit block cipher suitable for multiple platforms-design and analysis","author":"aoki","year":"2001","journal-title":"Proc Selected Areas in Cryptography"},{"year":"2007","journal-title":"The 128-bit Blockcipher CLEFIA Algorithm Specification","key":"23"},{"key":"24","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1007\/978-3-540-74462-7_6","article-title":"The design of a stream cipher lex","author":"biryukov","year":"2007","journal-title":"Proc Selected Areas in Cryptography"},{"year":"2011","author":"gauravaram","journal-title":"Gr\ufffdstl-a SHA-3 Candidate","key":"25"},{"key":"3","article-title":"A very compact rijndael s-box","author":"canright","year":"2004","journal-title":"Technical Report NPSMA-04-001"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1109\/DSD.2006.40"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1109\/TC.2010.33"},{"key":"1","first-page":"427","article-title":"AES on FPGA from the fastest to the smallest","author":"good","year":"2005","journal-title":"Proc CHES"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/NTMS.2008.ECP.45"},{"key":"6","first-page":"182","article-title":"When clocks fail: On critical paths and clock faults","author":"agoyan","year":"2010","journal-title":"Proc CARDIS"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1109\/JPROC.2012.2188769"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1007\/978-3-540-85855-3_16"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/FDTC.2012.15"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1007\/s00145-010-9083-9"}],"event":{"name":"2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","start":{"date-parts":[[2014,5,6]]},"location":"Arlington, VA, USA","end":{"date-parts":[[2014,5,7]]}},"container-title":["2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6847848\/6855557\/06855581.pdf?arnumber=6855581","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,13]],"date-time":"2019-08-13T05:30:05Z","timestamp":1565674205000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6855581\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/hst.2014.6855581","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}