{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T15:59:07Z","timestamp":1775318347241,"version":"3.50.1"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/iolts.2009.5196002","type":"proceedings-article","created":{"date-parts":[[2009,8,11]],"date-time":"2009-08-11T19:37:37Z","timestamp":1250019457000},"page":"164-169","source":"Crossref","is-referenced-by-count":4,"title":["Multilinear codes for robust error detection"],"prefix":"10.1109","author":[{"family":"Zhen Wang","sequence":"first","affiliation":[]},{"given":"Mark","family":"Karpovsky","sequence":"additional","affiliation":[]},{"given":"Berk","family":"Sunar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1147\/rd.144.0395"},{"key":"11","article-title":"information-theoretic analysis of coating pufs. cryptology eprint archive","author":"skoric","year":"2006"},{"key":"12","first-page":"2","article-title":"optical fault induction attacks","volume":"2523","author":"skorobogatov","year":"2007","journal-title":"LNCS"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2004.1311880"},{"key":"2","doi-asserted-by":"crossref","DOI":"10.1007\/11889700_16","article-title":"nonlinear residue codes for robust public-key arithmetic","author":"gaubatz","year":"2006","journal-title":"International Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC07)"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/s001450010016"},{"key":"10","first-page":"652","article-title":"protecting devices by active coating","volume":"4","author":"posch","year":"1998","journal-title":"Journal of Universal Computer Science"},{"key":"7","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","article-title":"differential power analysis","volume":"1666","author":"kocher","year":"1999","journal-title":"Lecture Notes in Computer Science"},{"key":"6","first-page":"77","article-title":"a differential fault attack technique against spn structures, with application to the aes and khazad","author":"piret","year":"2003","journal-title":"CHES"},{"key":"5","year":"0"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.831844"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/952532.952593"},{"key":"8","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","article-title":"timing attacks on implementations of diffie-hellman, rsa, dss, and other systems","volume":"1109","author":"kocher","year":"1996","journal-title":"Lecture Notes in Computer Science"}],"event":{"name":"2009 15th IEEE International On-Line Testing Symposium (IOLTS 2009)","location":"Sesimbra-Lisbon, Portugal","start":{"date-parts":[[2009,6,24]]},"end":{"date-parts":[[2009,6,26]]}},"container-title":["2009 15th IEEE International On-Line Testing Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5176124\/5195974\/05196002.pdf?arnumber=5196002","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T22:44:21Z","timestamp":1497825861000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5196002\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/iolts.2009.5196002","relation":{},"subject":[],"published":{"date-parts":[[2009,6]]}}}