{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:36:05Z","timestamp":1774370165568,"version":"3.50.1"},"reference-count":47,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/isicir.2014.7029525","type":"proceedings-article","created":{"date-parts":[[2015,2,10]],"date-time":"2015-02-10T14:52:27Z","timestamp":1423579947000},"page":"152-155","source":"Crossref","is-referenced-by-count":5,"title":["A survey of the state-of-the-art fault attacks"],"prefix":"10.1109","author":[{"given":"Jakub","family":"Breier","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dirmanto","family":"Jap","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2009.29"},{"key":"35","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1007\/11894063_8","article-title":"A generalized method of differential fault attack against aes cryptosystem","volume":"4249","author":"moradi","year":"2006","journal-title":"Lecture Notes in Computer Science"},{"key":"17","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/978-3-642-28368-0_18","article-title":"An updated survey on secure ecc implementations: Attacks, countermeasures and cost","volume":"6805","author":"fan","year":"2012","journal-title":"Lecture Notes in Computer Science"},{"key":"36","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1007\/978-3-642-02384-2_26","article-title":"An improved fault based attack of the advanced encryption standard","volume":"5580","author":"mukhopadhyay","year":"2009","journal-title":"Lecture Notes in Computer Science"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2013.18"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2012.19"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9087-5"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/CoDIT.2013.6689555"},{"key":"16","author":"dottax","year":"2002","journal-title":"Fault Attacks on NESSIE Signature and Identification Schemes"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29656-7_15"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29656-7_2"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-013-0062-6"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1007\/11733447_10"},{"key":"11","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1007\/3-540-45067-X_11","article-title":"Differential fault analysis on AES key schedule and some countermeasures","volume":"2727","author":"chen","year":"2003","journal-title":"Lecture Notes in Computer Science"},{"key":"38","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/978-3-540-45238-6_7","article-title":"A differential fault attack technique against SPN structures, with application to the aes and khazad","volume":"2779","author":"piret","year":"2003","journal-title":"Lecture Notes in Computer Science"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-003-1160-8"},{"key":"21","doi-asserted-by":"crossref","first-page":"478","DOI":"10.1007\/978-3-540-27800-9_41","article-title":"Fault attacks on signature schemes","volume":"3108","author":"giraud","year":"2004","journal-title":"Lecture Notes in Computer Science"},{"key":"20","author":"giraud","year":"2003","journal-title":"DFA on AES Cryptology EPrint Archive Report 2003\/008"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2009.38"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_18"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2011.17"},{"key":"40","article-title":"A diagonal fault attack on the advanced encryption standard","author":"saha","year":"2009","journal-title":"Cryptology EPrint Archive Report 2009\/581"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2007.13"},{"key":"44","doi-asserted-by":"crossref","first-page":"414","DOI":"10.1007\/3-540-45861-1_31","article-title":"A countermeasure against one physical cryptanalysis may benefit another attack","volume":"2288","author":"sung-ming","year":"2001","journal-title":"Lecture Notes in Computer Science"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1190587"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1109\/12.869328"},{"key":"22","author":"giraud","year":"2010","journal-title":"Piret and Quisquater's DFA on AES Revisited"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2012.13"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs:20060163"},{"key":"25","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1007\/1-4020-8147-2_12","article-title":"Differential fault analysis attack resistant architectures for the advanced encryption standard","volume":"153","author":"karpovsky","year":"2004","journal-title":"IFIP International Federation for Information Processing"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2008.ECP.45"},{"key":"27","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1007\/978-3-540-85893-5_4","article-title":"New differential fault analysis on AES key schedule: Two faults are enough","volume":"5189","author":"kim","year":"2008","journal-title":"Lecture Notes in Computer Science"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2161289"},{"key":"29","author":"lenstra","year":"1996","journal-title":"Memo on RSA signature generation in the presence of faults"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1873548.1873555"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72163-5_18"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29656-7_6"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29656-7_9"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/NSS.2009.26"},{"key":"7","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/11889700_4","article-title":"Sign change fault attacks on elliptic curve cryptosystems","volume":"4236","author":"bl\ufffdmer","year":"2006","journal-title":"Lecture Notes in Computer Science"},{"key":"6","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1007\/11889700_11","article-title":"Fault based collision attacks on AES","volume":"4236","author":"bl\ufffdmer","year":"2006","journal-title":"Lecture Notes in Computer Science"},{"key":"32","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1007\/978-3-642-15031-9_22","article-title":"Fault sensitivity analysis","volume":"6225","author":"li","year":"2010","journal-title":"Lecture Notes in Computer Science"},{"key":"5","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/BFb0052259","article-title":"Differential fault analysis of secret key cryptosystems","volume":"1294","author":"biham","year":"1997","journal-title":"Lecture Notes in Computer Science"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38519-3_4"},{"key":"4","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1007\/3-540-44598-6_8","article-title":"Differential fault attacks on elliptic curve cryptosystems","volume":"1880","author":"biehl","year":"2000","journal-title":"Lecture Notes in Computer Science"},{"key":"9","first-page":"37","article-title":"On the importance of checking cryptographic protocols for faults","author":"boneh","year":"1997","journal-title":"Proc 10th Annu Int Conf Theory Appl Cryptographic Techniques EUROCRYPT"},{"key":"8","article-title":"Fault based cryptanalysis of the Advanced Encryption Standard","author":"bl\ufffdmer","year":"2002","journal-title":"Cryptology ePrint Archive Report"}],"event":{"name":"2014 International Symposium on Integrated Circuits (ISIC)","location":"Singapore","start":{"date-parts":[[2014,12,10]]},"end":{"date-parts":[[2014,12,12]]}},"container-title":["2014 International Symposium on Integrated Circuits (ISIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7005969\/7029433\/07029525.pdf?arnumber=7029525","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T05:16:39Z","timestamp":1498194999000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7029525\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/isicir.2014.7029525","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}