{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T22:45:43Z","timestamp":1762037143304,"version":"build-2065373602"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,4,19]],"date-time":"2021-04-19T00:00:00Z","timestamp":1618790400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,4,19]],"date-time":"2021-04-19T00:00:00Z","timestamp":1618790400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,4,19]],"date-time":"2021-04-19T00:00:00Z","timestamp":1618790400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,4,19]]},"DOI":"10.1109\/ntms49979.2021.9432667","type":"proceedings-article","created":{"date-parts":[[2021,5,18]],"date-time":"2021-05-18T20:30:38Z","timestamp":1621369838000},"page":"1-3","source":"Crossref","is-referenced-by-count":8,"title":["A Survey on the Application of Fault Analysis on Lightweight Cryptography"],"prefix":"10.1109","author":[{"given":"Patrick","family":"Karl","sequence":"first","affiliation":[]},{"given":"Michael","family":"Gruber","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2019","author":"gruber","article-title":"Statistical ineffective fault analysis of gimli","key":"ref10"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/FDTC.2014.15"},{"key":"ref12","article-title":"Persistent fault analysis on block ciphers","volume":"2018","author":"zhang","year":"2018","journal-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/FDTC.2019.00011"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1007\/978-3-642-15031-9_22"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1007\/978-3-030-16350-1_5"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1007\/978-3-540-45203-4_23"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1007\/978-3-540-71039-4_10"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1007\/11502760_24"},{"year":"2014","author":"quedenfeld","article-title":"Algebraic fault analysis of katan","key":"ref19"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1007\/BFb0052259"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/978-3-642-28496-0_19"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1007\/11889700_11","article-title":"Fault based collision attacks on AES","author":"bl\u00f6mer","year":"2006","journal-title":"Lecture Notes in Computer Science"},{"key":"ref5","article-title":"Fault-algebraic attacks on inner rounds of des","author":"courtois","year":"2010","journal-title":"E-Smart&#x2019;10 Proceedings The Future of Digital Security Technologies"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/FDTC.2013.18"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1007\/978-3-540-74735-2_13"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1007\/s001450010016"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.46586\/tches.v2018.i3.547-572"},{"year":"0","article-title":"NIST Computer Security Resource Center","key":"ref1"},{"year":"2012","author":"jovanovic","article-title":"An algebraic fault attack on the LED block cipher","key":"ref20"},{"key":"ref22","article-title":"Improved Differential Fault Analysis of Trivium","author":"mohamed","year":"2011","journal-title":"COSADE 2011"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.23919\/DATE.2017.7926974"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1007\/978-3-662-53887-6_14"},{"year":"2018","author":"dobraunig","article-title":"Fault attacks on nonce-based authenticated encryption: Application to keyak and ketje","key":"ref23"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1007\/978-3-540-28632-5_18","article-title":"Fault Analysis of Stream Ciphers","author":"hoch","year":"2004","journal-title":"Lecture Notes in Computer Science"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1007\/978-3-319-21476-4_12"}],"event":{"name":"2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","start":{"date-parts":[[2021,4,19]]},"location":"Paris, France","end":{"date-parts":[[2021,4,21]]}},"container-title":["2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9432489\/9432638\/09432667.pdf?arnumber=9432667","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:41:45Z","timestamp":1652197305000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9432667\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,19]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/ntms49979.2021.9432667","relation":{},"subject":[],"published":{"date-parts":[[2021,4,19]]}}}