{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:18:42Z","timestamp":1729631922095,"version":"3.28.0"},"reference-count":43,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/reconfig.2013.6732292","type":"proceedings-article","created":{"date-parts":[[2014,2,10]],"date-time":"2014-02-10T11:26:59Z","timestamp":1392031619000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["A fault attack on a hardware-based implementation of the secure hash algorithm SHA-512"],"prefix":"10.1109","author":[{"given":"Abdulhadi","family":"Shoufan","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1190590"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2009.41"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs:20060163"},{"key":"36","first-page":"13","article-title":"Round reduction using faults","volume":"5","author":"choukri","year":"2005","journal-title":"FDTC"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2011.2147340"},{"key":"33","first-page":"56","article-title":"Fault and side-channel attacks on pairing based cryptography","volume":"5","author":"page","year":"2005","journal-title":"Fault Detection and Tolerance in Cryptography-FDTC"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.143"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2011.16"},{"key":"16","first-page":"400","article-title":"Concurrent error detection schemes for involution ciphers","volume":"3156","author":"joshi","year":"2004","journal-title":"Cryptographic Hardware and Embedded Systems-CHES"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2011.5763307"},{"key":"13","first-page":"2","article-title":"Optical fault induction attacks","volume":"2523","author":"skorobogatov","year":"2002","journal-title":"Cryptographic Hardware and Embedded Systems-CHES"},{"key":"14","first-page":"185","article-title":"Eddy current for magnetic analysis with active sensor","author":"samyde","year":"2002","journal-title":"Smart Card Programming and Security (E-smart 2001)"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.7"},{"key":"11","article-title":"Tamper resistance-A cautionary note","volume":"1","author":"anderson","year":"1996","journal-title":"Proceedings of the Second Usenix Workshop on Electronic Commerce"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2010.5537869"},{"key":"12","article-title":"Low cost attacks on tamper resistant devices","volume":"5","author":"anderson","year":"1997","journal-title":"IWSP International Workshop on Security Protocols LNCS"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2004.1387397"},{"key":"20","first-page":"319","article-title":"Parity-based concurrent error detection of substitution-permutation network block ciphers","author":"karri","year":"2003","journal-title":"Cryptographic Hardware and Embedded Systems-CHES"},{"journal-title":"Adm-xrc-5t1","year":"0","key":"43"},{"journal-title":"The Keyed-Hash Message Authentication Code (HMAC) FIPS PUB 198","year":"2002","key":"42"},{"journal-title":"Secure Hash Standard (Shs) Fips Pub 186-3","year":"2008","key":"41"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25283-9_17"},{"key":"22","doi-asserted-by":"crossref","DOI":"10.1007\/1-4020-8147-2_12","article-title":"Differential fault analysis attack resistant architectures for the advanced encryption standard","author":"karpovsky","year":"2004","journal-title":"Smart Card Research and Advanced Applications VI"},{"key":"23","first-page":"109","article-title":"A comparative cost\/security analysis of fault attack countermeasures","volume":"2","author":"malkin","year":"2005","journal-title":"Workshop on Fault Detection and Tolerance in Cryptography"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2009.2031651"},{"key":"25","first-page":"47","article-title":"A structureindependent approach for fault detection hardware implementations of the advanced encryption standard","author":"mozaffari kermani","year":"2007","journal-title":"Fault Diagnosis and Tolerance in Cryptography 2007 FDTC 2007 Workshop on"},{"key":"26","first-page":"13","article-title":"Fault attacks on RSA with CRT: Concrete results and practical countermeasures","author":"aumuller","year":"2002","journal-title":"Workshop on Cryptographic Hardware and Embedded Systems"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2007.11"},{"key":"28","first-page":"25","article-title":"Sign change fault attacks on elliptic curve cryptosystems","author":"blomer","year":"2005","journal-title":"Proceedings of the 2nd Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2005)"},{"journal-title":"Fault Attacks and Countermeasures","year":"2005","author":"otto","key":"29"},{"key":"3","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/BFb0052259","article-title":"Differential fault analysis of secret key cryptosystems","volume":"1294","author":"biham","year":"1997","journal-title":"Lecture Notes in Computer Science"},{"key":"2","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","article-title":"On the importance of checking cryptographic protocols for faults","volume":"1233","author":"boneh","year":"1997","journal-title":"Lecture Notes in Computer Science"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/40.502402"},{"key":"10","first-page":"9","article-title":"Design principles for tamper-resistant smartcard processors","author":"kommerling","year":"1999","journal-title":"USENIX Workshop on Smartcard Technology"},{"key":"30","article-title":"Fault attacks on signature schemes","author":"giraud","year":"2004","journal-title":"Workshop on Fault Diagnosis and Tolerance in Cryptography in association with DSN"},{"key":"7","first-page":"302","article-title":"Physical security devices for computer subsystems: A survey of attacks and defenses","author":"weingart","year":"1965","journal-title":"Proc of CHES'00 LNCS"},{"key":"6","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1007\/978-3-540-45126-6_12","article-title":"Fault Based Cryptanalysis of the Advanced Encryption Standard (AES)","author":"blomer","year":"2003","journal-title":"Financial Cryptography"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2007.17"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/s001450010016"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-003-1160-8"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.2307\/3980615"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2004.1311880"},{"key":"8","first-page":"77","article-title":"A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD","volume":"2779","author":"piret","year":"2003","journal-title":"Cryptographic Hardware and Embedded Systems-CHES"}],"event":{"name":"2013 International Conference on ReConFigurable Computing and FPGAs (ReConFig)","start":{"date-parts":[[2013,12,9]]},"location":"Cancun, Mexico","end":{"date-parts":[[2013,12,11]]}},"container-title":["2013 International Conference on Reconfigurable Computing and FPGAs (ReConFig)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6720231\/6732246\/06732292.pdf?arnumber=6732292","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T03:36:30Z","timestamp":1498102590000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6732292\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/reconfig.2013.6732292","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}