{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T19:14:32Z","timestamp":1774120472034,"version":"3.50.1"},"reference-count":17,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2003,4,1]],"date-time":"2003-04-01T00:00:00Z","timestamp":1049155200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput."],"published-print":{"date-parts":[[2003,4]]},"DOI":"10.1109\/tc.2003.1190590","type":"journal-article","created":{"date-parts":[[2003,4,3]],"date-time":"2003-04-03T20:59:42Z","timestamp":1049403582000},"page":"492-505","source":"Crossref","is-referenced-by-count":235,"title":["Error analysis and detection procedures for a hardware implementation of the advanced encryption standard"],"prefix":"10.1109","volume":"52","author":[{"given":"G.","family":"Bertoni","sequence":"first","affiliation":[]},{"given":"L.","family":"Breveglieri","sequence":"additional","affiliation":[]},{"given":"I.","family":"Koren","sequence":"additional","affiliation":[]},{"given":"P.","family":"Maistri","sequence":"additional","affiliation":[]},{"given":"V.","family":"Piuri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","first-page":"92","article-title":"Fault Detection in the Advanced Encryption Standard","volume-title":"Proc. Conf. Massively Parallel Computing Systems (MPCS \u201902)","author":"Bertoni"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ASAP.2002.1030729"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/DFTVS.2002.1173501"},{"issue":"197","key":"ref4","article-title":"Announcing the ADVANCED ENCRYPTION STANDARD (AES)","year":"2001"},{"key":"ref5","article-title":"A Specification for Rijndael, the AES Algorithm","author":"Gladman","year":"2001"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44709-1_26"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44709-1_7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44709-1_8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44709-1_6"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44709-1_16"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/DFTVS.2001.966796"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/10721064_26"},{"key":"ref13","article-title":"AES Key Agility Issues in High-Speed IPsec Implementations","author":"Whiting","year":"2000"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052352"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48071-4_37"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1017\/cbo9781139172769"},{"issue":"46","key":"ref17","article-title":"Data Encryption Standard","year":"1977"}],"container-title":["IEEE Transactions on Computers"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/12\/26688\/01190590.pdf?arnumber=1190590","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,16]],"date-time":"2025-03-16T05:13:49Z","timestamp":1742102029000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1190590\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,4]]},"references-count":17,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2003,4]]}},"URL":"https:\/\/doi.org\/10.1109\/tc.2003.1190590","relation":{},"ISSN":["0018-9340"],"issn-type":[{"value":"0018-9340","type":"print"}],"subject":[],"published":{"date-parts":[[2003,4]]}}}