{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:44:41Z","timestamp":1767339881706,"version":"3.37.3"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"German Federal Ministry of Education and Research BMBF","award":["16KIS0602 VeriSec"],"award-info":[{"award-number":["16KIS0602 VeriSec"]}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["406956718 SuCCESS"],"award-info":[{"award-number":["406956718 SuCCESS"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"name":"European Unions Horizon 2020 program","award":["645622 PQCRYPTO"],"award-info":[{"award-number":["645622 PQCRYPTO"]}]},{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["724725"],"award-info":[{"award-number":["724725"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput."],"published-print":{"date-parts":[[2020,3,1]]},"DOI":"10.1109\/tc.2019.2948617","type":"journal-article","created":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T20:27:30Z","timestamp":1571862450000},"page":"361-376","source":"Crossref","is-referenced-by-count":29,"title":["Impeccable Circuits"],"prefix":"10.1109","volume":"69","author":[{"given":"Anita","family":"Aghaie","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4032-7433","authenticated-orcid":false,"given":"Amir","family":"Moradi","sequence":"additional","affiliation":[]},{"given":"Shahram","family":"Rasoolzadeh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9549-268X","authenticated-orcid":false,"given":"Aein Rezaei","family":"Shahmirzadi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8353-7564","authenticated-orcid":false,"given":"Falk","family":"Schellenberg","sequence":"additional","affiliation":[]},{"given":"Tobias","family":"Schneider","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85053-3_7"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10175-0_16"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29656-7_11"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2002.804378"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/11889700_15"},{"journal-title":"The Theory of Error Correcting Codes","year":"1977","author":"macwilliams","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2010.5560194"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2008.18"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21476-4_13"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2008.13"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_19"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_8"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2016.15"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"394","DOI":"10.46586\/tches.v2018.i3.394-430","article-title":"Extending glitch-free multiparty protocols to resist fault injection attacks","volume":"2018","author":"seker","year":"2018","journal-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96884-1_5"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2015.7140240"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC-7.2008.11"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12510-2_13"},{"key":"ref17","article-title":"Eddy current for magnetic analysis with active sensor","author":"quisquater","year":"2002","journal-title":"Proc Esmart"},{"key":"ref18","first-page":"2","article-title":"Optical fault induction attacks","author":"skorobogatov","year":"2002","journal-title":"Proc Int Workshop Cryptographic Hardware Embedded Syst"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2016.16"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3850\/9783981537079_0296"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53008-5_5"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1190590"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-014-0092-8"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2005.51"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"720","DOI":"10.1109\/TC.2006.90","article-title":"Simple error detection methods for hardware implementation of advanced encryption standard","volume":"55","author":"yen","year":"2006","journal-title":"IEEE Trans Comput"},{"journal-title":"The Design of Rijndael AES - The Advanced Encryption Standard","year":"2002","author":"daemen","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53008-5_11"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-016-0138-1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.862424"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9085-7"},{"key":"ref1","first-page":"37","article-title":"On the importance of checking cryptographic protocols for faults (extended abstract)","author":"boneh","year":"1997","journal-title":"Proc Int Conf Theory Appl Cryptographic Techn"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.154"},{"key":"ref20","first-page":"236","article-title":"Glitch it if you can: Parameter search strategies for successful fault injection","author":"carpi","year":"2013","journal-title":"Proc Int Conf Smart Card Res Adv Appl"},{"year":"2019","key":"ref45","article-title":"Basys3"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2014.15"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03329-3_11"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2015.10"},{"key":"ref42","first-page":"764","article-title":"Consolidating masking schemes","author":"reparaz","year":"2015","journal-title":"Proc Annu Cryptol Conf"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052259"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48800-3_17"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2013.18"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"547","DOI":"10.46586\/tches.v2018.i3.547-572","article-title":"SIFA: Exploiting ineffective fault inductions on symmetric cryptography","volume":"2018","author":"dobraunig","year":"2018","journal-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-52153-4_6"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23951-9_20"}],"container-title":["IEEE Transactions on Computers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/12\/8989854\/08880507.pdf?arnumber=8880507","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T14:09:58Z","timestamp":1651068598000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8880507\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,1]]},"references-count":47,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tc.2019.2948617","relation":{},"ISSN":["0018-9340","1557-9956","2326-3814"],"issn-type":[{"type":"print","value":"0018-9340"},{"type":"electronic","value":"1557-9956"},{"type":"electronic","value":"2326-3814"}],"subject":[],"published":{"date-parts":[[2020,3,1]]}}}