{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T14:55:35Z","timestamp":1761663335743,"version":"3.37.3"},"reference-count":22,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2015,6,1]],"date-time":"2015-06-01T00:00:00Z","timestamp":1433116800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"ANRT CIFRE funding \u201c2012-1008\u201d"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst."],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/tcad.2015.2391773","type":"journal-article","created":{"date-parts":[[2015,1,14]],"date-time":"2015-01-14T14:54:34Z","timestamp":1421247274000},"page":"928-936","source":"Crossref","is-referenced-by-count":18,"title":["Combining Image Processing and Laser Fault Injections for Characterizing a Hardware AES"],"prefix":"10.1109","volume":"34","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9135-7448","authenticated-orcid":false,"given":"Franck","family":"Courbon","sequence":"first","affiliation":[]},{"given":"Jacques J. A.","family":"Fournier","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"Loubet-Moundi","sequence":"additional","affiliation":[]},{"given":"Assia","family":"Tria","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.1998.712032"},{"key":"ref11","first-page":"25","article-title":"Reverse engineering of CMOS integrated circuits","author":"masalskis","year":"2008","journal-title":"Electron Elect Eng Kaunas Technol"},{"key":"ref12","first-page":"363","article-title":"The state-of-the-art in IC reverse engineering","author":"torrance","year":"2009","journal-title":"Proc Workshop Cryptographic Hardware and Embedded Systems (CHES '05)"},{"key":"ref13","article-title":"Hardware reverse engineering tools","author":"thomas","year":"2013","journal-title":"ReCon"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511805172"},{"key":"ref15","first-page":"120","article-title":"Fast normalized cross-correlation","volume":"10","author":"lewis","year":"1995","journal-title":"Vision Interface"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2013.6581576"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.microrel.2013.07.125"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/23.273491"},{"key":"ref19","first-page":"513","article-title":"Differential fault analysis of secret key cryptosystems","author":"biham","year":"1997","journal-title":"Proc 17th Annu Int Cryptol Conf (CRYPTO)"},{"key":"ref4","first-page":"2","article-title":"Optical fault induction attacks","author":"skorobogatov","year":"2002","journal-title":"Proc 9th Int Workshop Cryptograph Hardw Embed Syst (CHES)"},{"key":"ref3","first-page":"125","article-title":"Low cost attacks on tamper resistant devices","author":"anderson","year":"1997","journal-title":"Proc 5th Int Workshop Security Protocols"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2012.19"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.862424"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2012.15"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2007.364528"},{"key":"ref2","first-page":"16","article-title":"Correlation power analysis with a leakage model","author":"brier","year":"2004","journal-title":"Proc 9th Int Workshop Cryptograph Hardw Embed Syst (CHES)"},{"key":"ref1","first-page":"388","article-title":"Differential power analysis","author":"kocher","year":"1999","journal-title":"Proc 9th Annu Int Cryptol Conf (CRYPTO)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/4.192045"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/12.869328"},{"key":"ref22","first-page":"27","article-title":"DFA on AES","author":"giraud","year":"2004","journal-title":"Proc 4th Int Conf Adv Encryption Std (AES)"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1007\/978-3-540-45126-6_12","article-title":"Fault based cryptanalysis of the advanced encryption standard (AES)","author":"blomer","year":"2003","journal-title":"Financial Cryptography (LNCS 2742)"}],"container-title":["IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/43\/7110649\/07009993.pdf?arnumber=7009993","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:47:48Z","timestamp":1641988068000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7009993\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":22,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tcad.2015.2391773","relation":{},"ISSN":["0278-0070","1937-4151"],"issn-type":[{"type":"print","value":"0278-0070"},{"type":"electronic","value":"1937-4151"}],"subject":[],"published":{"date-parts":[[2015,6]]}}}