{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T05:13:20Z","timestamp":1746249200581,"version":"3.37.3"},"reference-count":21,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development (R&D) Program of China","doi-asserted-by":"publisher","award":["2020AAA0107700"],"award-info":[{"award-number":["2020AAA0107700"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072398","61772236"],"award-info":[{"award-number":["62072398","61772236"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Open Fund of State Key Laboratory of Cryptology","award":["MMKFKT202013"],"award-info":[{"award-number":["MMKFKT202013"]}]},{"name":"Alibaba\u2013Zhejiang University Joint Institute of Frontier Technologies"},{"name":"Zhejiang Key R&D Plan","award":["2019C03133"],"award-info":[{"award-number":["2019C03133"]}]},{"name":"Major Scientific Research Project of Zhejiang Lab","award":["2018FD0ZX01"],"award-info":[{"award-number":["2018FD0ZX01"]}]},{"name":"Young Elite Scientists Sponsorship Program by CAST","award":["17-JCJQ-QT-045"],"award-info":[{"award-number":["17-JCJQ-QT-045"]}]},{"name":"Leading Innovative and Entrepreneur Team Introduction Program of Zhejiang","award":["2018R01005"],"award-info":[{"award-number":["2018R01005"]}]},{"DOI":"10.13039\/100017132","name":"Research Institute of Cyberspace Governance in Zhejiang University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100017132","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst."],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1109\/tcad.2020.3048280","type":"journal-article","created":{"date-parts":[[2020,12,30]],"date-time":"2020-12-30T21:23:05Z","timestamp":1609363385000},"page":"1102-1116","source":"Crossref","is-referenced-by-count":8,"title":["Pushing the Limit of PFA: Enhanced Persistent Fault Analysis on Block Ciphers"],"prefix":"10.1109","volume":"40","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8859-8830","authenticated-orcid":false,"given":"Guorui","family":"Xu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6087-8243","authenticated-orcid":false,"given":"Fan","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5423-4978","authenticated-orcid":false,"given":"Bolin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xinjie","family":"Zhao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2628-8028","authenticated-orcid":false,"given":"Wei","family":"He","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3441-6277","authenticated-orcid":false,"given":"Kui","family":"Ren","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"369","article-title":"Statistical fault attacks on nonce-based authenticated encryption schemes","author":"dobraunig","year":"2016","journal-title":"Proc 22nd Int Conf the Theory Appl Cryptol Inf Security (ASIACRYPT)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2013.16"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i3.547-572"},{"key":"ref13","first-page":"347","article-title":"Algebraic differential fault attacks on LED using a single fault injection","volume":"2012","author":"zhao","year":"2012","journal-title":"IACR Cryptology ePrint"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40026-1_5"},{"key":"ref15","first-page":"320","article-title":"Fault sensitivity analysis","author":"li","year":"2010","journal-title":"Proc 12th Int Workshop Cryptogr Hardw Embedded Syst (CHES)"},{"key":"ref16","first-page":"77","article-title":"A differential fault attack technique against SPN structures, with application to the AES and KHAZAD","author":"piret","year":"2003","journal-title":"Proceedings of the 5th International Workshop on Cryptographic Hardware and Embedded Systems (CHES)"},{"key":"ref17","first-page":"315","article-title":"Statistical ineffective fault attacks on masked AES with fault countermeasures","author":"dobraunig","year":"2018","journal-title":"Proc 24th Int Conf Theory Appl Cryptol Inf Security (ASIACRYPT)"},{"year":"2001","key":"ref18","first-page":"51"},{"key":"ref19","first-page":"450","article-title":"PRESENT: An ultra-lightweight block cipher","author":"bogdanov","year":"2007","journal-title":"Proc 9th Int Workshop Cryptograph Hardw Embed Syst (CHES)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i3.150-172"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/978-3-540-45203-4_23","article-title":"Differential fault analysis on AES","author":"dusart","year":"2003","journal-title":"Proc 1st Int Conf Appl Cryptogr Netw Security (ACNS)"},{"key":"ref6","first-page":"123","article-title":"The SKINNY family of block ciphers and its low-latency variant MANTIS","author":"beierle","year":"2016","journal-title":"Proc 36th Annu Int Cryptol Conf Adv Cryptol (CRYPTO)"},{"key":"ref5","first-page":"326","article-title":"The LED block cipher","author":"guo","year":"2011","journal-title":"Proc 13th Int Workshop Cryptogr Hardw Embedded Syst (CHES)"},{"key":"ref8","first-page":"224","article-title":"Differential fault analysis of the advanced encryption standard using a single fault","author":"tunstall","year":"2011","journal-title":"Proc 5th IFIP WG Int Workshop Inf Security Theory Pract Security Privacy Mobile Devices Wireless Commun"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.862424"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2013.18"},{"key":"ref1","first-page":"513","article-title":"Differential fault analysis of secret key cryptosystems","author":"biham","year":"1997","journal-title":"Proc 17th Annu Int Adv Cryptol Conf (CRYPTO)"},{"key":"ref9","first-page":"19","article-title":"Statistical analysis of the alleged RC? keystream generator","author":"fluhrer","year":"2000","journal-title":"Proc Int Workshop Fast Software Encrypt"},{"key":"ref20","first-page":"274","article-title":"Tweaks and keys for block ciphers: The TWEAKEY framework","author":"jean","year":"2014","journal-title":"Proc 20th Int Conf Theory Appl Cryptol Inf Security (ASIACRYPT)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2018.i3.124-162"}],"container-title":["IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/43\/9437244\/09311204.pdf?arnumber=9311204","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:49:31Z","timestamp":1652194171000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9311204\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6]]},"references-count":21,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tcad.2020.3048280","relation":{},"ISSN":["0278-0070","1937-4151"],"issn-type":[{"type":"print","value":"0278-0070"},{"type":"electronic","value":"1937-4151"}],"subject":[],"published":{"date-parts":[[2021,6]]}}}