{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T23:05:43Z","timestamp":1747868743211},"reference-count":23,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2014,6,1]],"date-time":"2014-06-01T00:00:00Z","timestamp":1401580800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"name":"Walloon Region through the EUSER and S@T Skywin Projects"},{"name":"Nanotera Program through the SecWear Project"},{"name":"Swiss Commission for Technology through KTI\/CTI Project","award":["12079.1 PFES-ES TRA.S.P.CH"],"award-info":[{"award-number":["12079.1 PFES-ES TRA.S.P.CH"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Topics Comput."],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/tetc.2014.2316509","type":"journal-article","created":{"date-parts":[[2014,4,14]],"date-time":"2014-04-14T18:01:33Z","timestamp":1397498493000},"page":"107-118","source":"Crossref","is-referenced-by-count":13,"title":["A Combined Design-Time\/Test-Time Study of the Vulnerability of Sub-Threshold Devices to Low Voltage Fault Attacks"],"prefix":"10.1109","volume":"2","author":[{"given":"Alessandro","family":"Barenghi","sequence":"first","affiliation":[]},{"given":"Cedric","family":"Hocquet","sequence":"additional","affiliation":[]},{"given":"David","family":"Bol","sequence":"additional","affiliation":[]},{"given":"Francois-Xavier","family":"Standaert","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Regazzoni","sequence":"additional","affiliation":[]},{"given":"Israel","family":"Koren","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"91","article-title":"A generalized method of differential fault attack against AES cryptosystem","author":"moradi","year":"2006","journal-title":"Proc Workshop Cryptographic Hardware Embedded Syst"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ECCTD.2009.5275012"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2009.37"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC-7.2008.11"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2010.5513121"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2012.2188769"},{"key":"ref16","first-page":"343","article-title":"All you can eat or breaking a realworld contactless payment system","volume":"6052","author":"kasper","year":"2010","journal-title":"Financial Cryptography"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-45203-4_23","article-title":"Differential fault analysis on A.E.S","author":"dusart","year":"2003","journal-title":"Applied Cryptography and Network Security"},{"key":"ref18","first-page":"77","article-title":"A differential fault attack technique against SPN structures, with application to the AES and KHAZAD","volume":"2779","author":"piret","year":"2003","journal-title":"CHES"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1049\/ip-ifs:20055006","article-title":"aes implementation on a grain of sand","volume":"152","author":"feldhofer","year":"2005","journal-title":"Information Security IEE Proceedings"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-011-0005-z"},{"key":"ref3","first-page":"48","article-title":"Exploring the feasibility of low cost fault injection attacks on sub-threshold devices through an example of a 65 nm AES implementation","volume":"7055","author":"barenghi","year":"2011","journal-title":"RFIDSec"},{"key":"ref6","author":"daemen","year":"2002","journal-title":"The Design of Rijndael AES&#x2014;The Advanced Encryption Standard"},{"key":"ref5","article-title":"Announcing the advanced encryption standard AES","author":"brown","year":"2001"},{"key":"ref8","first-page":"27","article-title":"DFA on AES","volume":"3373","author":"giraud","year":"2005","journal-title":"Proc 4th Int Conf AES"},{"key":"ref7","first-page":"217","article-title":"Differential fault analysis on AES key schedule and some countermeasures","author":"chen","year":"2003","journal-title":"Proceedings of Information Security and Privacy"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2008.2005413"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/jlpea1010001"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1007\/978-3-540-85893-5_4","article-title":"New differential fault analysis on AES key schedule: Two faults are enough","author":"kim","year":"2008","journal-title":"Proc Int Conf Smart Card Research and Advanced Applications"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.02.021"},{"key":"ref22","first-page":"323","article-title":"A systematic evaluation of compact hardware implementations for the Rijndael S-box","volume":"3376","author":"mentens","year":"2005","journal-title":"CT-RSA"},{"key":"ref21","first-page":"239","article-title":"A compact Rijndael hardware architecture with S-box optimization","volume":"2248","author":"satoh","year":"2000","journal-title":"ASIACRYPT1"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2009.30"}],"container-title":["IEEE Transactions on Emerging Topics in Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245516\/6866941\/06797908.pdf?arnumber=6797908","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:28:47Z","timestamp":1642004927000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6797908\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":23,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tetc.2014.2316509","relation":{},"ISSN":["2168-6750"],"issn-type":[{"value":"2168-6750","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,6]]}}}