{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T22:29:03Z","timestamp":1771453743025,"version":"3.50.1"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2016,7,1]],"date-time":"2016-07-01T00:00:00Z","timestamp":1467331200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation through the Division of Computer and Network Systems Program","doi-asserted-by":"publisher","award":["0831349"],"award-info":[{"award-number":["0831349"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Center for Interdisciplinary Studies in Security and Privacy"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Topics Comput."],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1109\/tetc.2015.2434103","type":"journal-article","created":{"date-parts":[[2015,5,20]],"date-time":"2015-05-20T14:59:03Z","timestamp":1432133943000},"page":"363-373","source":"Crossref","is-referenced-by-count":3,"title":["Can Algorithm Diversity in Stream Cipher Implementation Thwart (Natural and) Malicious Faults?"],"prefix":"10.1109","volume":"4","author":[{"given":"Xiaofei","family":"Guo","sequence":"first","affiliation":[{"name":"Security Center of Excellence, Intel Corporation, Hillsboro, OR, USA"}]},{"given":"Chenglu","family":"Jin","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Connecticut, Storrs, CT, USA"}]},{"given":"Chi","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Athanasios","family":"Papadimitriou","sequence":"additional","affiliation":[{"name":"LCIS, University of Grenoble Alpes, Valence, France"}]},{"given":"David","family":"H\u00e9ly","sequence":"additional","affiliation":[{"name":"LCIS Laboratory, Grenoble Institute of Technology, Grenoble, France"}]},{"given":"Ramesh","family":"Karri","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, New York University School of Engineering, Brooklyn, NY, USA"}]}],"member":"263","reference":[{"key":"ref33","first-page":"1","article-title":"A multiple fault injection methodology based on cone partitioning towards RTL modeling of laser attacks","author":"papadimitriou","year":"2014","journal-title":"Proc DATE"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-011-0022-y"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2012.6313863"},{"key":"ref30","year":"2013","journal-title":"Boost C++ libraries"},{"key":"ref37","first-page":"320","article-title":"Fault sensitivity analysis","author":"li","year":"2010","journal-title":"Proc CHES"},{"key":"ref36","year":"2013","journal-title":"FreePDK45"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TNS.2011.2168239"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/DTIS.2014.6850666"},{"key":"ref10","first-page":"1","article-title":"Security analysis of concurrent error detection against differential fault analysis","author":"guo","year":"2014","journal-title":"J Cryptograph Eng"},{"key":"ref11","first-page":"1182","article-title":"On selection of modulus of quadratic codes for the protection of cryptographic operations against fault attacks","volume":"63","author":"yumbul","year":"2012","journal-title":"IEEE Trans Comput"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2012.13"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-8147-2_12"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2014.6962084"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2012.2232964"},{"key":"ref16","author":"de canni\u00e9re","year":"2008","journal-title":"Trivium A stream cipher construction inspired by block cipher design principles"},{"key":"ref17","author":"hell","year":"2008","journal-title":"Grain&#x2014;Stream Cipher for Constrained Environments"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.261549"},{"key":"ref19","author":"gammel","year":"2006","journal-title":"Achterbahn-128\/80"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2014.14"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34931-7_12"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2003.821937"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2009.5225030"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2013.2263037"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2012.11"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_8"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.33"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9083-9"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2012.2231707"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2013.2250581"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2012.2188769"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12325-7_16"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2030467"},{"key":"ref21","author":"golomb","year":"1982","journal-title":"Shift Register Sequences"},{"key":"ref24","year":"2013","journal-title":"Partial Reconfiguration User Guide"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/EIDWT.2013.64"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2009.40"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2046250"}],"container-title":["IEEE Transactions on Emerging Topics in Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245516\/7558276\/07110553.pdf?arnumber=7110553","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T21:21:07Z","timestamp":1771449667000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7110553\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7]]},"references-count":37,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tetc.2015.2434103","relation":{},"ISSN":["2168-6750","2376-4562"],"issn-type":[{"value":"2168-6750","type":"electronic"},{"value":"2376-4562","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,7]]}}}