{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T21:15:05Z","timestamp":1773436505644,"version":"3.50.1"},"reference-count":34,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"IHUB NTIHAC FOUNDATION","award":["IHUB-NTIHAC\/2021\/01\/14"],"award-info":[{"award-number":["IHUB-NTIHAC\/2021\/01\/14"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Topics Comput."],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1109\/tetc.2026.3655322","type":"journal-article","created":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T21:00:14Z","timestamp":1769634014000},"page":"210-221","source":"Crossref","is-referenced-by-count":0,"title":["A New Scan Based Attack on AES With Plaintext Restriction Countermeasure"],"prefix":"10.1109","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2357-6382","authenticated-orcid":false,"given":"Gaurav","family":"Kumar","sequence":"first","affiliation":[{"name":"Department of EE, IIT Jammu, Jammu, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2931-5466","authenticated-orcid":false,"given":"Anjum","family":"Riaz","sequence":"additional","affiliation":[{"name":"Department of EE, IIT Jammu, Jammu, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3709-7956","authenticated-orcid":false,"given":"Yamuna","family":"Prasad","sequence":"additional","affiliation":[{"name":"Department of CSE, IIT Jammu, Jammu, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0186-1446","authenticated-orcid":false,"given":"Satyadev","family":"Ahlawat","sequence":"additional","affiliation":[{"name":"Department of EE, IIT Jammu, Jammu, India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/b117406"},{"key":"ref2","article-title":"Advanced encryption standard (AES)","author":"Dworkin","year":"2001"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/dac.2005.193787"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/test.2004.1386969"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/aspdac.2010.5419848"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/iolts.2019.8854411"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04101-3"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/hst.2011.5955005"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/vlsi-soc.2013.6673281"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.1990.114395"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2023.3265815"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/delta.2008.86"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/tvlsi.2008.2010045"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/iolts.2006.55"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/OLT.2004.1319691"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-006-7720-x"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/vts.2009.20"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ats.2011.85"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/vts.2007.89"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/vts.2006.7"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/tvlsi.2010.2089071"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2016.10.011"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/aspdac.2010.5419845"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ets.2017.7968241"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/dft.2017.8244434"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2015edl8100"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2007.70215"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ets.2017.7968248"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/iscas.2018.8351212"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ats56056.2022.00016"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/iolts59296.2023.10224896"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2024.3368289"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.microrel.2021.114216"}],"container-title":["IEEE Transactions on Emerging Topics in Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6245516\/11433431\/11367384.pdf?arnumber=11367384","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T19:54:44Z","timestamp":1773431684000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11367384\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1]]},"references-count":34,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tetc.2026.3655322","relation":{},"ISSN":["2168-6750","2376-4562"],"issn-type":[{"value":"2168-6750","type":"electronic"},{"value":"2376-4562","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1]]}}}