{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T20:14:28Z","timestamp":1773519268197,"version":"3.50.1"},"reference-count":30,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2017,4,1]],"date-time":"2017-04-01T00:00:00Z","timestamp":1491004800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/100000190","name":"U.S. Department of Commerce, National Institute of Standards and Technology under the U.S. federal agency","doi-asserted-by":"publisher","award":["60NANB16D245"],"award-info":[{"award-number":["60NANB16D245"]}],"id":[{"id":"10.13039\/100000190","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. VLSI Syst."],"published-print":{"date-parts":[[2017,4]]},"DOI":"10.1109\/tvlsi.2016.2633412","type":"journal-article","created":{"date-parts":[[2016,12,14]],"date-time":"2016-12-14T19:56:45Z","timestamp":1481745405000},"page":"1528-1536","source":"Crossref","is-referenced-by-count":60,"title":["Fault Diagnosis Schemes for Low-Energy Block Cipher Midori Benchmarked on FPGA"],"prefix":"10.1109","volume":"25","author":[{"given":"Anita","family":"Aghaie","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4513-3109","authenticated-orcid":false,"given":"Mehran","family":"Mozaffari Kermani","sequence":"additional","affiliation":[]},{"given":"Reza","family":"Azarderakhsh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2897992"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2012.2228144"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-014-0092-8"},{"key":"ref12","first-page":"113","article-title":"Parity-based concurrent error detection of substitution-permutation network block ciphers","author":"karri","year":"2003","journal-title":"Proc Workshop Cryptographic Hardware Embedded Syst"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2014.2382715"},{"key":"ref14","volume":"17","author":"bushnell","year":"2000","journal-title":"Essentials of Electronic Testing for Digital Memory and Mixed-Signal VLSI Circuits"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9083-9"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228463"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9085-7"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53140-2_9"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45608-8_18"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2013.11"},{"key":"ref4","first-page":"411","article-title":"Midori: A block cipher for low energy (extended version)","author":"banik","year":"2015","journal-title":"Cryptology-eprint-archive"},{"key":"ref27","first-page":"224","article-title":"Differential fault analysis of the advanced encryption standard using a single fault","author":"tunstall","year":"2011","journal-title":"Proc WISTP"},{"key":"ref3","first-page":"69","article-title":"Pushing the limits: A very compact and a threshold implementation of AES","author":"moradi","year":"2011","journal-title":"Proc EUROCRYPT"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2013.2260570"},{"key":"ref29","first-page":"181","article-title":"On the optimality of differential fault analyses on CLEFIA","author":"kiss","year":"2015","journal-title":"Proc MACIS"},{"key":"ref5","author":"moradi","year":"2016","journal-title":"Side-Channel Analysis Protection and Low-Latency in Action-Case Study of PRINCE and Midori"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2013.2263037"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14971-4_5"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2007.178"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2930664"},{"key":"ref1","first-page":"203","article-title":"Emerging frontiers in embedded security","author":"mozaffari-kermani","year":"2013","journal-title":"Proc Conf VLSI Design"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/LES.2016.2524652"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21476-4_13"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2014.15"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2010.84"},{"key":"ref23","author":"patranabis","year":"2015","journal-title":"Using State Space Encoding to Counter Biased Fault Attacks on AES Countermeasures"},{"key":"ref26","first-page":"77","article-title":"A differential fault attack technique against SPN structures, with application to the AES and KHAZAD","author":"piret","year":"2003","journal-title":"Proc CHES"},{"key":"ref25","first-page":"513","article-title":"Differential fault analysis of secret key cryptosystems","author":"biham","year":"1997","journal-title":"Proc Crypto"}],"container-title":["IEEE Transactions on Very Large Scale Integration (VLSI) Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/92\/7882729\/07782870.pdf?arnumber=7782870","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:13:12Z","timestamp":1642003992000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7782870\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4]]},"references-count":30,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tvlsi.2016.2633412","relation":{},"ISSN":["1063-8210","1557-9999"],"issn-type":[{"value":"1063-8210","type":"print"},{"value":"1557-9999","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4]]}}}