{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T07:23:52Z","timestamp":1725693832388},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,8,28]]},"DOI":"10.1145\/1150343.1150393","type":"proceedings-article","created":{"date-parts":[[2006,10,18]],"date-time":"2006-10-18T22:04:00Z","timestamp":1161209040000},"page":"190-195","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["A cryptography core tolerant to DFA fault attacks"],"prefix":"10.1145","author":[{"given":"Carlos Roberto","family":"Moratelli","sequence":"first","affiliation":[{"name":"PPGC, Porto Alegre - Brasil"}]},{"given":"\u00cf","family":"Cota","sequence":"additional","affiliation":[{"name":"PPGC, Porto Alegre - Brasil"}]},{"given":"Marcelo Soares","family":"Lubaszewski","sequence":"additional","affiliation":[{"name":"PPGEE, Porto Alegre - Brasil"}]}],"member":"320","published-online":{"date-parts":[[2006,8,28]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"2002","article-title":"A parity code based fault detection for an implementation of the advanced encryption standard","author":"Bertoni G.","year":"2002","unstructured":"G. Bertoni , L. Breveglieri , I. Koren , P. Maistri , and V. Piuri . A parity code based fault detection for an implementation of the advanced encryption standard . Defect and Fault Tolerance in VLSI Systems , 2002 . DFT 2002 ., 2002. G. Bertoni, L. Breveglieri, I. Koren, P. Maistri, and V. Piuri. A parity code based fault detection for an implementation of the advanced encryption standard. Defect and Fault Tolerance in VLSI Systems, 2002. DFT 2002., 2002.","journal-title":"Defect and Fault Tolerance in VLSI Systems"},{"key":"e_1_3_2_1_2_1","series-title":"Lecture Notes in Computer Science, 1294: 513--??","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0052329","volume-title":"Differential fault analysis of secret key cryptosystems","author":"Biham E.","year":"1997","unstructured":"E. Biham and A. Shamir . Differential fault analysis of secret key cryptosystems . Lecture Notes in Computer Science, 1294: 513--?? , 1997 . E. Biham and A. Shamir. Differential fault analysis of secret key cryptosystems. Lecture Notes in Computer Science, 1294:513--??, 1997."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.5555\/1754542.1754548"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1109\/DFTVS.2005.41"},{"key":"e_1_3_2_1_6_1","first-page":"2","volume-title":"Dependability of computer systems: concepts, limits, improvements. Software Reliability Engineering,1995","author":"Laprie J.-C.","year":"1995","unstructured":"J.-C. Laprie . Dependability of computer systems: concepts, limits, improvements. Software Reliability Engineering,1995 , pages 2 -- 11 , October 1995 . J.-C. Laprie. Dependability of computer systems: concepts, limits, improvements. Software Reliability Engineering,1995, pages 2--11,October 1995."},{"key":"e_1_3_2_1_7_1","volume-title":"Boca Raton","author":"Menezes A. J.","year":"1997","unstructured":"A. J. Menezes . Handbook of Applied Cryptography . Boca Raton , 1997 . A. J. Menezes. Handbook of Applied Cryptography. Boca Raton, 1997."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/1081081.1081114"},{"key":"e_1_3_2_1_9_1","article-title":"Design for soft-error mitigation","author":"Nicolaidis M.","year":"2002","unstructured":"M. Nicolaidis . Design for soft-error mitigation . IEEE Transactions on Device and Materials Reliability , Sept 2002 . M. Nicolaidis. Design for soft-error mitigation. IEEE Transactions on Device and Materials Reliability, Sept 2002.","journal-title":"IEEE Transactions on Device and Materials Reliability"},{"volume-title":"Disponel em: http:\/\/www.opencores.org. Acessado em Setembro de","year":"2005","unstructured":"Opencores.Opencores.org, 2005. Disponel em: http:\/\/www.opencores.org. Acessado em Setembro de 2005 . Opencores.Opencores.org, 2005. Disponel em: http:\/\/www.opencores.org. Acessado em Setembro de 2005.","key":"e_1_3_2_1_10_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1007\/978-3-540-45238-6_7"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.5555\/968878.969074"},{"key":"e_1_3_2_1_13_1","volume-title":"Applied Cryptography","author":"Scheier B.","year":"1996","unstructured":"B. Scheier . Applied Cryptography . John Wiley , 2 rd edition, 1996 . B. Scheier. Applied Cryptography. John Wiley, 2rd edition, 1996.","edition":"2"},{"doi-asserted-by":"crossref","unstructured":"S. P. Skorobogatov and R. J. Anderson. Optical fault induction attacks. Cryptographic Hardware and Embedded Systems 2002.   S. P. Skorobogatov and R. J. Anderson. Optical fault induction attacks. Cryptographic Hardware and Embedded Systems 2002.","key":"e_1_3_2_1_14_1","DOI":"10.1007\/3-540-36400-5_2"},{"key":"e_1_3_2_1_15_1","volume-title":"Cryptography and Network Security","author":"Stallings W.","year":"1999","unstructured":"W. Stallings . Cryptography and Network Security . Prentice Hall , 2 rd edition, 1999 . W. Stallings. Cryptography and Network Security. Prentice Hall, 2rd edition,1999.","edition":"2"}],"event":{"sponsor":["ACM Association for Computing Machinery","SIGDA ACM Special Interest Group on Design Automation"],"acronym":"SBCCI06","name":"SBCCI06: 19th Symposium on Integrated Circuits and System Design","location":"Ouro Preto MG Brazil"},"container-title":["Proceedings of the 19th annual symposium on Integrated circuits and systems design"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1150343.1150393","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T01:49:31Z","timestamp":1673142571000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1150343.1150393"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,8,28]]},"references-count":14,"alternative-id":["10.1145\/1150343.1150393","10.1145\/1150343"],"URL":"https:\/\/doi.org\/10.1145\/1150343.1150393","relation":{},"subject":[],"published":{"date-parts":[[2006,8,28]]},"assertion":[{"value":"2006-08-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}