{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T18:47:31Z","timestamp":1725734851915},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T00:00:00Z","timestamp":1559433600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,2]]},"DOI":"10.1145\/3316781.3317763","type":"proceedings-article","created":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T18:07:13Z","timestamp":1558634833000},"page":"1-6","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["ALAFA"],"prefix":"10.1145","author":[{"given":"Sayandeep","family":"Saha","sequence":"first","affiliation":[{"name":"Indian Institute of Technology, Kharagpur, Kharagpur, West Bengal, India"}]},{"given":"S. Nishok","family":"Kumar","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology, Kharagpur, Kharagpur, West Bengal, India"}]},{"given":"Sikhar","family":"Patranabis","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology, Kharagpur, Kharagpur, West Bengal, India"}]},{"given":"Debdeep","family":"Mukhopadhyay","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology, Kharagpur, Kharagpur, West Bengal, India"}]},{"given":"Pallab","family":"Dasgupta","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology, Kharagpur, Kharagpur, West Bengal, India"}]}],"member":"320","published-online":{"date-parts":[[2019,6,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"G. Barthe S. Bela\u00efd F. Dupressoir P. Fouque B. Gr\u00e9goire and P. Strub. 2015. Verified proofs of higher-order masking. In EuroCrypt'15. Springer 457--485. G. Barthe S. Bela\u00efd F. Dupressoir P. Fouque B. Gr\u00e9goire and P. Strub. 2015. Verified proofs of higher-order masking. In EuroCrypt'15. Springer 457--485.","DOI":"10.1007\/978-3-662-46800-5_18"},{"volume-title":"CRYPTO'97","author":"Biham E.","key":"e_1_3_2_1_2_1","unstructured":"E. Biham and A. Shamir . 1997. Differential fault analysis of secret key cryptosystems . In CRYPTO'97 . Springer, Santa Barbara, USA, 513--525. E. Biham and A. Shamir. 1997. Differential fault analysis of secret key cryptosystems. In CRYPTO'97. Springer, Santa Barbara, USA, 513--525."},{"volume-title":"WITS'04","author":"Clark D.","key":"e_1_3_2_1_3_1","unstructured":"D. Clark , S. Hunt , and P. Malacaria . 2004. Quantified interference: Information theory and information flow . In WITS'04 . D. Clark, S. Hunt, and P. Malacaria. 2004. Quantified interference: Information theory and information flow. In WITS'04."},{"volume-title":"ACISP'15","author":"Ghosh S.","key":"e_1_3_2_1_4_1","unstructured":"S. Ghosh , D. Saha , A. Sengupta , and D. Roychowdhury . 2015. Preventing fault attacks using fault randomization with a case study on AES . In ACISP'15 . Springer, 343--355. S. Ghosh, D. Saha, A. Sengupta, and D. Roychowdhury. 2015. Preventing fault attacks using fault randomization with a case study on AES. In ACISP'15. Springer, 343--355."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33481-8_17"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-014-0092-8"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2012.19"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-017-0006-1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2174984"},{"volume-title":"CHES'15","author":"Schneider T.","key":"e_1_3_2_1_10_1","unstructured":"T. Schneider and A. Moradi . 2015. Leakage assessment methodology . In CHES'15 . Springer, 495--513. T. Schneider and A. Moradi. 2015. Leakage assessment methodology. In CHES'15. Springer, 495--513."},{"volume-title":"WISTP'11","author":"Tunstall M.","key":"e_1_3_2_1_11_1","unstructured":"M. Tunstall , D. Mukhopadhyay , and S. Ali . 2011. Differential fault analysis of the advanced encryption standard using a single fault. In IFIP , WISTP'11 . Springer, Crete, Greece, 224--233. M. Tunstall, D. Mukhopadhyay, and S. Ali. 2011. Differential fault analysis of the advanced encryption standard using a single fault. In IFIP, WISTP'11. Springer, Crete, Greece, 224--233."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_6"}],"event":{"name":"DAC '19: The 56th Annual Design Automation Conference 2019","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE-CEDA","SIGBED ACM Special Interest Group on Embedded Systems"],"location":"Las Vegas NV USA","acronym":"DAC '19"},"container-title":["Proceedings of the 56th Annual Design Automation Conference 2019"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3316781.3317763","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T03:42:53Z","timestamp":1672976573000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3316781.3317763"}},"subtitle":["Automatic Leakage Assessment for Fault Attack Countermeasures"],"short-title":[],"issued":{"date-parts":[[2019,6,2]]},"references-count":12,"alternative-id":["10.1145\/3316781.3317763","10.1145\/3316781"],"URL":"https:\/\/doi.org\/10.1145\/3316781.3317763","relation":{},"subject":[],"published":{"date-parts":[[2019,6,2]]},"assertion":[{"value":"2019-06-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}