Design and Evaluation of Countermeasures Against Fault Injection Attacks and Power Side-Channel Leakage Exploration for AES Block Cipher

Differential Fault Analysis (DFA) and Power Analysis (PA) attacks, have become the main methods for exploiting the vulnerabilities of physical implementations of block ciphers, currently used in a multitude of applications, such as the Advanced Encryption Standard (AES). In order to minimize these t...

Full description

Saved in:
Bibliographic Details
Published inIEEE access Vol. 10; pp. 65548 - 65561
Main Authors Potestad-Ordonez, F. E., Tena-Sanchez, E., Acosta-Jimenez, A. J., Jimenez-Fernandez, C. J., Chaves, Ricardo
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 2022
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN2169-3536
2169-3536
DOI10.1109/ACCESS.2022.3183764

Cover

Abstract Differential Fault Analysis (DFA) and Power Analysis (PA) attacks, have become the main methods for exploiting the vulnerabilities of physical implementations of block ciphers, currently used in a multitude of applications, such as the Advanced Encryption Standard (AES). In order to minimize these types of vulnerabilities, several mechanisms have been proposed to detect fault attacks. However, these mechanisms can have a significant cost, not fully covering the implementations against fault attacks or not taking into account the leakage of the information exploitable by the power analysis attacks. In this paper, four different approaches are proposed with the aim of protecting the AES block cipher against DFA. The proposed solutions are based on Hamming code and parity bits as signature generators for the internal state of the AES cipher. These allow to detect DFA exploitable faults, from bit to byte level. The proposed solutions have been applied to a T-box based AES block cipher implemented on Field Programmable Gate Array (FPGA). Experimental results suggest a fault coverage of 98.5% and 99.99% with an area penalty of 9% and 36% respectively, for the parity bit signature generators and a fault coverage of 100% with an area penalty of 18% and 42% respectively when Hamming code signature generator is used. In addition, none of the proposed countermeasures impose a frequency degradation, in respect to the unprotected cipher. The proposed work goes further in the evaluation of the proposed DFA countermeasures by evaluating the impact of these structures in terms of power side-channel. The obtained results suggest that no extra information leakage is produced that can be exploited by PA. Overall, the proposed DFA countermeasures provide a high fault coverage protection with a low cost in terms of area and power consumption and no PA security degradation.
AbstractList Differential Fault Analysis (DFA) and Power Analysis (PA) attacks, have become the main methods for exploiting the vulnerabilities of physical implementations of block ciphers, currently used in a multitude of applications, such as the Advanced Encryption Standard (AES). In order to minimize these types of vulnerabilities, several mechanisms have been proposed to detect fault attacks. However, these mechanisms can have a significant cost, not fully covering the implementations against fault attacks or not taking into account the leakage of the information exploitable by the power analysis attacks. In this paper, four different approaches are proposed with the aim of protecting the AES block cipher against DFA. The proposed solutions are based on Hamming code and parity bits as signature generators for the internal state of the AES cipher. These allow to detect DFA exploitable faults, from bit to byte level. The proposed solutions have been applied to a T-box based AES block cipher implemented on Field Programmable Gate Array (FPGA). Experimental results suggest a fault coverage of 98.5% and 99.99% with an area penalty of 9% and 36% respectively, for the parity bit signature generators and a fault coverage of 100% with an area penalty of 18% and 42% respectively when Hamming code signature generator is used. In addition, none of the proposed countermeasures impose a frequency degradation, in respect to the unprotected cipher. The proposed work goes further in the evaluation of the proposed DFA countermeasures by evaluating the impact of these structures in terms of power side-channel. The obtained results suggest that no extra information leakage is produced that can be exploited by PA. Overall, the proposed DFA countermeasures provide a high fault coverage protection with a low cost in terms of area and power consumption and no PA security degradation.
Author Chaves, Ricardo
Acosta-Jimenez, A. J.
Tena-Sanchez, E.
Potestad-Ordonez, F. E.
Jimenez-Fernandez, C. J.
Author_xml – sequence: 1
  givenname: F. E.
  orcidid: 0000-0003-4107-2396
  surname: Potestad-Ordonez
  fullname: Potestad-Ordonez, F. E.
  email: potestad@imse-cnm.csic.es
  organization: Seville Institute of Microelectronics IMSE-CNM (CSIC/US), Sevilla, Spain
– sequence: 2
  givenname: E.
  orcidid: 0000-0002-8905-5715
  surname: Tena-Sanchez
  fullname: Tena-Sanchez, E.
  organization: Seville Institute of Microelectronics IMSE-CNM (CSIC/US), Sevilla, Spain
– sequence: 3
  givenname: A. J.
  orcidid: 0000-0002-7934-9162
  surname: Acosta-Jimenez
  fullname: Acosta-Jimenez, A. J.
  organization: Seville Institute of Microelectronics IMSE-CNM (CSIC/US), Sevilla, Spain
– sequence: 4
  givenname: C. J.
  orcidid: 0000-0002-5010-337X
  surname: Jimenez-Fernandez
  fullname: Jimenez-Fernandez, C. J.
  organization: Seville Institute of Microelectronics IMSE-CNM (CSIC/US), Sevilla, Spain
– sequence: 5
  givenname: Ricardo
  surname: Chaves
  fullname: Chaves, Ricardo
  organization: INESC-ID, IST, Universidade de Lisboa, Lisboa, Portugal
BookMark eNqFkVFv2yAUha2pk9Z1_QV9QdpzMgM2mMfMS7dIkTYp2zO6wZeUxIUMcLv-g_3suXFVTd3DeAEdnfNd4LwtznzwWBRXtJxTWqoPi7ZdbjZzVjI257ThUlSvinNGhZrxmouzv85visuU9uW4mlGq5Xnx-xMmt_MEfEeWd9APkF3wJFjShsFnjLcIaYiYyGIHzqdMrmHoM1n5PZqTdZEzmEM6Eb6Fe4xk4zqctTfgPfZkjXCAHZLlr2Mf4kS3IZLFckM-9sEcSOuONxjfFa8t9Akvn_aL4sf18nv7Zbb--nnVLtYzU5VNnlnesa0xBiWrueUVszVADVshVWNF1SkzihKlpKC4oYbbWpRCUsNQlbUw_KJYTdwuwF4fo7uF-KADOH0SQtxpiNmZHnVHQQixrUxHaUW7SilZlZKrGqhtbN2NrGpiDf4ID_fQ989AWurHcjSMV01JP5ajn8oZY--n2DGGnwOmrPdhiH58tWaiKbkSkrPRxSeXiSGliPYf9lT8S7Z6kTIun349R3D9f7JXU9Yh4vM0JZWUrOJ_AG1hvHk
CODEN IAECCG
CitedBy_id crossref_primary_10_1002_cpe_7872
crossref_primary_10_20535_S0021347023050011
crossref_primary_10_1007_s11276_024_03714_4
crossref_primary_10_3103_S0735272723050011
crossref_primary_10_1002_spy2_286
crossref_primary_10_1371_journal_pone_0316012
crossref_primary_10_3390_app132212530
Cites_doi 10.1002/j.1538-7305.1950.tb00463.x
10.1109/TC.2006.90
10.1007/s13389-012-0046-y
10.1007/978-3-540-45203-4_23
10.1007/978-3-540-45238-6_7
10.1109/ICCT50939.2020.9295786
10.1016/j.micpro.2012.05.010
10.1109/TC.2019.2926081
10.1109/JPROC.2005.862424
10.1109/TEMC.2012.2227486
10.1007/11545262_26
10.1109/TCAD.2002.804378
10.1049/iet-ifs:20060163
10.1007/3-540-69053-0_4
10.1007/978-3-642-27257-8_4
10.1007/978-3-540-85053-3_27
10.23919/CNSM50824.2020.9269083
10.1109/FDTC.2007.13
10.1109/HST.2010.5513109
10.1109/STA.2014.7086674
10.1007/3-540-45067-x_11
10.1016/j.jisa.2022.103205
10.1109/FDTC.2017.11
10.1109/ISCAS.2008.4541400
10.1007/s11277-020-07134-3
10.1109/TEST.2004.1387397
10.1109/TELSKS.2001.955816
10.1007/3-540-68697-5_9
10.1007/978-0-387-38162-6
10.1109/TC.2019.2913644
10.1007/3-540-48405-1_25
10.1007/978-3-642-12510-2_13
10.1109/TVLSI.2009.2031651
10.1109/HOST45689.2020.9300267
10.1007/978-3-540-45238-6_10
10.1109/TCAD.2017.2666601
10.1007/978-3-642-29656-7_15
10.6028/nist.fips.197-upd1.ipd
10.1109/IPDPS.2006.1639441
10.1109/FDTC.2011.10
10.1109/DSN.2004.1311880
10.1109/DFTVS.2005.41
10.3390/app12052390
10.1109/DFT.2006.50
10.1007/11894063_8
10.1007/11506447_4
10.1007/978-3-642-02384-2_26
10.1109/CCWC.2019.8666557
10.1109/IOLTS50870.2020.9159739
10.1007/978-3-540-85893-5_4
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022
DBID 97E
ESBDL
RIA
RIE
AAYXX
CITATION
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
ADTOC
UNPAY
DOA
DOI 10.1109/ACCESS.2022.3183764
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE Xplore Open Access Journals
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Xplore
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Engineered Materials Abstracts
METADEX
Technology Research Database
Materials Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Unpaywall for CDI: Periodical Content
Unpaywall
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Materials Research Database
Engineered Materials Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
METADEX
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Materials Research Database

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
– sequence: 3
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2169-3536
EndPage 65561
ExternalDocumentID oai_doaj_org_article_d1a666b4cd1141d4997407395a1f8f5d
10.1109/access.2022.3183764
10_1109_ACCESS_2022_3183764
9797724
Genre orig-research
GrantInformation_xml – fundername: PID2020-116664RB-I00
  grantid: MCIN/AEI/10.13039/501100011033
GroupedDBID 0R~
4.4
5VS
6IK
97E
AAJGR
ABAZT
ABVLG
ACGFS
ADBBV
AGSQL
ALMA_UNASSIGNED_HOLDINGS
BCNDV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
ESBDL
GROUPED_DOAJ
IPLJI
JAVBF
KQ8
M43
M~E
O9-
OCL
OK1
RIA
RIE
RNS
AAYXX
CITATION
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
ADTOC
UNPAY
ID FETCH-LOGICAL-c408t-f3d2bccce7253f342f5aa5ab6798f64d9cf347e771a93c1c3f560671c2e9056c3
IEDL.DBID UNPAY
ISSN 2169-3536
IngestDate Fri Oct 03 12:45:04 EDT 2025
Wed Oct 29 12:05:30 EDT 2025
Sun Jun 29 16:46:46 EDT 2025
Wed Oct 01 04:58:11 EDT 2025
Thu Apr 24 23:03:46 EDT 2025
Wed Aug 27 02:23:55 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
License https://creativecommons.org/licenses/by/4.0/legalcode
cc-by
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c408t-f3d2bccce7253f342f5aa5ab6798f64d9cf347e771a93c1c3f560671c2e9056c3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-5010-337X
0000-0002-7934-9162
0000-0002-8905-5715
0000-0003-4107-2396
OpenAccessLink https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ielx7/6287639/6514899/09797724.pdf
PQID 2680396732
PQPubID 4845423
PageCount 14
ParticipantIDs doaj_primary_oai_doaj_org_article_d1a666b4cd1141d4997407395a1f8f5d
ieee_primary_9797724
unpaywall_primary_10_1109_access_2022_3183764
crossref_primary_10_1109_ACCESS_2022_3183764
proquest_journals_2680396732
crossref_citationtrail_10_1109_ACCESS_2022_3183764
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20220000
2022-00-00
20220101
2022-01-01
PublicationDateYYYYMMDD 2022-01-01
PublicationDate_xml – year: 2022
  text: 20220000
PublicationDecade 2020
PublicationPlace Piscataway
PublicationPlace_xml – name: Piscataway
PublicationTitle IEEE access
PublicationTitleAbbrev Access
PublicationYear 2022
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref12
ref15
ref14
Mestiri (ref40) 2013; 8
ref53
ref52
ref11
ref10
ref54
ref17
ref16
ref19
ref18
ref51
ref50
Cooper (ref31); 20
ref45
ref48
ref47
ref42
ref41
ref44
ref43
ref49
ref8
ref7
ref9
ref4
ref3
ref6
ref5
Saha (ref20) 2009; 581
ref35
ref34
ref37
ref36
ref30
ref33
ref32
ref2
ref1
ref39
ref38
ref24
ref23
ref26
ref25
ref22
ref21
Khodadad-Mostashiry (ref46); 9
ref28
ref27
ref29
References_xml – ident: ref41
  doi: 10.1002/j.1538-7305.1950.tb00463.x
– ident: ref43
  doi: 10.1109/TC.2006.90
– ident: ref16
  doi: 10.1007/s13389-012-0046-y
– volume: 581
  start-page: 1
  year: 2009
  ident: ref20
  article-title: A diagonal fault attack on the advanced encryption standard
  publication-title: IACR Cryptol. ePrint Arch.
– ident: ref11
  doi: 10.1007/978-3-540-45203-4_23
– ident: ref12
  doi: 10.1007/978-3-540-45238-6_7
– ident: ref35
  doi: 10.1109/ICCT50939.2020.9295786
– ident: ref45
  doi: 10.1016/j.micpro.2012.05.010
– volume: 9
  start-page: 185
  volume-title: Proc. Annu. Int. Symp. Fault-Tolerant Comput. (FTCS)
  ident: ref46
  article-title: Parity prediction in combinational circuits
– ident: ref33
  doi: 10.1109/TC.2019.2926081
– ident: ref51
  doi: 10.1109/JPROC.2005.862424
– ident: ref7
  doi: 10.1109/TEMC.2012.2227486
– ident: ref53
  doi: 10.1007/11545262_26
– ident: ref29
  doi: 10.1109/TCAD.2002.804378
– ident: ref26
  doi: 10.1049/iet-ifs:20060163
– ident: ref36
  doi: 10.1007/3-540-69053-0_4
– ident: ref19
  doi: 10.1007/978-3-642-27257-8_4
– ident: ref52
  doi: 10.1007/978-3-540-85053-3_27
– ident: ref2
  doi: 10.23919/CNSM50824.2020.9269083
– ident: ref17
  doi: 10.1109/FDTC.2007.13
– ident: ref27
  doi: 10.1109/HST.2010.5513109
– ident: ref47
  doi: 10.1109/STA.2014.7086674
– ident: ref14
  doi: 10.1007/3-540-45067-x_11
– ident: ref32
  doi: 10.1016/j.jisa.2022.103205
– ident: ref22
  doi: 10.1109/FDTC.2017.11
– ident: ref42
  doi: 10.1109/ISCAS.2008.4541400
– ident: ref3
  doi: 10.1007/s11277-020-07134-3
– ident: ref28
  doi: 10.1109/TEST.2004.1387397
– ident: ref49
  doi: 10.1109/TELSKS.2001.955816
– ident: ref5
  doi: 10.1007/3-540-68697-5_9
– ident: ref8
  doi: 10.1007/978-0-387-38162-6
– ident: ref24
  doi: 10.1109/TC.2019.2913644
– ident: ref6
  doi: 10.1007/3-540-48405-1_25
– ident: ref9
  doi: 10.1007/978-3-642-12510-2_13
– ident: ref44
  doi: 10.1109/TVLSI.2009.2031651
– ident: ref34
  doi: 10.1109/HOST45689.2020.9300267
– ident: ref48
  doi: 10.1007/978-3-540-45238-6_10
– ident: ref23
  doi: 10.1109/TCAD.2017.2666601
– ident: ref25
  doi: 10.1007/978-3-642-29656-7_15
– ident: ref30
  doi: 10.6028/nist.fips.197-upd1.ipd
– ident: ref50
  doi: 10.1109/IPDPS.2006.1639441
– ident: ref15
  doi: 10.1109/FDTC.2011.10
– ident: ref39
  doi: 10.1109/DSN.2004.1311880
– ident: ref37
  doi: 10.1109/DFTVS.2005.41
– ident: ref54
  doi: 10.3390/app12052390
– ident: ref38
  doi: 10.1109/DFT.2006.50
– ident: ref13
  doi: 10.1007/11894063_8
– ident: ref10
  doi: 10.1007/11506447_4
– ident: ref21
  doi: 10.1007/978-3-642-02384-2_26
– ident: ref1
  doi: 10.1109/CCWC.2019.8666557
– ident: ref4
  doi: 10.1109/IOLTS50870.2020.9159739
– ident: ref18
  doi: 10.1007/978-3-540-85893-5_4
– volume: 8
  start-page: 730
  issue: 3
  year: 2013
  ident: ref40
  article-title: High performance and reliable fault detection scheme for the advanced encryption standard
  publication-title: Int. Rev. Comput. Softw.
– volume: 20
  start-page: 1
  volume-title: Proc. Int. Cryptograph. Module Conf.
  ident: ref31
  article-title: Test vector leakage assessment (TVLA) methodology in practice
SSID ssj0000816957
Score 2.2901404
Snippet Differential Fault Analysis (DFA) and Power Analysis (PA) attacks, have become the main methods for exploiting the vulnerabilities of physical implementations...
SourceID doaj
unpaywall
proquest
crossref
ieee
SourceType Open Website
Open Access Repository
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 65548
SubjectTerms AES
Algorithms
Ciphers
Circuit faults
Costs
Countermeasure
Cryptography
Degradation
DFA
Encryption
fault attack
Fault detection
Field programmable gate arrays
FPGA implementation
Generators
Hamming code
Hamming codes
Leakage
Parity
power analysis
Power consumption
Power demand
Power management
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9QwELZQL8ABFQpiS1v5wJFQvxLHx3S7q4IAIZVKvVmOH2hplFY0q4p_wM_u2E6jXSHBhavljCae8fizPf4GobdeqZYE4goPwb8QrYI55wUtrLClCUTQNh1dfP5SnV2Ij5fl5Uapr5gTlumB88AdO2oAYbfCOkDu1AFAlyLdLhka6lC6GH1JrTY2UykG17RSpRxphihRx818Dn8EG0LG3kc_lpXYWooSY_9YYmULbT5e9zfm153puo2FZ7mLno2IETdZ0-foke9foKcbPIJ76PdpysPApnd4MdF34-uA45PzGHzzSeAtbr6bFQBCvDTrbsAf-h8pE6vHzTDEx_ZJwtdYOA2fr5wv4tuD3nf4kzdXEHhwztjL0gHt4mZxjk9gObzC81XkJ3iJLpaLb_OzYiyxAMYg9VAE7lhrrfWSlTxwwUJpTGnaeDcTKuGUhUbppaRGcUstD4CQKkkt8wqgk-Wv0E5_3fvXCEtWSRYMAfu0wgVmiAmGW2IjxZ-X5Qyxh9HWduQfj2UwOp32IUTpbCIdTaRHE83Qu-mjm0y_8ffuJ9GMU9fInZ0awKP06FH6Xx41Q3vRCSYhSgJGZiD74MEp9DjPbzWrasJVJTmboWJylD9UNan45Zaq-_9D1TfoSZSZj4QO0M7wc-0PASQN7VGaD_dBAgpt
  priority: 102
  providerName: Directory of Open Access Journals
– databaseName: IEEE Xplore
  dbid: RIE
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB61vQCH8iiIQEE-cGy2juPE62O67KogipBKpd4ixw-0bJSt2kQIfkF_dsdONuoCQtyiyHFsfWN7ZjzzDcA7K2VFHTWxxc0_5pXENWd5EmuuM-UoT6rgujj7nJ9e8I-X2eUOHI25MNbaEHxmJ_4x3OWbte68q-xYCtRWGN-FXTHN-1yt0Z_iC0jITAzEQgmVx8VshnNAE5CxiZdckfOtwydw9A9FVbb0ywddc6V-_lB1fe-oWTyGs80g-wiT1aRrq4n-9Rt_4__O4gnsDzonKXoheQo7tnkGj-4xER7A7fsQyUFUY8h8JAAna0d80rrfvntf4g0pvqklqpRkobq6JR-a7yGWqyFF2_p0_dDDF196jZwvjY199kJja_LJqhVuXaSP-et7R32ZFPNzcoIH6orMlp7h4DlcLOZfZ6fxUKQB4aTTNnapYZXW2gqWpS7lzGVKZarytzsu50ZqfCmsEImSqU506lDHykWimZWofOn0Bew168a-BCJYLphTFE2cihvHFFVOpZpqTxJoRRYB26BX6oHB3BfSqMtgyVBZ9pCXHvJygDyCo_Gjq57A49_NT7xYjE09-3Z4gRCWw2IuTaLQ6qu4NmhNJgaNRsHDjadK3NRlJoIDD_vYyYB4BIcbISuHneKmZPmUpjIXKYsgHgXvj6GqUD5za6iv_v6X1_DQt-rdRIew11539g0qTm31NqyYOzSRFKY
  priority: 102
  providerName: IEEE
Title Design and Evaluation of Countermeasures Against Fault Injection Attacks and Power Side-Channel Leakage Exploration for AES Block Cipher
URI https://ieeexplore.ieee.org/document/9797724
https://www.proquest.com/docview/2680396732
https://ieeexplore.ieee.org/ielx7/6287639/6514899/09797724.pdf
https://doaj.org/article/d1a666b4cd1141d4997407395a1f8f5d
UnpaywallVersion publishedVersion
Volume 10
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAFT
  databaseName: Open Access Digital Library
  customDbUrl:
  eissn: 2169-3536
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000816957
  issn: 2169-3536
  databaseCode: KQ8
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html
  providerName: Colorado Alliance of Research Libraries
– providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 2169-3536
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000816957
  issn: 2169-3536
  databaseCode: DOA
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2169-3536
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000816957
  issn: 2169-3536
  databaseCode: M~E
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1db9MwFLWge0A88DUQgVH5gUeSJo5j149ZaTUQTJNGpfEUOf5ApVFWsVQb_AJ-NteOG60gIcFbFDmWYx_b59r3novQayNEndpUxwYW_5jWAuacoVmsqCqkTWlW-6OLj6fsZEnfXxQX4cDNx8IYY7zzmUnco7_LX5nmhk8YceJpYsJgiwcjYZIKDtyF0GSj7V10wArg4iN0sDw9Kz-7jHIZE3Hu7yZfBmHNifQ5CMEoJCRxWOaM7m1HXrU_pFnZY5z3tu1Gfr-WTXNr81k8RNWu2b3PyTrZdnWifvym6Pj___UIPQi8FJc9kB6jO6Z9gu7fUis8RD_fem8PLFuN54NIOL602AW2uyW-P2-8wuUXuQLaiRdy23T4XfvV-3u1uOw6F9Lvazhz6dnw-Uqb2EU4tKbBH4xcw_KGe7_Avnbg1Licn-Nj2HTXeLZyKghP0XIx_zQ7iUMiBxjydNrFNtekVtD5nBS5zSmxhZSFrN0NkGVUCwUvueE8kyJXmcot8DDGM0WMAIKm8mdo1F625jnCnDBOrIROojXVlshUWpmrVDkhQcOLCJHdeFYqqJy7ZBtN5a2dVFTlbAbQrhwIqgCCCL0ZPtr0Ih9_L37sgDIUdQrd_gUMahUmfKUzCZZhTZUGizPTYFhy6m9FZWanttAROnRAGCoJox6hox3sqrCaXFWETdNcMJ6TCMUDFP9oag_vvaa--MfyR2jUfduaV0C0unrsDyjGPiZyHGbWL0p2JM4
linkProvider Unpaywall
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3db9MwED-N8TB44GsgCgP8wOPSJY4d149ZadVBOyFtk_ZmOf6YSqN02hJN8BfwZ2M7abQCQrxFlu3YuvP57nz3O4CPhvMitrGOjBP-ESm4O3OGJJEiikobk6QIrovFaTa7IJ8v6eUOHPa5MMaYEHxmhv4zvOXrtWq8q-yIM6etYPIAHlJCCG2ztXqPii8hwSnroIWSmB_l47HbhTMCMR563mUZ2bp-Akp_V1ZlS8Pca6pr-f1OluW9y2b6FBabZbYxJqthUxdD9eM3BMf_3cczeNJpnShv2eQ57JjqBTy-h0W4Dz8_hVgOJCuNJj0EOFpb5NPWvQBvvYm3KL-SS6dUoqlsyhqdVN9CNFeF8rr2Cfthhq---Bo6W2oT-fyFypRobuTKCS_URv21szuNGeWTM3TsrtQVGi89xsFLuJhOzsezqCvT4Agaj-rIphoXSinDME1tSrClUlJZ-PcdmxHNlWtkhrFE8lQlKrVOy8pYorDhTv1S6SvYrdaVeQ2I4YxhK2Nn5BREWyxjaWWqYuVhAg2jA8Ab6gnVYZj7UhqlCLZMzEVLcuFJLjqSD-CwH3TdQnj8u_uxZ4u-q8ffDg2OhKI7zkIn0tl9BVHa2ZOJdmYjI-HNUyZ2ZKkewL4nez9JR_EBHGyYTHSy4lbgbBSnPGMpHkDUM94fS5WhgObWUt_8_S8fYG92vpiL-cnpl7fwyI9onUYHsFvfNOadU6Pq4n04Pb8AytgX8w
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bb9MwFLage0A8cBuIwEB-4JG0ie3Y9WNWWg0E06RRaTxFji9TaZRVLBWXX8DP5thxoxUkJHiLIsdy7M_2d3yOv4PQKytlnbnMpBYW_5TVEuacZXmqmS6Uy1heh6OLD6f8ZMneXRQX8cAt3IWx1obgMzv2j8GXv7LNNzHhxIunyQmHLR6MhEkmBXAXwsYb426jA14AFx-hg-XpWfnJZ5TLuUxp8E0-j8KaExVyEIJRSMjYY1lwtrcdBdX-mGZlj3He2bYb9f2rapobm8_iPqp2ze5jTtbjbVeP9Y_fFB3__78eoHuRl-KyB9JDdMu2j9DdG2qFh-jnmxDtgVVr8HwQCcdXDvuL7X6J788br3F5qVZAO_FCbZsOv20_h3ivFpdd56_0hxrOfHo2fL4yNvU3HFrb4PdWrWF5w31cYF87cGpczs_xMWy6azxbeRWEx2i5mH-cnaQxkQMMeTbtUkcNqTV0viAFdZQRVyhVqNp7gBxnRmp4KawQuZJU55o64GFc5JpYCQRN0ydo1F619inCgnBBnIJOYjUzjqhMOUV1pr2QoBVFgshuPCsdVc59so2mCtZOJqtyNgNoVx4EVQRBgl4PH216kY-_Fz_2QBmKeoXu8AIGtYoTvjK5AsuwZtqAxZkbMCwFC15RlbupK0yCDj0QhkriqCfoaAe7Kq4m1xXh04xKLihJUDpA8Y-m9vDea-qzfyx_hEbdl619AUSrq1_G2fQLohIi2A
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Design+and+Evaluation+of+Countermeasures+Against+Fault+Injection+Attacks+and+Power+Side-Channel+Leakage+Exploration+for+AES+Block+Cipher&rft.jtitle=IEEE+access&rft.au=Potestad-Ordonez%2C+F.+E.&rft.au=Tena-Sanchez%2C+E.&rft.au=Acosta-Jimenez%2C+A.+J.&rft.au=Jimenez-Fernandez%2C+C.+J.&rft.date=2022&rft.issn=2169-3536&rft.eissn=2169-3536&rft.volume=10&rft.spage=65548&rft.epage=65561&rft_id=info:doi/10.1109%2FACCESS.2022.3183764&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_ACCESS_2022_3183764
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon