Design and Evaluation of Countermeasures Against Fault Injection Attacks and Power Side-Channel Leakage Exploration for AES Block Cipher
Differential Fault Analysis (DFA) and Power Analysis (PA) attacks, have become the main methods for exploiting the vulnerabilities of physical implementations of block ciphers, currently used in a multitude of applications, such as the Advanced Encryption Standard (AES). In order to minimize these t...
Saved in:
| Published in | IEEE access Vol. 10; pp. 65548 - 65561 |
|---|---|
| Main Authors | , , , , |
| Format | Journal Article |
| Language | English |
| Published |
Piscataway
IEEE
2022
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Subjects | |
| Online Access | Get full text |
| ISSN | 2169-3536 2169-3536 |
| DOI | 10.1109/ACCESS.2022.3183764 |
Cover
| Abstract | Differential Fault Analysis (DFA) and Power Analysis (PA) attacks, have become the main methods for exploiting the vulnerabilities of physical implementations of block ciphers, currently used in a multitude of applications, such as the Advanced Encryption Standard (AES). In order to minimize these types of vulnerabilities, several mechanisms have been proposed to detect fault attacks. However, these mechanisms can have a significant cost, not fully covering the implementations against fault attacks or not taking into account the leakage of the information exploitable by the power analysis attacks. In this paper, four different approaches are proposed with the aim of protecting the AES block cipher against DFA. The proposed solutions are based on Hamming code and parity bits as signature generators for the internal state of the AES cipher. These allow to detect DFA exploitable faults, from bit to byte level. The proposed solutions have been applied to a T-box based AES block cipher implemented on Field Programmable Gate Array (FPGA). Experimental results suggest a fault coverage of 98.5% and 99.99% with an area penalty of 9% and 36% respectively, for the parity bit signature generators and a fault coverage of 100% with an area penalty of 18% and 42% respectively when Hamming code signature generator is used. In addition, none of the proposed countermeasures impose a frequency degradation, in respect to the unprotected cipher. The proposed work goes further in the evaluation of the proposed DFA countermeasures by evaluating the impact of these structures in terms of power side-channel. The obtained results suggest that no extra information leakage is produced that can be exploited by PA. Overall, the proposed DFA countermeasures provide a high fault coverage protection with a low cost in terms of area and power consumption and no PA security degradation. |
|---|---|
| AbstractList | Differential Fault Analysis (DFA) and Power Analysis (PA) attacks, have become the main methods for exploiting the vulnerabilities of physical implementations of block ciphers, currently used in a multitude of applications, such as the Advanced Encryption Standard (AES). In order to minimize these types of vulnerabilities, several mechanisms have been proposed to detect fault attacks. However, these mechanisms can have a significant cost, not fully covering the implementations against fault attacks or not taking into account the leakage of the information exploitable by the power analysis attacks. In this paper, four different approaches are proposed with the aim of protecting the AES block cipher against DFA. The proposed solutions are based on Hamming code and parity bits as signature generators for the internal state of the AES cipher. These allow to detect DFA exploitable faults, from bit to byte level. The proposed solutions have been applied to a T-box based AES block cipher implemented on Field Programmable Gate Array (FPGA). Experimental results suggest a fault coverage of 98.5% and 99.99% with an area penalty of 9% and 36% respectively, for the parity bit signature generators and a fault coverage of 100% with an area penalty of 18% and 42% respectively when Hamming code signature generator is used. In addition, none of the proposed countermeasures impose a frequency degradation, in respect to the unprotected cipher. The proposed work goes further in the evaluation of the proposed DFA countermeasures by evaluating the impact of these structures in terms of power side-channel. The obtained results suggest that no extra information leakage is produced that can be exploited by PA. Overall, the proposed DFA countermeasures provide a high fault coverage protection with a low cost in terms of area and power consumption and no PA security degradation. |
| Author | Chaves, Ricardo Acosta-Jimenez, A. J. Tena-Sanchez, E. Potestad-Ordonez, F. E. Jimenez-Fernandez, C. J. |
| Author_xml | – sequence: 1 givenname: F. E. orcidid: 0000-0003-4107-2396 surname: Potestad-Ordonez fullname: Potestad-Ordonez, F. E. email: potestad@imse-cnm.csic.es organization: Seville Institute of Microelectronics IMSE-CNM (CSIC/US), Sevilla, Spain – sequence: 2 givenname: E. orcidid: 0000-0002-8905-5715 surname: Tena-Sanchez fullname: Tena-Sanchez, E. organization: Seville Institute of Microelectronics IMSE-CNM (CSIC/US), Sevilla, Spain – sequence: 3 givenname: A. J. orcidid: 0000-0002-7934-9162 surname: Acosta-Jimenez fullname: Acosta-Jimenez, A. J. organization: Seville Institute of Microelectronics IMSE-CNM (CSIC/US), Sevilla, Spain – sequence: 4 givenname: C. J. orcidid: 0000-0002-5010-337X surname: Jimenez-Fernandez fullname: Jimenez-Fernandez, C. J. organization: Seville Institute of Microelectronics IMSE-CNM (CSIC/US), Sevilla, Spain – sequence: 5 givenname: Ricardo surname: Chaves fullname: Chaves, Ricardo organization: INESC-ID, IST, Universidade de Lisboa, Lisboa, Portugal |
| BookMark | eNqFkVFv2yAUha2pk9Z1_QV9QdpzMgM2mMfMS7dIkTYp2zO6wZeUxIUMcLv-g_3suXFVTd3DeAEdnfNd4LwtznzwWBRXtJxTWqoPi7ZdbjZzVjI257ThUlSvinNGhZrxmouzv85visuU9uW4mlGq5Xnx-xMmt_MEfEeWd9APkF3wJFjShsFnjLcIaYiYyGIHzqdMrmHoM1n5PZqTdZEzmEM6Eb6Fe4xk4zqctTfgPfZkjXCAHZLlr2Mf4kS3IZLFckM-9sEcSOuONxjfFa8t9Akvn_aL4sf18nv7Zbb--nnVLtYzU5VNnlnesa0xBiWrueUVszVADVshVWNF1SkzihKlpKC4oYbbWpRCUsNQlbUw_KJYTdwuwF4fo7uF-KADOH0SQtxpiNmZHnVHQQixrUxHaUW7SilZlZKrGqhtbN2NrGpiDf4ID_fQ989AWurHcjSMV01JP5ajn8oZY--n2DGGnwOmrPdhiH58tWaiKbkSkrPRxSeXiSGliPYf9lT8S7Z6kTIun349R3D9f7JXU9Yh4vM0JZWUrOJ_AG1hvHk |
| CODEN | IAECCG |
| CitedBy_id | crossref_primary_10_1002_cpe_7872 crossref_primary_10_20535_S0021347023050011 crossref_primary_10_1007_s11276_024_03714_4 crossref_primary_10_3103_S0735272723050011 crossref_primary_10_1002_spy2_286 crossref_primary_10_1371_journal_pone_0316012 crossref_primary_10_3390_app132212530 |
| Cites_doi | 10.1002/j.1538-7305.1950.tb00463.x 10.1109/TC.2006.90 10.1007/s13389-012-0046-y 10.1007/978-3-540-45203-4_23 10.1007/978-3-540-45238-6_7 10.1109/ICCT50939.2020.9295786 10.1016/j.micpro.2012.05.010 10.1109/TC.2019.2926081 10.1109/JPROC.2005.862424 10.1109/TEMC.2012.2227486 10.1007/11545262_26 10.1109/TCAD.2002.804378 10.1049/iet-ifs:20060163 10.1007/3-540-69053-0_4 10.1007/978-3-642-27257-8_4 10.1007/978-3-540-85053-3_27 10.23919/CNSM50824.2020.9269083 10.1109/FDTC.2007.13 10.1109/HST.2010.5513109 10.1109/STA.2014.7086674 10.1007/3-540-45067-x_11 10.1016/j.jisa.2022.103205 10.1109/FDTC.2017.11 10.1109/ISCAS.2008.4541400 10.1007/s11277-020-07134-3 10.1109/TEST.2004.1387397 10.1109/TELSKS.2001.955816 10.1007/3-540-68697-5_9 10.1007/978-0-387-38162-6 10.1109/TC.2019.2913644 10.1007/3-540-48405-1_25 10.1007/978-3-642-12510-2_13 10.1109/TVLSI.2009.2031651 10.1109/HOST45689.2020.9300267 10.1007/978-3-540-45238-6_10 10.1109/TCAD.2017.2666601 10.1007/978-3-642-29656-7_15 10.6028/nist.fips.197-upd1.ipd 10.1109/IPDPS.2006.1639441 10.1109/FDTC.2011.10 10.1109/DSN.2004.1311880 10.1109/DFTVS.2005.41 10.3390/app12052390 10.1109/DFT.2006.50 10.1007/11894063_8 10.1007/11506447_4 10.1007/978-3-642-02384-2_26 10.1109/CCWC.2019.8666557 10.1109/IOLTS50870.2020.9159739 10.1007/978-3-540-85893-5_4 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 |
| DBID | 97E ESBDL RIA RIE AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D ADTOC UNPAY DOA |
| DOI | 10.1109/ACCESS.2022.3183764 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE Xplore Open Access Journals IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Xplore CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Engineered Materials Abstracts METADEX Technology Research Database Materials Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Unpaywall for CDI: Periodical Content Unpaywall DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef Materials Research Database Engineered Materials Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace METADEX Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Materials Research Database |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher – sequence: 3 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 2169-3536 |
| EndPage | 65561 |
| ExternalDocumentID | oai_doaj_org_article_d1a666b4cd1141d4997407395a1f8f5d 10.1109/access.2022.3183764 10_1109_ACCESS_2022_3183764 9797724 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: PID2020-116664RB-I00 grantid: MCIN/AEI/10.13039/501100011033 |
| GroupedDBID | 0R~ 4.4 5VS 6IK 97E AAJGR ABAZT ABVLG ACGFS ADBBV AGSQL ALMA_UNASSIGNED_HOLDINGS BCNDV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD ESBDL GROUPED_DOAJ IPLJI JAVBF KQ8 M43 M~E O9- OCL OK1 RIA RIE RNS AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D ADTOC UNPAY |
| ID | FETCH-LOGICAL-c408t-f3d2bccce7253f342f5aa5ab6798f64d9cf347e771a93c1c3f560671c2e9056c3 |
| IEDL.DBID | UNPAY |
| ISSN | 2169-3536 |
| IngestDate | Fri Oct 03 12:45:04 EDT 2025 Wed Oct 29 12:05:30 EDT 2025 Sun Jun 29 16:46:46 EDT 2025 Wed Oct 01 04:58:11 EDT 2025 Thu Apr 24 23:03:46 EDT 2025 Wed Aug 27 02:23:55 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Language | English |
| License | https://creativecommons.org/licenses/by/4.0/legalcode cc-by |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c408t-f3d2bccce7253f342f5aa5ab6798f64d9cf347e771a93c1c3f560671c2e9056c3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-5010-337X 0000-0002-7934-9162 0000-0002-8905-5715 0000-0003-4107-2396 |
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ielx7/6287639/6514899/09797724.pdf |
| PQID | 2680396732 |
| PQPubID | 4845423 |
| PageCount | 14 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_d1a666b4cd1141d4997407395a1f8f5d ieee_primary_9797724 unpaywall_primary_10_1109_access_2022_3183764 crossref_primary_10_1109_ACCESS_2022_3183764 proquest_journals_2680396732 crossref_citationtrail_10_1109_ACCESS_2022_3183764 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 20220000 2022-00-00 20220101 2022-01-01 |
| PublicationDateYYYYMMDD | 2022-01-01 |
| PublicationDate_xml | – year: 2022 text: 20220000 |
| PublicationDecade | 2020 |
| PublicationPlace | Piscataway |
| PublicationPlace_xml | – name: Piscataway |
| PublicationTitle | IEEE access |
| PublicationTitleAbbrev | Access |
| PublicationYear | 2022 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref13 ref12 ref15 ref14 Mestiri (ref40) 2013; 8 ref53 ref52 ref11 ref10 ref54 ref17 ref16 ref19 ref18 ref51 ref50 Cooper (ref31); 20 ref45 ref48 ref47 ref42 ref41 ref44 ref43 ref49 ref8 ref7 ref9 ref4 ref3 ref6 ref5 Saha (ref20) 2009; 581 ref35 ref34 ref37 ref36 ref30 ref33 ref32 ref2 ref1 ref39 ref38 ref24 ref23 ref26 ref25 ref22 ref21 Khodadad-Mostashiry (ref46); 9 ref28 ref27 ref29 |
| References_xml | – ident: ref41 doi: 10.1002/j.1538-7305.1950.tb00463.x – ident: ref43 doi: 10.1109/TC.2006.90 – ident: ref16 doi: 10.1007/s13389-012-0046-y – volume: 581 start-page: 1 year: 2009 ident: ref20 article-title: A diagonal fault attack on the advanced encryption standard publication-title: IACR Cryptol. ePrint Arch. – ident: ref11 doi: 10.1007/978-3-540-45203-4_23 – ident: ref12 doi: 10.1007/978-3-540-45238-6_7 – ident: ref35 doi: 10.1109/ICCT50939.2020.9295786 – ident: ref45 doi: 10.1016/j.micpro.2012.05.010 – volume: 9 start-page: 185 volume-title: Proc. Annu. Int. Symp. Fault-Tolerant Comput. (FTCS) ident: ref46 article-title: Parity prediction in combinational circuits – ident: ref33 doi: 10.1109/TC.2019.2926081 – ident: ref51 doi: 10.1109/JPROC.2005.862424 – ident: ref7 doi: 10.1109/TEMC.2012.2227486 – ident: ref53 doi: 10.1007/11545262_26 – ident: ref29 doi: 10.1109/TCAD.2002.804378 – ident: ref26 doi: 10.1049/iet-ifs:20060163 – ident: ref36 doi: 10.1007/3-540-69053-0_4 – ident: ref19 doi: 10.1007/978-3-642-27257-8_4 – ident: ref52 doi: 10.1007/978-3-540-85053-3_27 – ident: ref2 doi: 10.23919/CNSM50824.2020.9269083 – ident: ref17 doi: 10.1109/FDTC.2007.13 – ident: ref27 doi: 10.1109/HST.2010.5513109 – ident: ref47 doi: 10.1109/STA.2014.7086674 – ident: ref14 doi: 10.1007/3-540-45067-x_11 – ident: ref32 doi: 10.1016/j.jisa.2022.103205 – ident: ref22 doi: 10.1109/FDTC.2017.11 – ident: ref42 doi: 10.1109/ISCAS.2008.4541400 – ident: ref3 doi: 10.1007/s11277-020-07134-3 – ident: ref28 doi: 10.1109/TEST.2004.1387397 – ident: ref49 doi: 10.1109/TELSKS.2001.955816 – ident: ref5 doi: 10.1007/3-540-68697-5_9 – ident: ref8 doi: 10.1007/978-0-387-38162-6 – ident: ref24 doi: 10.1109/TC.2019.2913644 – ident: ref6 doi: 10.1007/3-540-48405-1_25 – ident: ref9 doi: 10.1007/978-3-642-12510-2_13 – ident: ref44 doi: 10.1109/TVLSI.2009.2031651 – ident: ref34 doi: 10.1109/HOST45689.2020.9300267 – ident: ref48 doi: 10.1007/978-3-540-45238-6_10 – ident: ref23 doi: 10.1109/TCAD.2017.2666601 – ident: ref25 doi: 10.1007/978-3-642-29656-7_15 – ident: ref30 doi: 10.6028/nist.fips.197-upd1.ipd – ident: ref50 doi: 10.1109/IPDPS.2006.1639441 – ident: ref15 doi: 10.1109/FDTC.2011.10 – ident: ref39 doi: 10.1109/DSN.2004.1311880 – ident: ref37 doi: 10.1109/DFTVS.2005.41 – ident: ref54 doi: 10.3390/app12052390 – ident: ref38 doi: 10.1109/DFT.2006.50 – ident: ref13 doi: 10.1007/11894063_8 – ident: ref10 doi: 10.1007/11506447_4 – ident: ref21 doi: 10.1007/978-3-642-02384-2_26 – ident: ref1 doi: 10.1109/CCWC.2019.8666557 – ident: ref4 doi: 10.1109/IOLTS50870.2020.9159739 – ident: ref18 doi: 10.1007/978-3-540-85893-5_4 – volume: 8 start-page: 730 issue: 3 year: 2013 ident: ref40 article-title: High performance and reliable fault detection scheme for the advanced encryption standard publication-title: Int. Rev. Comput. Softw. – volume: 20 start-page: 1 volume-title: Proc. Int. Cryptograph. Module Conf. ident: ref31 article-title: Test vector leakage assessment (TVLA) methodology in practice |
| SSID | ssj0000816957 |
| Score | 2.2901404 |
| Snippet | Differential Fault Analysis (DFA) and Power Analysis (PA) attacks, have become the main methods for exploiting the vulnerabilities of physical implementations... |
| SourceID | doaj unpaywall proquest crossref ieee |
| SourceType | Open Website Open Access Repository Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 65548 |
| SubjectTerms | AES Algorithms Ciphers Circuit faults Costs Countermeasure Cryptography Degradation DFA Encryption fault attack Fault detection Field programmable gate arrays FPGA implementation Generators Hamming code Hamming codes Leakage Parity power analysis Power consumption Power demand Power management |
| SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9QwELZQL8ABFQpiS1v5wJFQvxLHx3S7q4IAIZVKvVmOH2hplFY0q4p_wM_u2E6jXSHBhavljCae8fizPf4GobdeqZYE4goPwb8QrYI55wUtrLClCUTQNh1dfP5SnV2Ij5fl5Uapr5gTlumB88AdO2oAYbfCOkDu1AFAlyLdLhka6lC6GH1JrTY2UykG17RSpRxphihRx818Dn8EG0LG3kc_lpXYWooSY_9YYmULbT5e9zfm153puo2FZ7mLno2IETdZ0-foke9foKcbPIJ76PdpysPApnd4MdF34-uA45PzGHzzSeAtbr6bFQBCvDTrbsAf-h8pE6vHzTDEx_ZJwtdYOA2fr5wv4tuD3nf4kzdXEHhwztjL0gHt4mZxjk9gObzC81XkJ3iJLpaLb_OzYiyxAMYg9VAE7lhrrfWSlTxwwUJpTGnaeDcTKuGUhUbppaRGcUstD4CQKkkt8wqgk-Wv0E5_3fvXCEtWSRYMAfu0wgVmiAmGW2IjxZ-X5Qyxh9HWduQfj2UwOp32IUTpbCIdTaRHE83Qu-mjm0y_8ffuJ9GMU9fInZ0awKP06FH6Xx41Q3vRCSYhSgJGZiD74MEp9DjPbzWrasJVJTmboWJylD9UNan45Zaq-_9D1TfoSZSZj4QO0M7wc-0PASQN7VGaD_dBAgpt priority: 102 providerName: Directory of Open Access Journals – databaseName: IEEE Xplore dbid: RIE link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB61vQCH8iiIQEE-cGy2juPE62O67KogipBKpd4ixw-0bJSt2kQIfkF_dsdONuoCQtyiyHFsfWN7ZjzzDcA7K2VFHTWxxc0_5pXENWd5EmuuM-UoT6rgujj7nJ9e8I-X2eUOHI25MNbaEHxmJ_4x3OWbte68q-xYCtRWGN-FXTHN-1yt0Z_iC0jITAzEQgmVx8VshnNAE5CxiZdckfOtwydw9A9FVbb0ywddc6V-_lB1fe-oWTyGs80g-wiT1aRrq4n-9Rt_4__O4gnsDzonKXoheQo7tnkGj-4xER7A7fsQyUFUY8h8JAAna0d80rrfvntf4g0pvqklqpRkobq6JR-a7yGWqyFF2_p0_dDDF196jZwvjY199kJja_LJqhVuXaSP-et7R32ZFPNzcoIH6orMlp7h4DlcLOZfZ6fxUKQB4aTTNnapYZXW2gqWpS7lzGVKZarytzsu50ZqfCmsEImSqU506lDHykWimZWofOn0Bew168a-BCJYLphTFE2cihvHFFVOpZpqTxJoRRYB26BX6oHB3BfSqMtgyVBZ9pCXHvJygDyCo_Gjq57A49_NT7xYjE09-3Z4gRCWw2IuTaLQ6qu4NmhNJgaNRsHDjadK3NRlJoIDD_vYyYB4BIcbISuHneKmZPmUpjIXKYsgHgXvj6GqUD5za6iv_v6X1_DQt-rdRIew11539g0qTm31NqyYOzSRFKY priority: 102 providerName: IEEE |
| Title | Design and Evaluation of Countermeasures Against Fault Injection Attacks and Power Side-Channel Leakage Exploration for AES Block Cipher |
| URI | https://ieeexplore.ieee.org/document/9797724 https://www.proquest.com/docview/2680396732 https://ieeexplore.ieee.org/ielx7/6287639/6514899/09797724.pdf https://doaj.org/article/d1a666b4cd1141d4997407395a1f8f5d |
| UnpaywallVersion | publishedVersion |
| Volume | 10 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 2169-3536 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000816957 issn: 2169-3536 databaseCode: KQ8 dateStart: 20130101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2169-3536 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000816957 issn: 2169-3536 databaseCode: DOA dateStart: 20130101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2169-3536 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000816957 issn: 2169-3536 databaseCode: M~E dateStart: 20130101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1db9MwFLWge0A88DUQgVH5gUeSJo5j149ZaTUQTJNGpfEUOf5ApVFWsVQb_AJ-NteOG60gIcFbFDmWYx_b59r3novQayNEndpUxwYW_5jWAuacoVmsqCqkTWlW-6OLj6fsZEnfXxQX4cDNx8IYY7zzmUnco7_LX5nmhk8YceJpYsJgiwcjYZIKDtyF0GSj7V10wArg4iN0sDw9Kz-7jHIZE3Hu7yZfBmHNifQ5CMEoJCRxWOaM7m1HXrU_pFnZY5z3tu1Gfr-WTXNr81k8RNWu2b3PyTrZdnWifvym6Pj___UIPQi8FJc9kB6jO6Z9gu7fUis8RD_fem8PLFuN54NIOL602AW2uyW-P2-8wuUXuQLaiRdy23T4XfvV-3u1uOw6F9Lvazhz6dnw-Uqb2EU4tKbBH4xcw_KGe7_Avnbg1Licn-Nj2HTXeLZyKghP0XIx_zQ7iUMiBxjydNrFNtekVtD5nBS5zSmxhZSFrN0NkGVUCwUvueE8kyJXmcot8DDGM0WMAIKm8mdo1F625jnCnDBOrIROojXVlshUWpmrVDkhQcOLCJHdeFYqqJy7ZBtN5a2dVFTlbAbQrhwIqgCCCL0ZPtr0Ih9_L37sgDIUdQrd_gUMahUmfKUzCZZhTZUGizPTYFhy6m9FZWanttAROnRAGCoJox6hox3sqrCaXFWETdNcMJ6TCMUDFP9oag_vvaa--MfyR2jUfduaV0C0unrsDyjGPiZyHGbWL0p2JM4 |
| linkProvider | Unpaywall |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3db9MwED-N8TB44GsgCgP8wOPSJY4d149ZadVBOyFtk_ZmOf6YSqN02hJN8BfwZ2M7abQCQrxFlu3YuvP57nz3O4CPhvMitrGOjBP-ESm4O3OGJJEiikobk6QIrovFaTa7IJ8v6eUOHPa5MMaYEHxmhv4zvOXrtWq8q-yIM6etYPIAHlJCCG2ztXqPii8hwSnroIWSmB_l47HbhTMCMR563mUZ2bp-Akp_V1ZlS8Pca6pr-f1OluW9y2b6FBabZbYxJqthUxdD9eM3BMf_3cczeNJpnShv2eQ57JjqBTy-h0W4Dz8_hVgOJCuNJj0EOFpb5NPWvQBvvYm3KL-SS6dUoqlsyhqdVN9CNFeF8rr2Cfthhq---Bo6W2oT-fyFypRobuTKCS_URv21szuNGeWTM3TsrtQVGi89xsFLuJhOzsezqCvT4Agaj-rIphoXSinDME1tSrClUlJZ-PcdmxHNlWtkhrFE8lQlKrVOy8pYorDhTv1S6SvYrdaVeQ2I4YxhK2Nn5BREWyxjaWWqYuVhAg2jA8Ab6gnVYZj7UhqlCLZMzEVLcuFJLjqSD-CwH3TdQnj8u_uxZ4u-q8ffDg2OhKI7zkIn0tl9BVHa2ZOJdmYjI-HNUyZ2ZKkewL4nez9JR_EBHGyYTHSy4lbgbBSnPGMpHkDUM94fS5WhgObWUt_8_S8fYG92vpiL-cnpl7fwyI9onUYHsFvfNOadU6Pq4n04Pb8AytgX8w |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bb9MwFLage0A8cBuIwEB-4JG0ie3Y9WNWWg0E06RRaTxFji9TaZRVLBWXX8DP5thxoxUkJHiLIsdy7M_2d3yOv4PQKytlnbnMpBYW_5TVEuacZXmqmS6Uy1heh6OLD6f8ZMneXRQX8cAt3IWx1obgMzv2j8GXv7LNNzHhxIunyQmHLR6MhEkmBXAXwsYb426jA14AFx-hg-XpWfnJZ5TLuUxp8E0-j8KaExVyEIJRSMjYY1lwtrcdBdX-mGZlj3He2bYb9f2rapobm8_iPqp2ze5jTtbjbVeP9Y_fFB3__78eoHuRl-KyB9JDdMu2j9DdG2qFh-jnmxDtgVVr8HwQCcdXDvuL7X6J788br3F5qVZAO_FCbZsOv20_h3ivFpdd56_0hxrOfHo2fL4yNvU3HFrb4PdWrWF5w31cYF87cGpczs_xMWy6azxbeRWEx2i5mH-cnaQxkQMMeTbtUkcNqTV0viAFdZQRVyhVqNp7gBxnRmp4KawQuZJU55o64GFc5JpYCQRN0ydo1F619inCgnBBnIJOYjUzjqhMOUV1pr2QoBVFgshuPCsdVc59so2mCtZOJqtyNgNoVx4EVQRBgl4PH216kY-_Fz_2QBmKeoXu8AIGtYoTvjK5AsuwZtqAxZkbMCwFC15RlbupK0yCDj0QhkriqCfoaAe7Kq4m1xXh04xKLihJUDpA8Y-m9vDea-qzfyx_hEbdl619AUSrq1_G2fQLohIi2A |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Design+and+Evaluation+of+Countermeasures+Against+Fault+Injection+Attacks+and+Power+Side-Channel+Leakage+Exploration+for+AES+Block+Cipher&rft.jtitle=IEEE+access&rft.au=Potestad-Ordonez%2C+F.+E.&rft.au=Tena-Sanchez%2C+E.&rft.au=Acosta-Jimenez%2C+A.+J.&rft.au=Jimenez-Fernandez%2C+C.+J.&rft.date=2022&rft.issn=2169-3536&rft.eissn=2169-3536&rft.volume=10&rft.spage=65548&rft.epage=65561&rft_id=info:doi/10.1109%2FACCESS.2022.3183764&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_ACCESS_2022_3183764 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon |