{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T10:22:13Z","timestamp":1743157333557,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031575426"},{"type":"electronic","value":"9783031575433"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-57543-3_4","type":"book-chapter","created":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T23:03:11Z","timestamp":1712098991000},"page":"59-75","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Practical Improvements to\u00a0Statistical Ineffective Fault Attacks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0214-2785","authenticated-orcid":false,"given":"Bar\u0131\u015f","family":"Ege","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-3170-0861","authenticated-orcid":false,"given":"Bob","family":"Swinkels","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4551-6775","authenticated-orcid":false,"given":"Dilara","family":"Toprakhisar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-0055-828X","authenticated-orcid":false,"given":"Praveen Kumar","family":"Vadnala","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,3]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Agoyan, M., Dutertre, J.-M., Mirbaha, A.-P., Naccache, D., Ribotta, A.-L., Tria, A.: How to flip a bit? In: 16th IEEE International On-Line Testing Symposium (IOLTS 2010), 5\u20137 July 2010, Corfu, Greece, pp. 235\u2013239. IEEE Computer Society (2010)","DOI":"10.1109\/IOLTS.2010.5560194"},{"key":"4_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/bfb0028165","volume-title":"Security Protocols","author":"R Anderson","year":"1998","unstructured":"Anderson, R., Kuhn, M.: Low cost attacks on tamper resistant devices. In: Christianson, B., Crispo, B., Lomas, M., Roe, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 125\u2013136. Springer, Berlin, Heidelberg (1998). https:\/\/doi.org\/10.1007\/bfb0028165"},{"key":"4_CR3","first-page":"100","volume":"2004","author":"H Bar-El","year":"2004","unstructured":"Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The sorcerer\u2019s apprentice guide to fault attacks. IACR Cryptol. ePrint Arch. 2004, 100 (2004)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/11502760_24","volume-title":"Fast Software Encryption","author":"E Biham","year":"2005","unstructured":"Biham, E., Granboulan, L., Nguyen, P.Q.: Impossible fault analysis of RC4 and differential fault analysis of RC4. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 359\u2013367. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11502760_24"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201997","author":"E Biham","year":"1997","unstructured":"Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513\u2013525. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/BFb0052259"},{"key":"4_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/978-3-540-45126-6_12","volume-title":"Financial Cryptography","author":"J Bl\u00f6mer","year":"2003","unstructured":"Bl\u00f6mer, J., Seifert, J.-P.: Fault based cryptanalysis of the advanced encryption standard (AES). In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 162\u2013181. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45126-6_12"},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201997","author":"D Boneh","year":"1997","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37\u201351. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/3-540-69053-0_4"},{"key":"4_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/978-3-031-30122-3_3","volume-title":"Foundations and Practice of Security","author":"M Brisfors","year":"2023","unstructured":"Brisfors, M., Moraitis, M., Dubrova, E.: Do not rely on clock randomization: a side-channel attack on a protected hardware implementation of AES. In: Jourdan, G.V., Mounier, L., Adams, C., S\u00e9des, F., Garcia-Alfaro, J. (eds.) Foundations and Practice of Security. Lecture Notes in Computer Science, vol. 13877, pp. 38\u201353. Springer, Cham (2023)"},{"key":"4_CR9","unstructured":"Riscure B.V. Glitch amplifier. https:\/\/getquote.riscure.com\/en\/quote\/2101070\/glitch-amplifier.htm. Accessed 01 Dec 2023"},{"key":"4_CR10","unstructured":"Riscure B.V. Pinata S (software crypto). https:\/\/getquote.riscure.com\/en\/quote\/2101127\/pinata-s-software-crypto.htm. Accessed 01 Dec 2023"},{"key":"4_CR11","unstructured":"Riscure B.V. Spider. https:\/\/getquote.riscure.com\/en\/quote\/2492015\/spider.htm. Accessed 01 Dec 2023"},{"issue":"2","key":"4_CR12","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/s00145-010-9083-9","volume":"24","author":"G Canivet","year":"2011","unstructured":"Canivet, G., Maistri, P., Leveugle, R., Cl\u00e9di\u00e8re, J., Valette, F., Renaudin, M.: Glitch and laser fault attacks onto a secure AES implementation on a SRAM-based FPGA. J. Cryptol. 24(2), 247\u2013268 (2011)","journal-title":"J. Cryptol."},{"key":"4_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-540-74735-2_13","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"C Clavier","year":"2007","unstructured":"Clavier, C.: Secret external encodings do not prevent transient fault analysis. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 181\u2013194. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74735-2_13"},{"key":"4_CR14","unstructured":"Courtois, N.T., Ware, D., Jackson, K.M.: Fault-algebraic attacks on inner rounds of DES. In: The eSmart 2010 European Smart Card Security Conference (2010)"},{"key":"4_CR15","doi-asserted-by":"publisher","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael: AES - The Advanced Encryption Standard. Information Security and Cryptography. Springer, Hidelberg (2002). https:\/\/doi.org\/10.1007\/978-3-662-04722-4","DOI":"10.1007\/978-3-662-04722-4"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Dehbaoui, A., Dutertre, J.-M., Robisson, B., Tria, A.: Electromagnetic transient faults injection on a hardware and a software implementations of AES. In: Bertoni, G., Gierlichs, B. (eds.) 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven, Belgium, 9 September 2012, pp. 7\u201315. IEEE Computer Society (2012)","DOI":"10.1109\/FDTC.2012.15"},{"issue":"3","key":"4_CR17","doi-asserted-by":"publisher","first-page":"547","DOI":"10.46586\/tches.v2018.i3.547-572","volume":"2018","author":"C Dobraunig","year":"2018","unstructured":"Dobraunig, C., Eichlseder, M., Korak, T., Mangard, S., Mendel, F., Primas, R.: SIFA: exploiting ineffective fault inductions on symmetric cryptography. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3), 547\u2013572 (2018)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Dusart, P., Letourneux, G., Vivolo, O.: Differential fault analysis on A.E.S. IACR Cryptol. ePrint Arch. 2003, 10 (2003)","DOI":"10.1007\/978-3-540-45203-4_23"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Fuhr, T., Jaulmes, \u00c9., Lomn\u00e9, V., Thillard, A.: Fault attacks on AES with faulty ciphertexts only. In: Fischer, W., Schmidt, J.-M. (eds.) 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, Los Alamitos, CA, USA, 20 August 2013, pp. 108\u2013118. IEEE Computer Society (2013)","DOI":"10.1109\/FDTC.2013.18"},{"key":"4_CR20","first-page":"8","volume":"2003","author":"C Giraud","year":"2003","unstructured":"Giraud, C.: DFA on AES. IACR Cryptol. ePrint Arch. 2003, 8 (2003)","journal-title":"IACR Cryptol. ePrint Arch."},{"issue":"5","key":"4_CR21","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/TNS.1965.4323904","volume":"12","author":"DH Habing","year":"1965","unstructured":"Habing, D.H.: The use of lasers to simulate radiation-induced transients in semiconductor devices and circuits. IEEE Trans. Nucl. Sci. 12(5), 91\u2013100 (1965)","journal-title":"IEEE Trans. Nucl. Sci."},{"key":"4_CR22","first-page":"190","volume":"2014","author":"M Hutter","year":"2014","unstructured":"Hutter, M., Schmidt, J.-M.: The temperature side channel and heating fault attacks. IACR Cryptol. ePrint Arch. 2014, 190 (2014)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"4_CR23","unstructured":"K\u00f6mmerling, O., Kuhn, M.G.: Design principles for tamper-resistant smartcard processors. In: Guthery, S.B., Honeyman, P. (eds.) Proceedings of the 1st Workshop on Smartcard Technology, Smartcard 1999, Chicago, Illinois, USA, 10\u201311 May 1999. USENIX Association (1999)"},{"key":"4_CR24","first-page":"32","volume":"2010","author":"Y Li","year":"2010","unstructured":"Li, Y., Gomisawa, S., Sakiyama, K., Ohta, K.: An information theoretic perspective on the differential fault analysis against AES. IACR Cryptol. ePrint Arch. 2010, 32 (2010)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"4_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/11894063_8","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"A Moradi","year":"2006","unstructured":"Moradi, A., Shalmani, M.T.M., Salmasizadeh, M.: A generalized method of differential fault attack against AES cryptosystem. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 91\u2013100. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11894063_8"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Murdock, K., Oswald, D.F., Garcia, F.D., Van Bulck, J., Gruss, D., Piessens, F.: Plundervolt: Software-based fault injection attacks against intel SGX. In: 2020 IEEE Symposium on Security and Privacy, SP 2020, San Francisco, CA, USA, 18\u201321 May 2020, pp. 1466\u20131482. IEEE (2020)","DOI":"10.1109\/SP40000.2020.00057"},{"key":"4_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-540-45238-6_7","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"G Piret","year":"2003","unstructured":"Piret, G., Quisquater, J.-J.: A differential fault attack technique against SPN structures, with application to the AES and Khazad. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 77\u201388. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45238-6_7"},{"key":"4_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-030-16350-1_5","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"K Ramezanpour","year":"2019","unstructured":"Ramezanpour, K., Ampadu, P., Diehl, W.: FIMA: fault intensity map analysis. In: Polian, I., St\u00f6ttinger, M. (eds.) COSADE 2019. LNCS, vol. 11421, pp. 63\u201379. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-16350-1_5"},{"key":"4_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/3-540-36400-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"SP Skorobogatov","year":"2003","unstructured":"Skorobogatov, S.P., Anderson, R.J.: Optical fault induction attacks. In: Kaliski, B.S., Ko\u00e7, K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 2\u201312. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36400-5_2"},{"key":"4_CR30","unstructured":"Tang, A., Sethumadhavan, S., Stolfo, S.J.: CLKSCREW: exposing the perils of security-oblivious energy management. In: Kirda, E., Ristenpart, T. (eds.) 26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, 16\u201318 August 2017, pp. 1057\u20131074. USENIX Association (2017)"},{"issue":"2","key":"4_CR31","doi-asserted-by":"publisher","first-page":"172","DOI":"10.46586\/tches.v2020.i2.172-195","volume":"2020","author":"F Zhang","year":"2020","unstructured":"Zhang, F., Zhang, Y., Jiang, H., Zhu, X., Bhasin, S., Zhao, X., Liu, Z., Dawu, G., Ren, K.: Persistent fault attack in practice. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(2), 172\u2013195 (2020)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."}],"container-title":["Lecture Notes in Computer Science","Constructive Side-Channel Analysis and Secure Design"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-57543-3_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T23:05:23Z","timestamp":1712099123000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-57543-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031575426","9783031575433"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-57543-3_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"3 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"COSADE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Constructive Side-Channel Analysis and Secure Design","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gardenne","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 April 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 April 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cosade2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.cosade.org\/cosade24\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair.org","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,46","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}