{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T19:47:36Z","timestamp":1775245656237,"version":"3.50.1"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031803109","type":"print"},{"value":"9783031803116","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-80311-6_3","type":"book-chapter","created":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:30:38Z","timestamp":1733963438000},"page":"53-72","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Differential Fault Attack on Ascon Cipher"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4171-0650","authenticated-orcid":false,"given":"Amit","family":"Jana","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,12]]},"reference":[{"key":"3_CR1","unstructured":"Internet of things global standards initiative. https:\/\/www.itu.int\/en\/ITU-T\/gsi\/iot\/Pages\/default.aspx"},{"key":"3_CR2","unstructured":"Unoptimized c-implementations of differential fault attack on ascon cipher (2023). https:\/\/github.com\/janaamit001\/DFA_on_ASCON.git"},{"key":"3_CR3","doi-asserted-by":"publisher","unstructured":"Agoyan, M., Dutertre, J., Mirbaha, A., Naccache, D., Ribotta, A., Tria, A.: How to flip a bit? In: 16th IEEE International On-Line Testing Symposium (IOLTS 2010), 5-7 July, 2010, Corfu, Greece, pp. 235\u2013239. IEEE Computer Society (2010). https:\/\/doi.org\/10.1109\/IOLTS.2010.5560194","DOI":"10.1109\/IOLTS.2010.5560194"},{"key":"3_CR4","doi-asserted-by":"publisher","unstructured":"Banik, S., Pandey, S.K., Peyrin, T., Sasaki, Y., Sim, S.M., Todo, Y.: GIFT: a small present - towards reaching the limit of lightweight encryption. In: Fischer, W., Homma, N. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings. LNCS, vol. 10529, pp. 321\u2013345. Springer (2017). https:\/\/doi.org\/10.1007\/978-3-319-66787-4_16","DOI":"10.1007\/978-3-319-66787-4_16"},{"key":"3_CR5","doi-asserted-by":"publisher","unstructured":"Beierle, C., et al.: The SKINNY family of block ciphers and its low-latency variant MANTIS. In: Robshaw, M., Katz, J. (eds.) Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II. LNCS, vol.\u00a09815, pp. 123\u2013153. Springer (2016). https:\/\/doi.org\/10.1007\/978-3-662-53008-5_5","DOI":"10.1007\/978-3-662-53008-5_5"},{"key":"3_CR6","doi-asserted-by":"publisher","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Assche, G.V.: Duplexing the sponge: single-pass authenticated encryption and other applications. In: Miri, A., Vaudenay, S. (eds.) Selected Areas in Cryptography - 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers. LNCS, vol.\u00a07118, pp. 320\u2013337. Springer (2011). https:\/\/doi.org\/10.1007\/978-3-642-28496-0_19","DOI":"10.1007\/978-3-642-28496-0_19"},{"key":"3_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201997","author":"E Biham","year":"1997","unstructured":"Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513\u2013525. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/BFb0052259"},{"key":"3_CR8","unstructured":"Biryukov, A., Perrin, L.: State of the art in lightweight symmetric cryptography. IACR Cryptol. ePrint Arch. 2017, 511 (2017). http:\/\/eprint.iacr.org\/2017\/511"},{"key":"3_CR9","doi-asserted-by":"publisher","unstructured":"Bogdanov, A., et al.: PRESENT: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings. LNCS, vol.\u00a04727, pp. 450\u2013466. Springer (2007). https:\/\/doi.org\/10.1007\/978-3-540-74735-2_31","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"3_CR10","doi-asserted-by":"publisher","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults (extended abstract). In: Fumy, W. (ed.) Advances in Cryptology - EUROCRYPT \u201997, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding. LNCS, vol.\u00a01233, pp. 37\u201351. Springer (1997). https:\/\/doi.org\/10.1007\/3-540-69053-0_4","DOI":"10.1007\/3-540-69053-0_4"},{"key":"3_CR11","doi-asserted-by":"publisher","unstructured":"Borghoff, J., et al.: PRINCE - a low-latency block cipher for pervasive computing applications - extended abstract. In: Wang, X., Sako, K. (eds.) Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings. LNCS, vol.\u00a07658, pp. 208\u2013225. Springer (2012). https:\/\/doi.org\/10.1007\/978-3-642-34961-4_14","DOI":"10.1007\/978-3-642-34961-4_14"},{"key":"3_CR12","doi-asserted-by":"publisher","unstructured":"Canni\u00e8re, C.D., Dunkelman, O., Knezevic, M.: KATAN and KTANTAN - a family of small and efficient hardware-oriented block ciphers. In: Clavier, C., Gaj, K. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings. LNCS, vol.\u00a05747, pp. 272\u2013288. Springer (2009). https:\/\/doi.org\/10.1007\/978-3-642-04138-9_20","DOI":"10.1007\/978-3-642-04138-9_20"},{"key":"3_CR13","doi-asserted-by":"publisher","unstructured":"Dobraunig, C., Eichlseder, M., Mendel, F., Schl\u00e4ffer, M.: ASCON v1.2: lightweight authenticated encryption and hashing. J. Cryptol. 34(3), 33 (2021). https:\/\/doi.org\/10.1007\/S00145-021-09398-9","DOI":"10.1007\/S00145-021-09398-9"},{"key":"3_CR14","unstructured":"Dobraunig, C., Eichlseder, M., Mendel, F., Schl\u00e4ffer, M.: ASCON v1.2. submission to round 3 of the CAESAR competition (2016). https:\/\/ascon.iaik.tugraz.at"},{"key":"3_CR15","doi-asserted-by":"publisher","unstructured":"Dutertre, J., Mirbaha, A., Naccache, D., Ribotta, A., Tria, A., Vaschalde, T.: Fault round modification analysis of the advanced encryption standard. In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2012, San Francisco, CA, USA, June 3-4, 2012, pp. 140\u2013145. IEEE Computer Society (2012). https:\/\/doi.org\/10.1109\/HST.2012.6224334","DOI":"10.1109\/HST.2012.6224334"},{"key":"3_CR16","doi-asserted-by":"publisher","unstructured":"Guo, J., Peyrin, T., Poschmann, A., Robshaw, M.J.B.: The LED block cipher. In: Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011, pp. 326\u2013341 (2011). https:\/\/doi.org\/10.1007\/978-3-642-23951-9_22","DOI":"10.1007\/978-3-642-23951-9_22"},{"issue":"2","key":"3_CR17","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/s13389-017-0160-y","volume":"8","author":"G Hatzivasilis","year":"2017","unstructured":"Hatzivasilis, G., Fysarakis, K., Papaefstathiou, I., Manifavas, C.: A review of lightweight block ciphers. J. Cryptogr. Eng. 8(2), 141\u2013184 (2017). https:\/\/doi.org\/10.1007\/s13389-017-0160-y","journal-title":"J. Cryptogr. Eng."},{"key":"3_CR18","doi-asserted-by":"publisher","unstructured":"Jacob, J., Joseph, J., Abinshad, M.K., N, A.K., Jose, J.: Prevention of fault attacks in ASCON authenticated cipher using cellular automata. In: Gwizdalla, T.M., Manzoni, L., Sirakoulis, G.C., Bandini, S., Podlaski, K. (eds.) The Proceedings of the Cellular Automata - 14th International Conference on Cellular Automata for Research and Industry, ACRI 2020, Lodz, Poland, December 2-4, 2020. LNCS, vol. 12599, pp. 18\u201325. Springer (2020). https:\/\/doi.org\/10.1007\/978-3-030-69480-7_3","DOI":"10.1007\/978-3-030-69480-7_3"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Jana, A.: Differential fault attack on Feistel-based sponge AE schemes. J. Hardw. Syst. Secur. 6(1) (2022)","DOI":"10.1007\/s41635-022-00124-w"},{"key":"3_CR20","doi-asserted-by":"publisher","unstructured":"Jana, A., Paul, G.: Differential fault attack on photon-beetle. In: Chang, C., R\u00fchrmair, U., Mukhopadhyay, D., Forte, D. (eds.) Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security, ASHES 2022, Los Angeles, CA, USA, 11 November 2022, pp. 25\u201334. ACM (2022). https:\/\/doi.org\/10.1145\/3560834.3563824","DOI":"10.1145\/3560834.3563824"},{"key":"3_CR21","doi-asserted-by":"publisher","first-page":"114155","DOI":"10.1016\/j.microrel.2021.114155","volume":"123","author":"P Joshi","year":"2021","unstructured":"Joshi, P., Mazumdar, B.: SSFA: subset fault analysis of ASCON-128 authenticated cipher. Microelectron. Reliab. 123, 114155 (2021). https:\/\/doi.org\/10.1016\/j.microrel.2021.114155","journal-title":"Microelectron. Reliab."},{"key":"3_CR22","doi-asserted-by":"publisher","unstructured":"McKay, K.A., Bassham, L.E., Turan, M.S., Mouha, N.W.: Report on lightweight cryptography. NIST Interagency\/Internal Report (NISTIR), National Institute of Standards and Technology, Gaithersburg, MD (2017). https:\/\/doi.org\/10.6028\/NIST.IR.8114","DOI":"10.6028\/NIST.IR.8114"},{"key":"3_CR23","doi-asserted-by":"publisher","unstructured":"Menu, A., Dutertre, J., Rigaud, J., Colombier, B., Mo\u00ebllic, P., Danger, J.: Single-bit laser fault model in NOR flash memories: analysis and exploitation. In: 17th Workshop on Fault Detection and Tolerance in Cryptography, FDTC 2020, Milan, Italy, September 13, 2020, pp. 41\u201348. IEEE (2020). https:\/\/doi.org\/10.1109\/FDTC51366.2020.00013","DOI":"10.1109\/FDTC51366.2020.00013"},{"issue":"3","key":"3_CR24","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/S13389-016-0128-3","volume":"7","author":"S Ordas","year":"2017","unstructured":"Ordas, S., Guillaume-Sage, L., Maurine, P.: Electromagnetic fault injection: the curse of flip-flops. J. Cryptogr. Eng. 7(3), 183\u2013197 (2017). https:\/\/doi.org\/10.1007\/S13389-016-0128-3","journal-title":"J. Cryptogr. Eng."},{"key":"3_CR25","unstructured":"Ramezanpour, K., Abdulgadir, A., Diehl, W., Kaps, J.P., Ampadu, P.: Active and passive side-channel key recovery attacks on ASCON. In: NIST Lightweight Cryptography Workshop (2020). https:\/\/csrc.nist.gov\/CSRC\/media\/Events\/lightweight-cryptography-workshop-2020\/documents\/papers\/active-passive-recovery-attacks-ascon-lwc2020.pdf"},{"key":"3_CR26","doi-asserted-by":"publisher","unstructured":"Ramezanpour, K., Ampadu, P., Diehl, W.: A statistical fault analysis methodology for the ASCON authenticated cipher. In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2019, McLean, VA, USA, May 5-10, 2019, pp. 41\u201350. IEEE (2019). https:\/\/doi.org\/10.1109\/HST.2019.8741029","DOI":"10.1109\/HST.2019.8741029"},{"key":"3_CR27","unstructured":"Ramezanpour, K., Ampadu, P., Diehl, W.: SCARL: side-channel analysis with reinforcement learning on the ASCON authenticated cipher. arXiv preprint arXiv:2006.03995 (2020)"},{"key":"3_CR28","doi-asserted-by":"publisher","unstructured":"Roscian, C., Sarafianos, A., Dutertre, J., Tria, A.: Fault model analysis of laser-induced faults in SRAM memory cells. In: Fischer, W., Schmidt, J. (eds.) 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, Los Alamitos, CA, USA, August 20, 2013, pp. 89\u201398. IEEE Computer Society (2013). https:\/\/doi.org\/10.1109\/FDTC.2013.17","DOI":"10.1109\/FDTC.2013.17"},{"key":"3_CR29","doi-asserted-by":"publisher","unstructured":"Saha, D., Chowdhury, D.R.: Scope: On the side channel vulnerability of releasing unverified plaintexts. In: Dunkelman, O., Keliher, L. (eds.) Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers. LNCS, vol.\u00a09566, pp. 417\u2013438. Springer (2015). https:\/\/doi.org\/10.1007\/978-3-319-31301-6_24","DOI":"10.1007\/978-3-319-31301-6_24"},{"key":"3_CR30","doi-asserted-by":"publisher","unstructured":"Selmke, B., Brummer, S., Heyszl, J., Sigl, G.: Precise laser fault injections into 90 nm and 45 nm SRAM-cells. In: Homma, N., Medwed, M. (eds.) Smart Card Research and Advanced Applications - 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers. LNCS, vol.\u00a09514, pp. 193\u2013205. Springer (2015). https:\/\/doi.org\/10.1007\/978-3-319-31271-2_12","DOI":"10.1007\/978-3-319-31271-2_12"},{"key":"3_CR31","doi-asserted-by":"publisher","unstructured":"Skorobogatov, S.: Optical fault masking attacks. In: Breveglieri, L., Joye, M., Koren, I., Naccache, D., Verbauwhede, I. (eds.) 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2010, Santa Barbara, California, USA, 21 August 2010. pp. 23\u201329. IEEE Computer Society (2010). https:\/\/doi.org\/10.1109\/FDTC.2010.18","DOI":"10.1109\/FDTC.2010.18"},{"key":"3_CR32","doi-asserted-by":"publisher","unstructured":"Surya, G., Maistri, P., Sankaran, S.: Local clock glitching fault injection with application to the ASCON cipher. In: IEEE International Symposium on Smart Electronic Systems, iSES 2020 (Formerly iNiS), Chennai, India, December 14-16, 2020, pp. 271\u2013276. IEEE (2020). https:\/\/doi.org\/10.1109\/ISES50453.2020.00067","DOI":"10.1109\/ISES50453.2020.00067"},{"key":"3_CR33","doi-asserted-by":"publisher","unstructured":"Tezcan, C.: Truncated, impossible, and improbable differential analysis of ASCON. In: Camp, O., Furnell, S., Mori, P. (eds.) Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP 2016, Rome, Italy, February 19-21, 2016, pp. 325\u2013332. SciTePress (2016). https:\/\/doi.org\/10.5220\/0005689903250332","DOI":"10.5220\/0005689903250332"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 INDOCRYPT 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-80311-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T01:02:23Z","timestamp":1733965343000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-80311-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,12]]},"ISBN":["9783031803109","9783031803116"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-80311-6_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,12]]},"assertion":[{"value":"12 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INDOCRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology in India","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chennai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"indocrypt2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}