{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T11:51:54Z","timestamp":1769860314914,"version":"3.49.0"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032155405","type":"print"},{"value":"9783032155412","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-15541-2_14","type":"book-chapter","created":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T20:07:44Z","timestamp":1769803664000},"page":"244-260","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Lightweight Fault Detection Architecture for Modular Exponentiation in Cryptography on ARM and FPGA"],"prefix":"10.1007","author":[{"given":"Saeed","family":"Aghapour","sequence":"first","affiliation":[]},{"given":"Kasra","family":"Ahmadi","sequence":"additional","affiliation":[]},{"given":"Mehran","family":"Mozaffari Kermani","sequence":"additional","affiliation":[]},{"given":"Reza","family":"Azarderakhsh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,31]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Boneh, D., DeMillo, R., Lipton, R.: On the importance of eliminating errors in cryptographic computations. J. Cryptology 14 (2001)","DOI":"10.1007\/s001450010016"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Barenghi, A., Breveglieri, L., Koren, I., Naccache, D.: Fault injection attacks on cryptographic devices: theory, practice, and countermeasures. Proc. IEEE 100(11) (2012)","DOI":"10.1109\/JPROC.2012.2188769"},{"issue":"5","key":"14_CR3","doi-asserted-by":"publisher","first-page":"608","DOI":"10.1109\/TC.2010.33","volume":"59","author":"M Mozaffari-Kermani","year":"2010","unstructured":"Mozaffari-Kermani, M., Reyhani-Masoleh, A.: Concurrent structure independent fault detection schemes for the Advanced Encryption Standard. IEEE Trans. Computers 59(5), 608\u2013622 (2010)","journal-title":"IEEE Trans. Computers"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Koylu, T. C., Reinbrecht, C. R. W., Hamdioui, S., Taouil, M.: RNN-based detection of fault attacks on RSA. In: Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1\u20135 (2020)","DOI":"10.1109\/ISCAS45731.2020.9180708"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Dominguez-Oviedo, A., Hasan, M.: Error detection and fault tolerance in ECSM using input randomization. IEEE Trans. Dependable Secure Comput. 6(3), 175\u2013187 (2009)","DOI":"10.1109\/TDSC.2008.21"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Ahmadi, K., Aghapour, S., Mozaffari-Kermani, M., Azarderakhsh, R.: Efficient error detection schemes for ECSM window method benchmarked on FPGAs. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 32(3), 592\u2013596 (2024)","DOI":"10.1109\/TVLSI.2023.3341147"},{"key":"14_CR7","doi-asserted-by":"publisher","unstructured":"Ahmadi, K., Aghapour, S., Kermani, M.M., Azarderakhsh, R.: Error detection schemes for $$\\tau $$-NAF conversion within Koblitz curves benchmarked on various ARM processors. TechRxiv, Preprint (2023). https:\/\/doi.org\/10.36227\/techrxiv.24168654.v1","DOI":"10.36227\/techrxiv.24168654.v1"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Berndt, S., et al.: Combined fault and leakage resilience: composability, constructions and compiler. In: Handschuh, H., Lysyanskaya, A. (eds.) CRYPTO 2023, Santa Barbara, CA, USA. LNCS, vol. 14083, pp. 377\u2013409. Springer (2023)","DOI":"10.1007\/978-3-031-38548-3_13"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"M\u00fcller, N., Moradi, A.: Automated generation of fault-resistant circuits. IACR Trans. Cryptogr. Hardware Embedded Syst. 2024(3), 136\u2013173 (2024)","DOI":"10.46586\/tches.v2024.i3.136-173"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Hashemi, M., Mehta, D., Mitard, K., Tajik, S., Ganji, F.: FaultyGarble: fault attack on secure multiparty neural network inference. In: 2024 Workshop on Fault Detection and Tolerance in Cryptography (FDTC), pp. 53\u201364. IEEE (2024)","DOI":"10.1109\/FDTC64268.2024.00015"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Ghalaty, N., Aysu, A., Schaumont, P.: Analyzing and eliminating the causes of fault sensitivity analysis. In: Proceedings of the Design, Automation and Test in Europe Conference and Exhibition, pp. 1\u20136 (2014)","DOI":"10.7873\/DATE.2014.217"},{"key":"14_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/978-3-319-89339-6_17","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2018","author":"N Samwel","year":"2018","unstructured":"Samwel, N., Batina, L.: Practical fault injection on deterministic signatures: the case of EdDSA. In: Joux, A., Nitaj, A., Rachidi, T. (eds.) AFRICACRYPT 2018. LNCS, vol. 10831, pp. 306\u2013321. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-89339-6_17"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Cammarota, R., Sheikh, R.: Vpsec: countering fault attacks in general-purpose microprocessors with value prediction. In: Proceedings of the 15th ACM International Conference on Computing Frontiers (CF\u201918). ACM (2018)","DOI":"10.1145\/3203217.3203276"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Mus, K., Doroz, Y., Tol, M.C., Rahman, K., Sunar, B.: Jolt: Recovering TLS Signing Keys via Rowhammer Faults. In: IEEE S and P 2023, pp. 1719\u20131736 (2023)","DOI":"10.1109\/SP46215.2023.10179450"},{"issue":"6","key":"14_CR15","first-page":"1707","volume":"64","author":"S Chatterjee","year":"2015","unstructured":"Chatterjee, S., Karabina, K., Menezes, A.: Fault attacks on pairing-based protocols revisited. IEEE Trans. Comput. 64(6), 1707\u20131714 (2015)","journal-title":"IEEE Trans. Comput."},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Ustaoglu, B., Yalcin, B.O.: Fault tolerant register file design for MIPS AES-crypto microprocessor. In: 2015 IEEE International Conference on Electronics, Circuits, and Systems (ICECS), pp. 442\u2013445. IEEE (2015)","DOI":"10.1109\/ICECS.2015.7440343"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Bagheri, N., Sadeghi, S., Ravi, P., Bhasin, S., Soleimany, H.: SIPFA: Statistical ineffective persistent faults analysis on Feistel ciphers. IACR Trans. Cryptogr. Hardware Embedded Syst. 2022(3), 367\u2013390 (2022)","DOI":"10.46586\/tches.v2022.i3.367-390"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Feldtkeller, J., Guneysu, T., Schaumont, P.: Quantitative fault injection analysis. In: Guo, J., Steinfeld, R. (eds.) ASIACRYPT 2023, Guangzhou, China. LNCS, vol. 14441, pp. 302\u2013336. Springer (2023)","DOI":"10.1007\/978-981-99-8730-6_10"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Sarker, A., Canto, A.C., Kermani, M.M., Azarderakhsh, R.: Error detection architectures for hardware\/software co-design approaches of number-theoretic transform. IEEE Trans. Comput. Aided Des. Integr. Circ. Syst. 42(7), 2418\u20132422 (2023)","DOI":"10.1109\/TCAD.2022.3218614"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Howe, J., Khalid, A., Martinoli, M., Regazzoni, F., Oswald, E.: Fault attack countermeasures for error samplers in lattice-based cryptography. In: Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1\u20135. IEEE (2019)","DOI":"10.1109\/ISCAS.2019.8702794"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Kr\u00e4mer, E., Pessl, P., Land, G., Guneysu, T.: Correction fault attacks on randomized CRYSTALS-Dilithium. Cryptology ePrint Archive, Paper 2024\/138 (2024). https:\/\/eprint.iacr.org\/2024\/138","DOI":"10.46586\/tches.v2024.i3.174-199"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Bauer, S., De Santis, F.: Forging Dilithium and Falcon signatures by single fault injection. In: Workshop on Fault Detection and Tolerance in Cryptography (FDTC 2023), Prague, Czech Republic, September 10, 2023, pp. 81\u201388. IEEE (2023)","DOI":"10.1109\/FDTC60478.2023.00017"},{"key":"14_CR23","doi-asserted-by":"publisher","unstructured":"Banegas, G., et al.: Disorientation faults in CSIDH. In: Advances in Cryptology\u2013EUROCRYPT 2023, part V, pp. 310\u2013342. Springer Nature Switzerland (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_11.","DOI":"10.1007\/978-3-031-30589-4_11."},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"Castryck, W., Lange, T., Martindale, C., Panny, L., Renes, J.: CSIDH: an efficient post-quantum commutative group action. In: Advances in Cryptology\u2013ASIACRYPT 2018, pp. 395\u2013427","DOI":"10.1007\/978-3-030-03332-3_15"},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Ni, Z., Khalid, A., Liu, W., O\u2019Neill, M.: Bitstream fault injection attacks on CRYSTALS Kyber implementations on FPGAs. In: Design, Automation and Test in Europe Conference and Exhibition, DATE 2024, pp. 1\u20136. IEEE (2024)","DOI":"10.23919\/DATE58400.2024.10546550"},{"key":"14_CR26","doi-asserted-by":"crossref","unstructured":"Kundu, S., et al.: Carry your fault: a fault propagation attack on side-channel protected LWE-based KEM. IACR Trans. Cryptogr. Hardw. Embed. Syst. 844\u2013869 (2024)","DOI":"10.46586\/tches.v2024.i2.844-869"},{"key":"14_CR27","unstructured":"The GNU Multiple Precision Arithmetic Library (GMP). https:\/\/gmplib.org\/ Accessed March 2025"},{"key":"14_CR28","doi-asserted-by":"crossref","unstructured":"Terpstra, D., Jagode, H., You, H., Dongarra, J.: Collecting performance data with PAPI-C. In: Proceedings of Tools for High Performance Computing, Springer, pp. 157\u2013173 (2010)","DOI":"10.1007\/978-3-642-11261-4_11"},{"key":"14_CR29","doi-asserted-by":"crossref","unstructured":"Fumaroli, G., Vigilant, D.: Blinded fault-resistant exponentiation. In: Proceedings of the Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp. 62\u201370 (2006)","DOI":"10.1007\/11889700_6"},{"key":"14_CR30","doi-asserted-by":"crossref","unstructured":"Kim, C.H., Quisquater, J.J.: How can we overcome both side-channel analysis and fault attacks on RSA-CRT? In: Proceedings of the Workshop on Fault Diagnosis and Tolerance in cryptography (FDTC), pp. 21\u201329 (2007)","DOI":"10.1109\/FDTC.2007.11"},{"key":"14_CR31","doi-asserted-by":"crossref","unstructured":"Boscher, A., Handschuh, H., Trichina, E.: Blinded fault resistant exponentiation revisited. In: Proceedings of the Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp. 3\u20139 (2009)","DOI":"10.1109\/FDTC.2009.31"},{"key":"14_CR32","doi-asserted-by":"crossref","unstructured":"Giraud, C.: An RSA implementation resistant to fault attacks and to simple power analysis. IEEE Trans. Comput. 1116\u20131120 (2006)","DOI":"10.1109\/TC.2006.135"},{"key":"14_CR33","doi-asserted-by":"publisher","unstructured":"Aghapour, S., Ahmadi, K., Mozaffari-Kermani, M., Azarderakhsh, R.: Partial Recomputation fault detection architecture for multiple-precision montgomery modular multiplication. IEEE Trans. Comput. Aided Des. Integr. Circ. Syst. (2025). https:\/\/doi.org\/10.1109\/TCAD.2025.3592590","DOI":"10.1109\/TCAD.2025.3592590"},{"key":"14_CR34","doi-asserted-by":"publisher","unstructured":"Aghapour, S., Ahmadi, K., Mozaffari-Kermani, M. and Azarderakhsh, R.: Efficient partial recomputation-based fault detection approaches for z-transform. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 33(7) 1983\u20131993 (2025). https:\/\/doi.org\/10.1109\/TVLSI.2025.3560154","DOI":"10.1109\/TVLSI.2025.3560154"},{"key":"14_CR35","doi-asserted-by":"crossref","unstructured":"Hauschild, F., Garb, K., Auer, L., Selmke, B., Obermaier, J.: ARCHIE: a QEMU-based framework for architecture-independent evaluation of faults. In: Proceedings of the Workshop on Fault Detection and Tolerance in Cryptography (FDTC), Italy, pp. 20\u201330 (2021)","DOI":"10.1109\/FDTC53659.2021.00013"},{"key":"14_CR36","doi-asserted-by":"crossref","unstructured":"Arribas, V., Wegener, F., Moradi, A., Nikova, S.: Cryptographic fault diagnosis using VerFI. In: Proceedings of the 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 229\u2013240. IEEE (2020)","DOI":"10.1109\/HOST45689.2020.9300264"},{"key":"14_CR37","doi-asserted-by":"crossref","unstructured":"Richter-Brockmann, J., Shahmirzadi, A.R., Sasdrich, P., Moradi, A., Guneysu, T.: FIVER - Robust verification of countermeasures against fault injections. IACR Trans. Cryptogr. Hardw. Embed. Syst. (2021)","DOI":"10.46586\/tches.v2021.i4.447-473"},{"key":"14_CR38","doi-asserted-by":"crossref","unstructured":"Regazzoni, F., Breveglieri, L., Ienne, P., Koren, I.: Interaction between fault attack countermeasures and the resistance against power analysis attacks. In: Proceedings of the Fault Analysis Cryptography, pp. 257\u2013272 (2012)","DOI":"10.1007\/978-3-642-29656-7_15"},{"key":"14_CR39","doi-asserted-by":"crossref","unstructured":"Dofe, J., Pahlevanzadeh, H., Yu, Q.: A comprehensive FPGA-based assessment on fault-resistant AES against correlation power analysis attack. J. Electron. Test. 32(5), 611\u2013624 (2016)","DOI":"10.1007\/s10836-016-5598-9"},{"key":"14_CR40","doi-asserted-by":"crossref","unstructured":"Boreale, M.: Attacking right-to-left modular exponentiation with timely randomfaults. In: International Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 24\u201335. Berlin, Heidelberg: Springer Berlin Heidelberg (2006)","DOI":"10.1007\/11889700_3"},{"key":"14_CR41","doi-asserted-by":"crossref","unstructured":"Gueron, S.: Data and computational fault detection mechanism for devices that perform modular exponentiation. In: International Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 80\u201387. Berlin, Heidelberg: Springer Berlin Heidelberg (2006)","DOI":"10.1007\/11889700_8"},{"key":"14_CR42","doi-asserted-by":"crossref","unstructured":"Rivain, M.: Securing RSA against fault analysis by double addition chain exponentiation. In: Proceedings of the The Cryptographers\u2019 Track at the RSA Conference 2009 on Topics in Cryptology, pp. 459\u2013480, Berlin, Heidelberg (2009)","DOI":"10.1007\/978-3-642-00862-7_31"}],"container-title":["Lecture Notes in Computer Science","Lightweight Cryptography for Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-15541-2_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T20:07:49Z","timestamp":1769803669000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-15541-2_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032155405","9783032155412"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-15541-2_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"31 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"LightSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Lightweight Cryptography for Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Istanbul","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"T\u00fcrkiye","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"lightsec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.encrypt-on.com\/activities\/conferences\/lightsec-2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}