{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T05:21:07Z","timestamp":1743139267933,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319159423"},{"type":"electronic","value":"9783319159430"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-15943-0_26","type":"book-chapter","created":{"date-parts":[[2015,3,16]],"date-time":"2015-03-16T10:27:17Z","timestamp":1426501637000},"page":"433-446","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Mutant Differential Fault Analysis of Trivium MDFA"],"prefix":"10.1007","author":[{"given":"Mohamed Saied Emam","family":"Mohamed","sequence":"first","affiliation":[]},{"given":"Johannes","family":"Buchmann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,17]]},"reference":[{"key":"26_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-3-642-40349-1_13","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2013","author":"S Banik","year":"2013","unstructured":"Banik, S., Maitra, S.: A differential fault attack on MICKEY 2.0. In: Bertoni, G., Coron, J.-S. (eds.) CHES 2013. LNCS, vol. 8086, pp. 215\u2013232. Springer, Heidelberg (2013)"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Banik, S., Maitra, S., Sarkar, S.: A differential fault attack on grain-128a using macs. IACR Cryptology ePrint Archive, 2012:349 (2012). informal publication","DOI":"10.1007\/978-3-642-34416-9_8"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Bard, G.: Algebraic Cryptanalysis. Springer, New York (2009)","DOI":"10.1007\/978-0-387-88757-9"},{"issue":"9","key":"26_CR4","doi-asserted-by":"publisher","first-page":"1326","DOI":"10.1016\/j.jsc.2008.02.017","volume":"44","author":"M Brickenstein","year":"2009","unstructured":"Brickenstein, M., Dreyer, A.: Polybori: A framework for Gr\u00f6bner-basis computations with boolean polynomials. J. Symbolic Comput. 44(9), 1326\u20131345 (2009)","journal-title":"J. Symbolic Comput."},{"key":"26_CR5","unstructured":"Canniere, C.D., Preneel, B.: Trivium specifications. eSTREAM, ECRYPT Stream Cipher Project (2006)"},{"key":"26_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-540-71039-4_6","volume-title":"Fast Software Encryption","author":"NT Courtois","year":"2008","unstructured":"Courtois, N.T., Bard, G.V., Wagner, D.: Algebraic and slide attacks on keeloq. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 97\u2013115. Springer, Heidelberg (2008)"},{"key":"26_CR7","unstructured":"Ding, J., Buchmann, J., Mohamed, M.S.E., Moahmed, W.S.A., Weinmann, W.S.A.: MutantXL. In: Proceedings of the 1st international conference on Symbolic Computation and Cryptography (SCC 2008), Beijing, China, pp. 16\u201322, April 2008. LMIB"},{"key":"26_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-540-79719-7_7","volume-title":"Theory and Applications of Satisfiability Testing \u2013 SAT 2008","author":"T Eibach","year":"2008","unstructured":"Eibach, T., Pilz, E., V\u00f6lkel, G.: Attacking bivium using SAT solvers. In: Kleine B\u00fcning, H., Zhao, X. (eds.) SAT 2008. LNCS, vol. 4996, pp. 63\u201376. Springer, Heidelberg (2008)"},{"key":"26_CR9","unstructured":"Faug\u00e8re, J.-C., Perret, L., Spaenlehauer, P.-J.: Algebraic-differential cryptanalysis of DES. In: Western European Workshop on Research in Cryptology - WEWoRC 2009, pp. 1\u20135 (2009)"},{"key":"26_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1007\/978-3-540-28632-5_18","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"JJ Hoch","year":"2004","unstructured":"Hoch, J.J., Shamir, A.: Fault analysis of stream ciphers. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 240\u2013253. Springer, Heidelberg (2004)"},{"key":"26_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-3-540-89754-5_19","volume-title":"Progress in Cryptology - INDOCRYPT 2008","author":"M Hojs\u00edk","year":"2008","unstructured":"Hojs\u00edk, M., Rudolf, B.: Floating fault analysis of Trivium. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 239\u2013250. Springer, Heidelberg (2008)"},{"key":"26_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-540-71039-4_10","volume-title":"Fast Software Encryption","author":"M Hojs\u00edk","year":"2008","unstructured":"Hojs\u00edk, M., Rudolf, B.: Differential fault analysis of Trivium. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 158\u2013172. Springer, Heidelberg (2008)"},{"key":"26_CR13","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-642-23141-4_7","volume-title":"Information Security and Assurance","author":"MSE Mohamed","year":"2011","unstructured":"Mohamed, M.S.E., Bulygin, S., Buchmann, J.: Using SAT solving to improve differential fault analysis of Trivium. In: Kim, T., Adeli, H., Robles, R.J., Balitanas, M. (eds.) ISA 2011. CCIS, vol. 200, pp. 62\u201371. Springer, Heidelberg (2011)"},{"key":"26_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-642-14423-3_7","volume-title":"Information, Security and Cryptology \u2013 ICISC 2009","author":"MSE Mohamed","year":"2010","unstructured":"Mohamed, M.S.E., Cabarcas, D., Ding, J., Buchmann, J., Bulygin, S.: MXL$$_{3}$$: An efficient algorithm for computing Gr\u00f6bner bases of zero-dimensional ideals. In: Lee, D., Hong, S. (eds.) ICISC 2009. LNCS, vol. 5984, pp. 87\u2013100. Springer, Heidelberg (2010)"},{"key":"26_CR15","unstructured":"Niklas Een, N.S.: MinSat 2.0 - one of the best known SAT solvers (2008). http:\/\/minisat.se\/MiniSat.html"},{"key":"26_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/978-3-642-16342-5_29","volume-title":"Information Security and Cryptology","author":"M Renauld","year":"2010","unstructured":"Renauld, M., Standaert, F.-X.: Algebraic side-channel attacks. In: Bao, F., Yung, M., Lin, D., Jing, J. (eds.) Inscrypt 2009. LNCS, vol. 6151, pp. 393\u2013410. Springer, Heidelberg (2010)"},{"key":"26_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-68351-3_1","volume-title":"New Stream Cipher Designs","author":"M Robshaw","year":"2008","unstructured":"Robshaw, M.: The eSTREAM project. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol. 4986, pp. 1\u20136. Springer, Heidelberg (2008)"},{"key":"26_CR18","unstructured":"Stein, W., et al.: Sage Mathematics Software (Version x.y.z). The Sage Development Team, YYYY. http:\/\/www.sagemath.org"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology - ICISC 2014"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-15943-0_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,27]],"date-time":"2023-01-27T19:43:22Z","timestamp":1674848602000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-15943-0_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319159423","9783319159430"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-15943-0_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"17 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}