{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T17:37:41Z","timestamp":1743097061953,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319328584"},{"type":"electronic","value":"9783319328591"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-32859-1_15","type":"book-chapter","created":{"date-parts":[[2016,4,15]],"date-time":"2016-04-15T11:12:06Z","timestamp":1460718726000},"page":"181-196","source":"Crossref","is-referenced-by-count":1,"title":["On the Optimality of Differential Fault Analyses on CLEFIA"],"prefix":"10.1007","author":[{"given":"\u00c1gnes","family":"Kiss","sequence":"first","affiliation":[]},{"given":"Juliane","family":"Kr\u00e4mer","sequence":"additional","affiliation":[]},{"given":"Anke","family":"St\u00fcber","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,16]]},"reference":[{"key":"15_CR1","unstructured":"Ali, S., Mukhopadhyay, D.: Protecting last four rounds of CLEFIA is not enough against differential fault analysis. IACR Cryptology ePrint Archive, p. 286 (2012)"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Ali, S., Mukhopadhyay, D.: Improved differential fault analysis of CLEFIA. In: Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2013), pp. 60\u201370. IEEE (2013)","DOI":"10.1109\/FDTC.2013.11"},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology - CRYPTO 1997","author":"E Biham","year":"1997","unstructured":"Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513\u2013525. Springer, Heidelberg (1997)"},{"key":"15_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1007\/978-3-540-77048-0_22","volume-title":"Information and Communications Security","author":"H Chen","year":"2007","unstructured":"Chen, H., Wu, W., Feng, D.: Differential fault analysis on CLEFIA. In: Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. LNCS, vol. 4861, pp. 284\u2013295. Springer, Heidelberg (2007)"},{"key":"15_CR5","volume-title":"An Introduction to Probability Theory and Its Applications","author":"W Feller","year":"1968","unstructured":"Feller, W.: An Introduction to Probability Theory and Its Applications, vol. 1. Wiley, New York (1968)"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Fischer, W., Reuter, C.A.: Differential fault analysis on Gr\u00f8stl. In: Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2012), pp. 44\u201354. IEEE (2012)","DOI":"10.1109\/FDTC.2012.14"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Karmakar, S., Chowdhury, D.R.: Differential fault analysis of MICKEY-128 2.0. In: Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2013), pp. 52\u201359. IEEE (2013)","DOI":"10.1109\/FDTC.2013.8"},{"key":"15_CR8","unstructured":"Kr\u00e4mer, J., St\u00fcber, A., Kiss, \u00c1.: On the optimality of differential fault analyses on CLEFIA. IACR Cryptology ePrint Archive 2014, p. 572 (2014)"},{"key":"15_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-540-45238-6_7","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"G Piret","year":"2003","unstructured":"Piret, G., Quisquater, J.-J.: A differential fault attack technique against SPN structures, with application to the AES and KHAZAD. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 77\u201388. Springer, Heidelberg (2003)"},{"key":"15_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/978-3-642-25578-6_6","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2011","author":"C Rebeiro","year":"2011","unstructured":"Rebeiro, C., Poddar, R., Datta, A., Mukhopadhyay, D.: An enhanced differential cache attack on CLEFIA for large cache Lines. In: Bernstein, D.J., Chatterjee, S. (eds.) INDOCRYPT 2011. LNCS, vol. 7107, pp. 58\u201375. Springer, Heidelberg (2011)"},{"key":"15_CR11","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1109\/TIFS.2011.2174984","volume":"7","author":"K Sakiyama","year":"2012","unstructured":"Sakiyama, K., Li, Y., Iwamoto, M., Ohta, K.: Information-theoretic approach to optimal differential fault analysis. IEEE Trans. Inf. Forensics Secur. 7, 109\u2013120 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"379\u2013423","key":"15_CR12","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1002\/j.1538-7305.1948.tb00917.x","volume":"27","author":"C Shannon","year":"1948","unstructured":"Shannon, C.: A mathematical theory of communication. Bell Syst. Tech. J. 27(379\u2013423), 623\u2013656 (1948)","journal-title":"Bell Syst. Tech. J."},{"key":"15_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-540-74619-5_12","volume-title":"Fast Software Encryption","author":"T Shirai","year":"2007","unstructured":"Shirai, T., Shibutani, K., Akishita, T., Moriai, S., Iwata, T.: The 128-bit blockcipher CLEFIA (Extended Abstract). In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 181\u2013195. Springer, Heidelberg (2007)"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Takahashi, J., Fukunaga, T.: Improved differential fault analysis on CLEFIA. In: Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2008), pp. 25\u201334. IEEE (2008)","DOI":"10.1109\/FDTC.2008.14"},{"key":"15_CR15","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1587\/transfun.E93.A.136","volume":"93\u2013A","author":"J Takahashi","year":"2010","unstructured":"Takahashi, J., Fukunaga, T.: Differential fault analysis on CLEFIA with 128, 192, and 256-bit keys. IEICE Trans. 93\u2013A, 136\u2013143 (2010)","journal-title":"IEICE Trans."},{"key":"15_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-642-17401-8_15","volume-title":"Progress in Cryptology - INDOCRYPT 2010","author":"C Tezcan","year":"2010","unstructured":"Tezcan, C.: The improbable differential attack: cryptanalysis of reduced round CLEFIA. In: Gong, G., Gupta, K.C. (eds.) INDOCRYPT 2010. LNCS, vol. 6498, pp. 197\u2013209. Springer, Heidelberg (2010)"},{"key":"15_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1007\/978-3-540-71039-4_25","volume-title":"Fast Software Encryption","author":"Y Tsunoo","year":"2008","unstructured":"Tsunoo, Y., Tsujihara, E., Shigeri, M., Saito, T., Suzaki, T., Kubo, H.: Impossible differential cryptanalysis of CLEFIA. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 398\u2013411. Springer, Heidelberg (2008)"},{"key":"15_CR18","unstructured":"Zhao, X., Wang, T., Gao, J.: Multiple bytes differential fault analysis on CLEFIA. IACR Cryptology ePrint Archive, p. 78 (2010)"}],"container-title":["Lecture Notes in Computer Science","Mathematical Aspects of Computer and Information Sciences"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-32859-1_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T20:32:18Z","timestamp":1559421138000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-32859-1_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319328584","9783319328591"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-32859-1_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}