{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:56:33Z","timestamp":1771700193109,"version":"3.50.1"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319494449","type":"print"},{"value":"9783319494456","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49445-6_4","type":"book-chapter","created":{"date-parts":[[2016,11,17]],"date-time":"2016-11-17T07:50:31Z","timestamp":1479369031000},"page":"66-86","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Fault Based Almost Universal Forgeries on CLOC and SILC"],"prefix":"10.1007","author":[{"given":"Debapriya Basu","family":"Roy","sequence":"first","affiliation":[]},{"given":"Avik","family":"Chakraborti","sequence":"additional","affiliation":[]},{"given":"Donghoon","family":"Chang","sequence":"additional","affiliation":[]},{"given":"S. V. Dilip","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Debdeep","family":"Mukhopadhyay","sequence":"additional","affiliation":[]},{"given":"Mridul","family":"Nandi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,18]]},"reference":[{"key":"4_CR1","unstructured":"\u2014 (no editor), CAESAR Competition. \n                      http:\/\/competitions.cr.yp.to\/caesar.html"},{"key":"4_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-3-642-40349-1_13","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2013","author":"S Banik","year":"2013","unstructured":"Banik, S., Maitra, S.: A differential fault attack on MICKEY 2.0. In: Bertoni, G., Coron, J.-S. (eds.) CHES 2013. LNCS, vol. 8086, pp. 215\u2013232. Springer, Heidelberg (2013). doi:\n                      10.1007\/978-3-642-40349-1_13"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-642-33027-8_8","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2012","author":"S Banik","year":"2012","unstructured":"Banik, S., Maitra, S., Sarkar, S.: A differential fault attack on the grain family of stream ciphers. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol. 7428, pp. 122\u2013139. Springer, Heidelberg (2012). doi:\n                      10.1007\/978-3-642-33027-8_8"},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-642-34931-7_12","volume-title":"Progress in Cryptology - INDOCRYPT 2012","author":"S Banik","year":"2012","unstructured":"Banik, S., Maitra, S., Sarkar, S.: A differential fault attack on the grain family under reasonable assumptions. In: Galbraith, S., Nandi, M. (eds.) INDOCRYPT 2012. LNCS, vol. 7668, pp. 191\u2013208. Springer, Heidelberg (2012). doi:\n                      10.1007\/978-3-642-34931-7_12"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-540-25937-4_25","volume-title":"Fast Software Encryption","author":"M Bellare","year":"2004","unstructured":"Bellare, M., Rogaway, P., Wagner, D.: The EAX mode of operation. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 389\u2013407. Springer, Heidelberg (2004). doi:\n                      10.1007\/978-3-540-25937-4_25"},{"key":"4_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201997","author":"E Biham","year":"1997","unstructured":"Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513\u2013525. Springer, Heidelberg (1997). doi:\n                      10.1007\/BFb0052259"},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/11502760_24","volume-title":"Fast Software Encryption","author":"E Biham","year":"2005","unstructured":"Biham, E., Granboulan, L., Nguyen, P.Q.: Impossible fault analysis of RC4 and differential fault analysis of RC4. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 359\u2013367. Springer, Heidelberg (2005). doi:\n                      10.1007\/11502760_24"},{"key":"4_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"A Bogdanov","year":"2007","unstructured":"Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450\u2013466. Springer, Heidelberg (2007). doi:\n                      10.1007\/978-3-540-74735-2_31"},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201997","author":"D Boneh","year":"1997","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37\u201351. Springer, Heidelberg (1997). doi:\n                      10.1007\/3-540-69053-0_4"},{"key":"4_CR10","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the. Journal of Cryptography. 2001, 101\u2013119 (2001)"},{"key":"4_CR11","unstructured":"Daemen, J., Rijmen, V.: Rijndael for AES. In: AES Candidate Conference, pp. 343\u2013348 (2000)"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Daemen, J., Rijmen, V.: The design of Rijndael: AES - the advanced encryption standard. In: Information Security and Cryptography, Springer, Heidelberg (2002)","DOI":"10.1007\/978-3-662-04722-4"},{"key":"4_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/978-3-540-45203-4_23","volume-title":"Applied Cryptography and Network Security","author":"P Dusart","year":"2003","unstructured":"Dusart, P., Letourneux, G., Vivolo, O.: Differential fault analysis on A.E.S. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol. 2846, pp. 293\u2013306. Springer, Heidelberg (2003). doi:\n                      10.1007\/978-3-540-45203-4_23"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Dworkin, M.: Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality (2004). NIST Special, Publication, 800-38C (2004)","DOI":"10.6028\/NIST.SP.800-38b-2005"},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-642-23951-9_22","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"J Guo","year":"2011","unstructured":"Guo, J., Peyrin, T., Poschmann, A., Robshaw, M.: The LED block cipher. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 326\u2013341. Springer, Heidelberg (2011). doi:\n                      10.1007\/978-3-642-23951-9_22"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Hemme, L., Hoffman, L., Lee, C.: Differential Fault Analysis on the SHA1 Compression Function. In: FDTC 2011, pp. 54\u201362, 11 (2011)","DOI":"10.1109\/FDTC.2011.16"},{"key":"4_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1007\/978-3-540-28632-5_18","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"JJ Hoch","year":"2004","unstructured":"Hoch, J.J., Shamir, A.: Fault analysis of stream ciphers. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 240\u2013253. Springer, Heidelberg (2004). doi:\n                      10.1007\/978-3-540-28632-5_18"},{"key":"4_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-3-540-89754-5_19","volume-title":"Progress in Cryptology - INDOCRYPT 2008","author":"M Hojs\u00edk","year":"2008","unstructured":"Hojs\u00edk, M., Rudolf, B.: Floating fault analysis of trivium. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 239\u2013250. Springer, Heidelberg (2008). doi:\n                      10.1007\/978-3-540-89754-5_19"},{"key":"4_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-540-71039-4_10","volume-title":"Fast Software Encryption","author":"M Hojs\u00edk","year":"2008","unstructured":"Hojs\u00edk, M., Rudolf, B.: Differential fault analysis of trivium. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 158\u2013172. Springer, Heidelberg (2008). doi:\n                      10.1007\/978-3-540-71039-4_10"},{"key":"4_CR20","unstructured":"Iwata, T., Minematsu, K., Guo, J., Morioka, S., Kobayashi, E.: Re: Fault Based Forgery on CLOC and SILC. \n                      https:\/\/groups.google.com\/forum\/#!topic\/crypto-competitions\/_qxORmqcSrY"},{"key":"4_CR21","unstructured":"Iwata, T., Minematsu, K., Guo, J., Morioka, S., Kobayashi, E.: SILC: SImple Lightweight CFB (2014). \n                      http:\/\/competitions.cr.yp.to\/round1\/silcv1.pdf"},{"key":"4_CR22","unstructured":"Iwata, T., Minematsu, K., Guo, J., Morioka, S., Kobayashi, E.: CLOC: Compact Low- Overhead CFB (2014). \n                      http:\/\/competitions.cr.yp.to\/round1\/clocv1.pdf"},{"key":"4_CR23","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1007\/978-94-007-4516-2_79","volume-title":"Future Information Technology, Application, and Service","author":"K Jeong","year":"2012","unstructured":"Jeong, K., Lee, C.: Differential fault analysis on block cipher LED-64. In: Park, J.J., Leung, V.C.M., Wang, C.-L., Shon, T. (eds.) Future Information Technology, Application, and Service. LNEE, vol. 164, pp. 747\u2013755. Springer, Heidelberg (2012). doi:\n                      10.1007\/978-94-007-4516-2_79"},{"key":"4_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1007\/978-3-642-29912-4_10","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"P Jovanovic","year":"2012","unstructured":"Jovanovic, P., Kreuzer, M., Polian, I.: A fault attack on the LED block cipher. In: Schindler, W., Huss, S.A. (eds.) COSADE 2012. LNCS, vol. 7275, pp. 120\u2013134. Springer, Heidelberg (2012). doi:\n                      10.1007\/978-3-642-29912-4_10"},{"key":"4_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/978-3-642-41227-1_11","volume-title":"Provable Security","author":"K Minematsu","year":"2013","unstructured":"Minematsu, K., Lucks, S., Iwata, T.: Improved authenticity bound of EAX, and refinements. In: Susilo, W., Reyhanitabar, R. (eds.) ProvSec 2013. LNCS, vol. 8209, pp. 184\u2013201. Springer, Heidelberg (2013). doi:\n                      10.1007\/978-3-642-41227-1_11"},{"key":"4_CR26","unstructured":"Moise, A., Beroset, E., Phinney, T., Burns, M.: EAX0 Cipher Mode. NIST Submission, 2011: Technique against SPN Structures, with Application to the AES and KHAZAD(2011). \n                      http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/BCM\/documents\/proposedmodes\/eax-prime\/eax-prime-spec.pdf"},{"key":"4_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-540-45238-6_7","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"G Piret","year":"2003","unstructured":"Piret, G., Quisquater, J.-J.: A differential fault attack technique against SPN structures, with application to the AES and Khazad. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 77\u201388. Springer, Heidelberg (2003). doi:\n                      10.1007\/978-3-540-45238-6_7"},{"key":"4_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-319-13039-2_12","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2014","author":"D Saha","year":"2014","unstructured":"Saha, D., Kuila, S., Roy Chowdhury, D.: EscApe: diagonal fault analysis of APE. In: Meier, W., Mukhopadhyay, D. (eds.) INDOCRYPT 2014. LNCS, vol. 8885, pp. 197\u2013216. Springer, Heidelberg (2014). doi:\n                      10.1007\/978-3-319-13039-2_12"},{"key":"4_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/978-3-642-35999-6_22","volume-title":"Selected Areas in Cryptography","author":"T Suzaki","year":"2013","unstructured":"Suzaki, T., Minematsu, K., Morioka, S., Kobayashi, E.: \n                      \n                        \n                      \n                      $$\\mathit{TWINE}$$\n                    : a lightweight block cipher for multiple platforms. In: Knudsen, L.R., Wu, H. (eds.) SAC 2012. LNCS, vol. 7707, pp. 339\u2013354. Springer, Heidelberg (2013). doi:\n                      10.1007\/978-3-642-35999-6_22"},{"key":"4_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-642-21040-2_15","volume-title":"Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication","author":"M Tunstall","year":"2011","unstructured":"Tunstall, M., Mukhopadhyay, D., Ali, S.: Differential fault analysis of the advanced encryption standard using a single fault. In: Ardagna, C.A., Zhou, J. (eds.) WISTP 2011. LNCS, vol. 6633, pp. 224\u2013233. Springer, Heidelberg (2011). doi:\n                      10.1007\/978-3-642-21040-2_15"},{"key":"4_CR31","unstructured":"Whiting, D., Houeley, R., Ferguson, N.: Counter with CBC-MAC, Submission to NIST: (2002). \n                      http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/BCM\/modesdevelopment.html"},{"key":"4_CR32","unstructured":"Agoyan, M., Dutertre, J.-M., Mirbaha, A.-P., Tria, A.: How to Flip a Bit?, On-Line Testing Symposium (IOLTS). In: 2010 IEEE 16th International, 2010 (2010)"},{"key":"4_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/978-3-540-45238-6_12","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"JJA Fournier","year":"2003","unstructured":"Fournier, J.J.A., Moore, S., Li, H., Mullins, R., Taylor, G.: Security evaluation of asynchronous circuits. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 137\u2013151. Springer, Heidelberg (2003). doi:\n                      10.1007\/978-3-540-45238-6_12"},{"key":"4_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/3-540-36400-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"SP Skorobogatov","year":"2003","unstructured":"Skorobogatov, S.P., Anderson, R.J.: Optical fault induction attacks. In: Kaliski, B.S., Ko\u00e7, K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 2\u201312. Springer, Heidelberg (2003). doi:\n                      10.1007\/3-540-36400-5_2"},{"key":"4_CR35","doi-asserted-by":"crossref","unstructured":"Skorobogatov, S.: Local heating attacks on flash memory devices. In: IEEE International Workshop on Hardware-Oriented Security and Trust, 2009 (2009)","DOI":"10.1109\/HST.2009.5225028"},{"key":"4_CR36","doi-asserted-by":"crossref","unstructured":"Dehbaoui, A., Dutertre, J.-M., Robisson, B., Tria, A.: Electromagnetic Transient Faults Injection on a Hardware and a Software Implementations of AES. Fault Diagnosis and Tolerance, 2012 (2012)","DOI":"10.1109\/FDTC.2012.15"},{"key":"4_CR37","unstructured":"\u2014 (no editor). \n                      http:\/\/satoh.cs.uec.ac.jp\/SAKURA\/hardware\/SAKURA-G_Spec_Ver1.0_English.pdf"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Applied Cryptography Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49445-6_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T01:26:14Z","timestamp":1558315574000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49445-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319494449","9783319494456"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49445-6_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"18 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPACE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy, and Applied Cryptography Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hyderabad","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"space2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}