{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:07:54Z","timestamp":1725552474781},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642126772"},{"type":"electronic","value":"9783642126789"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12678-9_16","type":"book-chapter","created":{"date-parts":[[2010,4,29]],"date-time":"2010-04-29T11:28:35Z","timestamp":1272540515000},"page":"261-278","source":"Crossref","is-referenced-by-count":17,"title":["Differential Fault Analysis of HC-128"],"prefix":"10.1007","author":[{"given":"Aleksandar","family":"Kircanski","sequence":"first","affiliation":[]},{"given":"Amr M.","family":"Youssef","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"E. Biham","year":"1997","unstructured":"Biham, E., Shamir, A.: Differential Fault Analysis of Secret Key Cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 513\u2013525. Springer, Heidelberg (1997)"},{"key":"16_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"D. Boneh","year":"1997","unstructured":"Boneh, D., Demillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 37\u201351. Springer, Heidelberg (1997)"},{"key":"16_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/978-3-540-45203-4_23","volume-title":"Applied Cryptography and Network Security","author":"P. Dusart","year":"2003","unstructured":"Dusart, P., Letourneux, G., Vivolo, O.: Differential fault analysis on AES. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol.\u00a02846, pp. 293\u2013306. Springer, Heidelberg (2003)"},{"key":"16_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1007\/978-3-540-28632-5_18","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"J. Hoch","year":"2004","unstructured":"Hoch, J., Shamir, A.: Fault Analysis of Stream Ciphers. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 240\u2013253. Springer, Heidelberg (2004)"},{"key":"16_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/978-3-642-05445-7_13","volume-title":"SAC 2009","author":"A. Kircanski","year":"2009","unstructured":"Kircanski, A., Youssef, M.A.: Differential Fault Analysis of Rabbit. In: Rijmen, V. (ed.) SAC 2009. LNCS, vol.\u00a05867, pp. 197\u2013214. Springer, Heidelberg (2009)"},{"key":"16_CR6","unstructured":"Maitra, S., Paul, G., Raizada, S.: Some observations on HC-128. In: Proceedings of the International Workshop on Coding and Cryptography, WCC, Ullensvang, Norway, May 10-15, pp. 527\u2013539 (2009)"},{"key":"16_CR7","unstructured":"Mitzenmacher, M., Upfal, E.: Probability and Computing. Cambridge University Press, Cambridge, ISBN-10: 0521835402"},{"key":"16_CR8","series-title":"Lecture Notes in Computer Science","first-page":"601","volume-title":"Advances in Cryptology - CRYPTO \u201990","author":"O. Staffelbach","year":"1991","unstructured":"Staffelbach, O., Meier, W.: Cryptographic Significance of the Carry for Ciphers Based on Integer Addition. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol.\u00a0537, pp. 601\u2013613. Springer, Heidelberg (1991)"},{"key":"16_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-540-68351-3_4","volume-title":"New Stream Cipher Designs","author":"H. Wu","year":"2008","unstructured":"Wu, H.: The Stream Cipher HC-128. In: Robshaw, M.J.B., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol.\u00a04986, pp. 39\u201347. Springer, Heidelberg (2008)"},{"key":"16_CR10","series-title":"Lecture Notes in Computer Science","first-page":"226","volume-title":"Fast Software Encryption","author":"H. Wu","year":"2004","unstructured":"Wu, H.: A new stream cipher HC-256. In: Roy, K.B., Meier, W. (eds.) FSE 2004. LNCS, vol.\u00a03017, pp. 226\u2013244. Springer, Heidelberg (2004)"},{"key":"16_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1007\/978-3-642-04159-4_13","volume-title":"SAC 2008","author":"E. Zenner","year":"2009","unstructured":"Zenner, E.: A Cache Timing Analysis of HC-256. In: Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol.\u00a05381, pp. 199\u2013213. Springer, Heidelberg (2009)"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 AFRICACRYPT 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12678-9_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T11:44:48Z","timestamp":1619783088000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12678-9_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642126772","9783642126789"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12678-9_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}