{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T05:23:35Z","timestamp":1741325015983,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642219689"},{"type":"electronic","value":"9783642219696"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21969-6_21","type":"book-chapter","created":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T19:41:28Z","timestamp":1309290088000},"page":"332-347","source":"Crossref","is-referenced-by-count":7,"title":["An Improved Differential Fault Analysis on AES-256"],"prefix":"10.1007","author":[{"given":"Subidh","family":"Ali","sequence":"first","affiliation":[]},{"given":"Debdeep","family":"Mukhopadhyay","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","unstructured":"National Institute of Standards and Technology, Advanced Encryption Standard, NIST FIPS PUB 197 (2001)"},{"key":"21_CR2","unstructured":"Ali, S., Mukhopadhyay, D.: Acceleration of Differential Fault Analysis of the Advanced Encryption Standard Using Single Fault. Cryptology ePrint Archive, Report 2010\/451 (2010), http:\/\/eprint.iacr.org\/"},{"key":"21_CR3","unstructured":"Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The Sorcerers Apprentice Guide to Fault Attacks. Cryptology ePrint Archive, Report 2004\/100 (2004), http:\/\/eprint.iacr.org\/"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Barenghi, A., Bertoni, G., Parrinello, E., Pelosi, G.: Low Voltage Fault Attacks on the RSA Cryptosystem. In: Breveglieri, et al. (eds.) [8], pp. 23\u201331","DOI":"10.1109\/FDTC.2009.30"},{"key":"21_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"E. Biham","year":"1997","unstructured":"Biham, E., Shamir, A.: Differential Fault Analysis of Secret Key Cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 513\u2013525. Springer, Heidelberg (1997)"},{"key":"21_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/978-3-540-45126-6_12","volume-title":"Financial Cryptography","author":"J. Bl\u00f6mer","year":"2003","unstructured":"Bl\u00f6mer, J., Seifert, J.-P.: Fault Based Cryptanalysis of the Advanced Encryption Standard (AES). In: Wright, R.N. (ed.) FC 2003. LNCS, vol.\u00a02742, pp. 162\u2013181. Springer, Heidelberg (2003)"},{"key":"21_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"D. Boneh","year":"1997","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract). In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 37\u201351. Springer, Heidelberg (1997)"},{"volume-title":"Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2009","year":"2009","key":"21_CR8","unstructured":"Breveglieri, L., Gueron, S., Koren, I., Naccache, D., Seifert, J.-P. (eds.): Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2009, Lausanne, Switzerland. IEEE Computer Society, Los Alamitos (September 2009)"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Dusart, P., Letourneux, G., Vivolo, O.: Differential Fault Analysis on A.E.S. Cryptology ePrint Archive, Report 2003\/010 (2003), http:\/\/eprint.iacr.org\/","DOI":"10.1007\/978-3-540-45203-4_23"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Fukunaga, T., Takahashi, J.: Practical Fault Attack on a Cryptographic LSI with ISO\/IEC 18033-3 Block Ciphers. In: Breveglieri, et al. (eds.) [8], pp. 84\u201392","DOI":"10.1109\/FDTC.2009.34"},{"key":"21_CR11","unstructured":"Giraud, C.: DFA on AES. Cryptology ePrint Archive, Report 2003\/008 (2003), http:\/\/eprint.iacr.org\/"},{"key":"21_CR12","unstructured":"Giraud, C., Thillard, A.: Piret and Quisquater\u2019s DFA on AES Revisited. Cryptology ePrint Archive, Report 2010\/440 (2010), http:\/\/eprint.iacr.org\/"},{"key":"21_CR13","unstructured":"Gomisawa, S., Li, Y., Takahashi, J., Fukunaga, T., Sasaki, Y., Sakiyama, K., Ohta, K.: Efficient Differential Fault Analysis for AES. Cryptology ePrint Archive, Report 2010\/336 (2010), http:\/\/eprint.iacr.org\/"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Kim, C.H.: Differential fault analysis against AES-192 and AES-256 with minimal faults. Slides of the presentation at FDTC 2010 (2010), http:\/\/sites.uclouvain.be\/security\/download\/slides\/Kim-2010-fdtc-slides.pdf","DOI":"10.1109\/FDTC.2010.10"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Kim, C.H.: Differential Fault Analysis against AES-192 and AES-256 with Minimal Faults. In: FDTC, pp. 3\u20139 (2010)","DOI":"10.1109\/FDTC.2010.10"},{"key":"21_CR16","unstructured":"Li, Y., Gomisawa, S., Sakiyama, K., Ohta, K.: An Information Theoretic Perspective on the Differential Fault Analysis against AES. Cryptology ePrint Archive, Report 2010\/032 (2010), http:\/\/eprint.iacr.org\/"},{"key":"21_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/11894063_8","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"A. Moradi","year":"2006","unstructured":"Moradi, A., Shalmani, M.T.M., Salmasizadeh, M.: A Generalized Method of Differential Fault Attack Against AES Cryptosystem. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol.\u00a04249, pp. 91\u2013100. Springer, Heidelberg (2006)"},{"key":"21_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/978-3-642-02384-2_26","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2009","author":"D. Mukhopadhyay","year":"2009","unstructured":"Mukhopadhyay, D.: An Improved Fault Based Attack of the Advanced Encryption Standard. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol.\u00a05580, pp. 421\u2013434. Springer, Heidelberg (2009)"},{"key":"21_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-540-45238-6_7","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"G. Piret","year":"2003","unstructured":"Piret, G., Quisquater, J.-J.: A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 77\u201388. Springer, Heidelberg (2003)"},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Takahashi, J., Fukunaga, T.: Differential Fault Analysis on AES with 192 and 256-Bit Keys. Cryptology ePrint Archive, Report 2010\/023 (2010), http:\/\/eprint.iacr.org\/","DOI":"10.1587\/transfun.E93.A.136"},{"key":"21_CR21","doi-asserted-by":"crossref","unstructured":"Tunstall, M., Mukhopadhyay, D.: Differential Fault Analysis of the Advanced Encryption Standard using a Single Fault. Cryptology ePrint Archive, Report 2009\/575 (2009), http:\/\/eprint.iacr.org\/","DOI":"10.1007\/978-3-642-02384-2_26"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 AFRICACRYPT 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21969-6_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T20:08:27Z","timestamp":1741291707000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21969-6_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642219689","9783642219696"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21969-6_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}