{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T05:06:00Z","timestamp":1761973560680,"version":"build-2065373602"},"publisher-location":"Berlin, Heidelberg","reference-count":41,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642385186"},{"type":"electronic","value":"9783642385193"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38519-3_2","type":"book-chapter","created":{"date-parts":[[2013,5,2]],"date-time":"2013-05-02T07:59:28Z","timestamp":1367481568000},"page":"10-28","source":"Crossref","is-referenced-by-count":5,"title":["Differential Fault Analysis of Twofish"],"prefix":"10.1007","author":[{"given":"Sk Subidh","family":"Ali","sequence":"first","affiliation":[]},{"given":"Debdeep","family":"Mukhopadhyay","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO 1999","author":"P.C. Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"2_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology - EUROCRYPT 1997","author":"D. Boneh","year":"1997","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract). In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 37\u201351. Springer, Heidelberg (1997)"},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology - CRYPTO 1997","author":"E. Biham","year":"1997","unstructured":"Biham, E., Shamir, A.: Differential Fault Analysis of Secret Key Cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 513\u2013525. Springer, Heidelberg (1997)"},{"key":"2_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/3-540-36400-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S.P. Skorobogatov","year":"2003","unstructured":"Skorobogatov, S.P., Anderson, R.J.: Optical Fault Induction Attacks. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 2\u201312. Springer, Heidelberg (2003)"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/11506447_4","volume-title":"Advanced Encryption Standard \u2013 AES","author":"C. Giraud","year":"2005","unstructured":"Giraud, C.: DFA on AES. In: Dobbertin, H., Rijmen, V., Sowa, A. (eds.) AES 2005. LNCS, vol.\u00a03373, pp. 27\u201341. Springer, Heidelberg (2005)"},{"key":"2_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-540-45238-6_7","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"G. Piret","year":"2003","unstructured":"Piret, G., Quisquater, J.-J.: A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 77\u201388. Springer, Heidelberg (2003)"},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/11894063_8","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"A. Moradi","year":"2006","unstructured":"Moradi, A., Shalmani, M.T.M., Salmasizadeh, M.: A Generalized Method of Differential Fault Attack Against AES Cryptosystem. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol.\u00a04249, pp. 91\u2013100. Springer, Heidelberg (2006)"},{"key":"2_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/978-3-642-02384-2_26","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2009","author":"D. Mukhopadhyay","year":"2009","unstructured":"Mukhopadhyay, D.: An Improved Fault Based Attack of the Advanced Encryption Standard. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol.\u00a05580, pp. 421\u2013434. Springer, Heidelberg (2009)"},{"key":"2_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-642-21040-2_15","volume-title":"Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication","author":"M. Tunstall","year":"2011","unstructured":"Tunstall, M., Mukhopadhyay, D., Ali, S.: Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault. In: Ardagna, C.A., Zhou, J. (eds.) WISTP 2011. LNCS, vol.\u00a06633, pp. 224\u2013233. Springer, Heidelberg (2011)"},{"key":"2_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/978-3-642-27257-8_4","volume-title":"Smart Card Research and Advanced Applications","author":"S.S. Ali","year":"2011","unstructured":"Ali, S.S., Mukhopadhyay, D.: Differential Fault Analysis of AES-128 Key Schedule Using a Single Multi-byte Fault. In: Prouff, E. (ed.) CARDIS 2011. LNCS, vol.\u00a07079, pp. 50\u201364. Springer, Heidelberg (2011)"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Ali, S., Mukhopadhyay, D.: A Differential Fault Analysis on AES Key Schedule Using Single Fault. In: Breveglieri, L., Guilley, S., Koren, I., Naccache, D., Takahashi, J. (eds.) FDTC, pp. 35\u201342. IEEE (2011)","DOI":"10.1109\/FDTC.2011.10"},{"key":"2_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/978-3-642-21969-6_21","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2011","author":"S. Ali","year":"2011","unstructured":"Ali, S., Mukhopadhyay, D.: An improved differential fault analysis on AES-256. In: Nitaj, A., Pointcheval, D. (eds.) AFRICACRYPT 2011. LNCS, vol.\u00a06737, pp. 332\u2013347. Springer, Heidelberg (2011)"},{"key":"2_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/978-3-540-28632-5_19","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"L. Hemme","year":"2004","unstructured":"Hemme, L.: A Differential Fault Attack Against Early Rounds of (Triple-)DES. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 254\u2013267. Springer, Heidelberg (2004)"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1007\/978-3-540-77048-0_22","volume-title":"Information and Communications Security","author":"H. Chen","year":"2007","unstructured":"Chen, H., Wu, W., Feng, D.: Differential Fault Analysis on CLEFIA. In: Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. LNCS, vol.\u00a04861, pp. 284\u2013295. Springer, Heidelberg (2007)"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Takahashi, J., Fukunaga, T.: Improved Differential Fault Analysis on CLEFIA. In: Breveglieri, L., Gueron, S., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC, pp. 25\u201334. IEEE Computer Society (2008)","DOI":"10.1109\/FDTC.2008.14"},{"key":"2_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1007\/978-3-540-79263-5_17","volume-title":"Topics in Cryptology \u2013 CT-RSA 2008","author":"C. Clavier","year":"2008","unstructured":"Clavier, C., Gierlichs, B., Verbauwhede, I.: Fault Analysis Study of IDEA. In: Malkin, T. (ed.) CT-RSA 2008. LNCS, vol.\u00a04964, pp. 274\u2013287. Springer, Heidelberg (2008)"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Trichina, E., Korkikyan, R.: Multi Fault Laser Attacks on Protected CRT-RSA. In: Breveglieri, et al. (eds.) [40], pp. 75\u201386","DOI":"10.1109\/FDTC.2010.14"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Coron, J.-S., Giraud, C., Morin, N., Piret, G., Vigilant, D.: Fault Attacks and Countermeasures on Vigilant\u2019s RSA-CRT Algorithm. In: Breveglieri, et al. (eds.) [40], pp. 89\u201396","DOI":"10.1109\/FDTC.2010.9"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Pellegrini, A., Bertacco, V., Austin, T.M.: Fault-based attack of RSA authentication. In: DATE, pp. 855\u2013860. IEEE (2010)","DOI":"10.1109\/DATE.2010.5456933"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Fukunaga, T., Takahashi, J.: Practical Fault Attack on a Cryptographic LSI with ISO\/IEC 18033-3 Block Ciphers. In: Breveglieri, et al. (eds.) [41], pp. 84\u201392","DOI":"10.1109\/FDTC.2009.34"},{"key":"2_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/978-3-642-12510-2_13","volume-title":"Smart Card Research and Advanced Application","author":"M. Agoyan","year":"2010","unstructured":"Agoyan, M., Dutertre, J.-M., Naccache, D., Robisson, B., Tria, A.: When Clocks Fail: On Critical Paths and Clock Faults. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol.\u00a06035, pp. 182\u2013193. Springer, Heidelberg (2010)"},{"issue":"2","key":"2_CR22","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/s00145-010-9083-9","volume":"24","author":"G. Canivet","year":"2011","unstructured":"Canivet, G., Maistri, P., Leveugle, R., Cl\u00e9di\u00e8re, J., Valette, F., Renaudin, M.: Glitch and Laser Fault Attacks onto a Secure AES Implementation on a SRAM-Based FPGA. J. Cryptology\u00a024(2), 247\u2013268 (2011)","journal-title":"J. Cryptology"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Barenghi, A., Bertoni, G., Parrinello, E., Pelosi, G.: Low Voltage Fault Attacks on the RSA Cryptosystem. In: Breveglieri, et al. (eds.) [41], pp. 23\u201331","DOI":"10.1109\/FDTC.2009.30"},{"key":"2_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-642-25286-0_4","volume-title":"RFID. Security and Privacy","author":"A. Barenghi","year":"2012","unstructured":"Barenghi, A., Hocquet, C., Bol, D., Standaert, F.-X., Regazzoni, F., Koren, I.: Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-threshold Devices through an Example of a 65nm AES Implementation. In: Juels, A., Paar, C. (eds.) RFIDSec 2011. LNCS, vol.\u00a07055, pp. 48\u201360. Springer, Heidelberg (2012)"},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Agoyan, M., Dutertre, J.-M., Mirbaha, A.-P., Naccache, D., Ribotta, A.-L., Tria, A.: How to flip a bit? In: IOLTS, pp. 235\u2013239. IEEE (2010)","DOI":"10.1109\/IOLTS.2010.5560194"},{"key":"2_CR26","unstructured":"Quisquater, J.-J., Samyde, D.: Eddy current for Magnetic Analysis with Active Sensor. Springer (2002)"},{"key":"2_CR27","unstructured":"Schneier, B., Kelsey, J., Whiting, D., Wagner, D., Hall, C.: Twofish: A 128-Bit Block Cipher, http:\/\/www.schneier.com\/paper-twofish-paper.pdf"},{"key":"2_CR28","unstructured":"http:\/\/www.schneier.com\/twofish-products.html"},{"key":"2_CR29","unstructured":"Ferguson, N.: Impossible Differentials in Twofish. Twofish Technical Report 5 (October 5, 1999), http:\/\/www.schneier.com\/paper-twofish-impossible.pdf"},{"key":"2_CR30","unstructured":"Lucks, S.: The Saturation Attack - a Bait for Twofish. Cryptology ePrint Archive, Report 2000\/046 (2000), http:\/\/eprint.iacr.org\/"},{"key":"2_CR31","unstructured":"Murphy, S., Robshaw, M.J.B.: Differential Cryptanalysis, Key-dependent S-boxes, and Twofish (2000), http:\/\/csrc.nist.gov\/encryption\/aes\/round2\/comments\/20000515-smurphy.pdf"},{"key":"2_CR32","unstructured":"Moriai, S., Yin, Y.L.: Cryptanalysis of Twofish (II) (2011)"},{"key":"2_CR33","doi-asserted-by":"crossref","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael: AES - The Advanced Encryption Standard. Springer (2002)","DOI":"10.1007\/978-3-662-04722-4"},{"key":"2_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/BFb0034838","volume-title":"Advances in Cryptology - ASIACRYPT \u201996","author":"K. Nyberg","year":"1996","unstructured":"Nyberg, K.: Generalized Feistel Networks. In: Kim, K., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol.\u00a01163, pp. 91\u2013104. Springer, Heidelberg (1996)"},{"key":"2_CR35","doi-asserted-by":"crossref","unstructured":"Saha, D., Mukhopadhyay, D., RoyChowdhury, D.: A Diagonal Fault Attack on the Advanced Encryption Standard. Cryptology ePrint Archive, Report 2009\/581 (2009), http:\/\/eprint.iacr.org\/","DOI":"10.1007\/978-3-642-02384-2_26"},{"key":"2_CR36","doi-asserted-by":"crossref","unstructured":"Bhasin, S., Danger, J.-L., Guilley, S., Selmane, N.: Security Evaluation of Different AES Implementations Against Practical Setup Time Violation Attacks in FPGAs. In: Tehranipoor, M., Plusquellic, J. (eds.) HOST, pp. 15\u201321. IEEE Computer Society (2009)","DOI":"10.1109\/HST.2009.5225057"},{"key":"2_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/3-540-45473-X_28","volume-title":"Fast Software Encryption","author":"H. Lipmaa","year":"2002","unstructured":"Lipmaa, H., Moriai, S.: Efficient Algorithms for Computing Differential Properties of Addition. In: Matsui, M. (ed.) FSE 2001. LNCS, vol.\u00a02355, pp. 336\u2013350. Springer, Heidelberg (2002)"},{"key":"2_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/3-540-36231-2_5","volume-title":"Progress in Cryptology - INDOCRYPT 2002","author":"H. Lipmaa","year":"2002","unstructured":"Lipmaa, H.: On Differential Properties of Pseudo-Hadamard Transform and Related Mappings (Extended Abstract). In: Menezes, A., Sarkar, P. (eds.) INDOCRYPT 2002. LNCS, vol.\u00a02551, pp. 48\u201361. Springer, Heidelberg (2002)"},{"key":"2_CR39","unstructured":"Mukhopadhyay, D.: Design and Analysis of Cellular Automata Based Cryptographic Algorithms. IACR Ph.D database (2006), http:\/\/www.iacr.org\/phds\/?p=detail&entry=609"},{"key":"2_CR40","unstructured":"Breveglieri, L., Joye, M., Koren, I., Naccache, D., Verbauwhede, I. (eds.): 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2010, Santa Barbara, California, USA, August 21. IEEE Computer Society (2010)"},{"key":"2_CR41","unstructured":"Breveglieri, L., Gueron, S., Koren, I., Naccache, D., Seifert, J.-P. (eds.): Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2009, Lausanne, Switzerland, September 6. IEEE Computer Society (2009)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38519-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T07:58:00Z","timestamp":1745999880000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38519-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642385186","9783642385193"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38519-3_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}