{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T02:15:49Z","timestamp":1768011349188,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":33,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819609437","type":"print"},{"value":"9789819609444","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0944-4_6","type":"book-chapter","created":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T05:57:28Z","timestamp":1733896648000},"page":"168-203","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["More Vulnerabilities of\u00a0Linear Structure Sbox-Based Ciphers Reveal Their Inability to\u00a0Resist DFA"],"prefix":"10.1007","author":[{"given":"Amit","family":"Jana","sequence":"first","affiliation":[]},{"given":"Anup Kumar","family":"Kundu","sequence":"additional","affiliation":[]},{"given":"Goutam","family":"Paul","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,12]]},"reference":[{"key":"6_CR1","unstructured":"Attack Verification of DEFAULT and BAKSHEESH. https:\/\/github.com\/anup557\/sdfa"},{"key":"6_CR2","doi-asserted-by":"publisher","unstructured":"Agoyan, M., Dutertre, J., Mirbaha, A., Naccache, D., Ribotta, A., Tria, A.: How to flip a bit? In: 16th IEEE International On-Line Testing Symposium (IOLTS 2010), 5-7 July, 2010, Corfu, Greece. pp. 235\u2013239. IEEE Computer Society (2010), https:\/\/doi.org\/10.1109\/IOLTS.2010.5560194","DOI":"10.1109\/IOLTS.2010.5560194"},{"key":"6_CR3","doi-asserted-by":"publisher","unstructured":"Baksi, A., Bhasin, S., Breier, J., Jap, D., Saha, D.: A survey on fault attacks on symmetric key cryptosystems. ACM Comput. Surv. 55(4), 86:1\u201386:34 (2023). https:\/\/doi.org\/10.1145\/3530054","DOI":"10.1145\/3530054"},{"key":"6_CR4","doi-asserted-by":"publisher","unstructured":"Baksi, A., Bhasin, S., Breier, J., Khairallah, M., Peyrin, T., Sarkar, S., Sim, S.M.: DEFAULT: cipher level resistance against differential fault attack. In: Tibouchi, M., Wang, H. (eds.) Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part II. Lecture Notes in Computer Science, vol. 13091, pp. 124\u2013156. Springer (2021). https:\/\/doi.org\/10.1007\/978-3-030-92075-3_5","DOI":"10.1007\/978-3-030-92075-3_5"},{"key":"6_CR5","unstructured":"Baksi, A., Bhasin, S., Breier, J., Khairallah, M., Peyrin, T., Sarkar, S., Sim, S.M.: DEFAULT: cipher level resistance against differential fault attack. IACR Cryptol. ePrint Arch. p.\u00a0712 (2021), https:\/\/eprint.iacr.org\/archive\/2021\/712\/1622193888.pdf"},{"key":"6_CR6","unstructured":"Baksi, A., Breier, J., Chattopadhyay, A., Gerlich, T., Guilley, S., Gupta, N., Hu, K., Isobe, T., Jati, A., Jedlicka, P., Kim, H., Liu, F., Martinasek, Z., Sakamoto, K., Seo, H., Shiba, R., Shrivastwa, R.R.: BAKSHEESH: similar yet different from GIFT. IACR Cryptol. ePrint Arch. p.\u00a0750 (2023), https:\/\/eprint.iacr.org\/2023\/750"},{"key":"6_CR7","doi-asserted-by":"publisher","unstructured":"Banik, S., Pandey, S.K., Peyrin, T., Sasaki, Y., Sim, S.M., Todo, Y.: GIFT: A small present - towards reaching the limit of lightweight encryption. In: Fischer, W., Homma, N. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings. Lecture Notes in Computer Science, vol. 10529, pp. 321\u2013345. Springer (2017). https:\/\/doi.org\/10.1007\/978-3-319-66787-4_16","DOI":"10.1007\/978-3-319-66787-4_16"},{"key":"6_CR8","doi-asserted-by":"publisher","unstructured":"Barenghi, A., Bertoni, G.M., Breveglieri, L., Pellicioli, M., Pelosi, G.: Fault attack on AES with single-bit induced faults. In: Sixth International Conference on Information Assurance and Security, IAS 2010, Atlanta, GA, USA, August 23-25, 2010. pp. 167\u2013172. IEEE (2010). https:\/\/doi.org\/10.1109\/ISIAS.2010.5604061","DOI":"10.1109\/ISIAS.2010.5604061"},{"key":"6_CR9","doi-asserted-by":"publisher","unstructured":"Beierle, C., Leander, G., Moradi, A., Rasoolzadeh, S.: CRAFT: lightweight tweakable block cipher with efficient protection against DFA attacks. IACR Trans. Symmetric Cryptol. 2019(1), 5\u201345 (2019). https:\/\/doi.org\/10.13154\/tosc.v2019.i1.5-45","DOI":"10.13154\/tosc.v2019.i1.5-45"},{"key":"6_CR10","doi-asserted-by":"publisher","unstructured":"Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Jr., B.S.K. (ed.) Advances in Cryptology - CRYPTO \u201997, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings. Lecture Notes in Computer Science, vol.\u00a01294, pp. 513\u2013525. Springer (1997). https:\/\/doi.org\/10.1007\/BFb0052259","DOI":"10.1007\/BFb0052259"},{"key":"6_CR11","doi-asserted-by":"publisher","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Jr., B.S.K., Ko\u00e7, \u00c7.K., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers. Lecture Notes in Computer Science, vol.\u00a02523, pp. 13\u201328. Springer (2002). https:\/\/doi.org\/10.1007\/3-540-36400-5_3","DOI":"10.1007\/3-540-36400-5_3"},{"key":"6_CR12","unstructured":"Dey, C., Pandey, S.K., Roy, T., Sarkar, S.: Differential fault attack on DEFAULT. IACR Cryptol. ePrint Arch. p.\u00a01392 (2021), https:\/\/eprint.iacr.org\/2021\/1392"},{"key":"6_CR13","doi-asserted-by":"publisher","unstructured":"Dobraunig, C., Eichlseder, M., Gro\u00df, H., Mangard, S., Mendel, F., Primas, R.: Statistical ineffective fault attacks on masked AES with fault countermeasures. In: Peyrin, T., Galbraith, S.D. (eds.) Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II. Lecture Notes in Computer Science, vol. 11273, pp. 315\u2013342. Springer (2018). https:\/\/doi.org\/10.1007\/978-3-030-03329-3_11","DOI":"10.1007\/978-3-030-03329-3_11"},{"key":"6_CR14","doi-asserted-by":"publisher","unstructured":"Dobraunig, C., Eichlseder, M., Korak, T., Mangard, S., Mendel, F., Primas, R.: SIFA: exploiting ineffective fault inductions on symmetric cryptography. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3), 547\u2013572 (2018). https:\/\/doi.org\/10.13154\/tches.v2018.i3.547-572","DOI":"10.13154\/tches.v2018.i3.547-572"},{"key":"6_CR15","doi-asserted-by":"publisher","unstructured":"Dutertre, J., Mirbaha, A., Naccache, D., Ribotta, A., Tria, A., Vaschalde, T.: Fault round modification analysis of the advanced encryption standard. In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2012, San Francisco, CA, USA, June 3-4, 2012. pp. 140\u2013145. IEEE Computer Society (2012). https:\/\/doi.org\/10.1109\/HST.2012.6224334","DOI":"10.1109\/HST.2012.6224334"},{"key":"6_CR16","doi-asserted-by":"publisher","unstructured":"Fuhr, T., Jaulmes, \u00c9., Lomn\u00e9, V., Thillard, A.: Fault attacks on AES with faulty ciphertexts only. In: Fischer, W., Schmidt, J. (eds.) 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, Los Alamitos, CA, USA, August 20, 2013. pp. 108\u2013118. IEEE Computer Society (2013). https:\/\/doi.org\/10.1109\/FDTC.2013.18,","DOI":"10.1109\/FDTC.2013.18"},{"issue":"1\u20132","key":"6_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s41635-022-00124-w","volume":"6","author":"A Jana","year":"2022","unstructured":"Jana, A.: Differential fault attack on feistel-based sponge AE schemes. J. Hardw. Syst. Secur. 6(1-2), 1\u201316 (2022). https:\/\/doi.org\/10.1007\/s41635-022-00124-w","journal-title":"J. Hardw. Syst. Secur."},{"key":"6_CR18","doi-asserted-by":"publisher","unstructured":"Jana, A., Paul, G.: Differential fault attack on photon-beetle. In: Chang, C., R\u00fchrmair, U., Mukhopadhyay, D., Forte, D. (eds.) Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security, ASHES 2022, Los Angeles, CA, USA, 11 November 2022. pp. 25\u201334. ACM (2022). https:\/\/doi.org\/10.1145\/3560834.3563824,","DOI":"10.1145\/3560834.3563824"},{"key":"6_CR19","doi-asserted-by":"publisher","unstructured":"Jana, A., Saha, D., Paul, G.: Differential fault analysis of NORX. In: Chang, C., R\u00fchrmair, U., Katzenbeisser, S., Schaumont, P. (eds.) Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security Workshop, ASHES@CCS 2020, Virtual Event, USA, November 13, 2020. pp. 67\u201379. ACM (2020). https:\/\/doi.org\/10.1145\/3411504.3421213","DOI":"10.1145\/3411504.3421213"},{"key":"6_CR20","doi-asserted-by":"publisher","unstructured":"Kim, Y., Daly, R., Kim, J.S., Fallin, C., Lee, J., Lee, D., Wilkerson, C., Lai, K., Mutlu, O.: Flipping bits in memory without accessing them: An experimental study of DRAM disturbance errors. In: ACM\/IEEE 41st International Symposium on Computer Architecture, ISCA 2014, Minneapolis, MN, USA, June 14-18, 2014. pp. 361\u2013372. IEEE Computer Society (2014). https:\/\/doi.org\/10.1109\/ISCA.2014.6853210,","DOI":"10.1109\/ISCA.2014.6853210"},{"key":"6_CR21","unstructured":"Kundu, A.K., Ghosh, S., Aikata, A., Saha, D.: Tofa: Towards fault analysis of gift and gift-like ciphers leveraging truncated impossible differentials [unpublished manuscript] (2022)"},{"key":"6_CR22","doi-asserted-by":"publisher","unstructured":"Menu, A., Dutertre, J., Rigaud, J., Colombier, B., Mo\u00ebllic, P., Danger, J.: Single-bit laser fault model in NOR flash memories: Analysis and exploitation. In: 17th Workshop on Fault Detection and Tolerance in Cryptography, FDTC 2020, Milan, Italy, September 13, 2020. pp. 41\u201348. IEEE (2020). https:\/\/doi.org\/10.1109\/FDTC51366.2020.00013,","DOI":"10.1109\/FDTC51366.2020.00013"},{"key":"6_CR23","doi-asserted-by":"publisher","unstructured":"Moradi, A., Shalmani, M.T.M., Salmasizadeh, M.: A generalized method of differential fault attack against AES cryptosystem. In: Goubin, L., Matsui, M. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings. Lecture Notes in Computer Science, vol.\u00a04249, pp. 91\u2013100. Springer (2006), https:\/\/doi.org\/10.1007\/11894063_8","DOI":"10.1007\/11894063_8"},{"key":"6_CR24","doi-asserted-by":"publisher","unstructured":"Nageler, M., Dobraunig, C., Eichlseder, M.: Information-combining differential fault attacks on DEFAULT. In: Dunkelman, O., Dziembowski, S. (eds.) Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part III. Lecture Notes in Computer Science, vol. 13277, pp. 168\u2013191. Springer (2022). https:\/\/doi.org\/10.1007\/978-3-031-07082-2_7","DOI":"10.1007\/978-3-031-07082-2_7"},{"key":"6_CR25","doi-asserted-by":"publisher","unstructured":"Piret, G., Quisquater, J.: A differential fault attack technique against SPN structures, with application to the AES and KHAZAD. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings. Lecture Notes in Computer Science, vol.\u00a02779, pp. 77\u201388. Springer (2003), https:\/\/doi.org\/10.1007\/978-3-540-45238-6_7","DOI":"10.1007\/978-3-540-45238-6_7"},{"key":"6_CR26","doi-asserted-by":"publisher","unstructured":"Roscian, C., Sarafianos, A., Dutertre, J., Tria, A.: Fault model analysis of laser-induced faults in SRAM memory cells. In: Fischer, W., Schmidt, J. (eds.) 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, Los Alamitos, CA, USA, August 20, 2013. pp. 89\u201398. IEEE Computer Society (2013). https:\/\/doi.org\/10.1109\/FDTC.2013.17,","DOI":"10.1109\/FDTC.2013.17"},{"key":"6_CR27","doi-asserted-by":"publisher","unstructured":"Saha, D., Chowdhury, D.R.: Scope: On the side channel vulnerability of releasing unverified plaintexts. In: Dunkelman, O., Keliher, L. (eds.) Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers. Lecture Notes in Computer Science, vol.\u00a09566, pp. 417\u2013438. Springer (2015). https:\/\/doi.org\/10.1007\/978-3-319-31301-6_24","DOI":"10.1007\/978-3-319-31301-6_24"},{"key":"6_CR28","doi-asserted-by":"publisher","unstructured":"Saha, D., Chowdhury, D.R.: Encounter: On breaking the nonce barrier in differential fault analysis with a case-study on PAEQ. In: Gierlichs, B., Poschmann, A.Y. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings. Lecture Notes in Computer Science, vol.\u00a09813, pp. 581\u2013601. Springer (2016). https:\/\/doi.org\/10.1007\/978-3-662-53140-2_28","DOI":"10.1007\/978-3-662-53140-2_28"},{"key":"6_CR29","doi-asserted-by":"publisher","unstructured":"Saha, S., Bag, A., Roy, D.B., Patranabis, S., Mukhopadhyay, D.: Fault template attacks on block ciphers exploiting fault propagation. In: Canteaut, A., Ishai, Y. (eds.) Advances in Cryptology - EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part I. Lecture Notes in Computer Science, vol. 12105, pp. 612\u2013643. Springer (2020). https:\/\/doi.org\/10.1007\/978-3-030-45721-1_22","DOI":"10.1007\/978-3-030-45721-1_22"},{"key":"6_CR30","doi-asserted-by":"publisher","unstructured":"Selmke, B., Brummer, S., Heyszl, J., Sigl, G.: Precise laser fault injections into 90 nm and 45 nm sram-cells. In: Homma, N., Medwed, M. (eds.) Smart Card Research and Advanced Applications - 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers. Lecture Notes in Computer Science, vol.\u00a09514, pp. 193\u2013205. Springer (2015). https:\/\/doi.org\/10.1007\/978-3-319-31271-2_12","DOI":"10.1007\/978-3-319-31271-2_12"},{"key":"6_CR31","doi-asserted-by":"publisher","unstructured":"Simon, T., Batina, L., Daemen, J., Grosso, V., Massolino, P.M.C., Papagiannopoulos, K., Regazzoni, F., Samwel, N.: Friet: An authenticated encryption scheme with built-in fault detection. In: Canteaut, A., Ishai, Y. (eds.) Advances in Cryptology - EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part I. Lecture Notes in Computer Science, vol. 12105, pp. 581\u2013611. Springer (2020). https:\/\/doi.org\/10.1007\/978-3-030-45721-1_21","DOI":"10.1007\/978-3-030-45721-1_21"},{"key":"6_CR32","doi-asserted-by":"publisher","unstructured":"Skorobogatov, S.: Optical fault masking attacks. In: Breveglieri, L., Joye, M., Koren, I., Naccache, D., Verbauwhede, I. (eds.) 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2010, Santa Barbara, California, USA, 21 August 2010. pp. 23\u201329. IEEE Computer Society (2010). https:\/\/doi.org\/10.1109\/FDTC.2010.18,","DOI":"10.1109\/FDTC.2010.18"},{"key":"6_CR33","unstructured":"Tunstall, M., Mukhopadhyay, D.: Differential fault analysis of the advanced encryption standard using a single fault. IACR Cryptol. ePrint Arch. p.\u00a0575 (2009), http:\/\/eprint.iacr.org\/2009\/575"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0944-4_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T06:11:51Z","timestamp":1733897511000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0944-4_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,12]]},"ISBN":["9789819609437","9789819609444"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0944-4_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,12]]},"assertion":[{"value":"12 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASIACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Application of Cryptology and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asiacrypt2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asiacrypt.iacr.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}