{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T01:04:28Z","timestamp":1765933468887,"version":"3.48.0"},"publisher-location":"Singapore","reference-count":55,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819987290"},{"type":"electronic","value":"9789819987306"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-8730-6_10","type":"book-chapter","created":{"date-parts":[[2023,12,17]],"date-time":"2023-12-17T07:02:04Z","timestamp":1702796524000},"page":"302-336","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Quantitative Fault Injection Analysis"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9797-1257","authenticated-orcid":false,"given":"Jakob","family":"Feldtkeller","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3293-4989","authenticated-orcid":false,"given":"Tim","family":"G\u00fcneysu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4586-5476","authenticated-orcid":false,"given":"Patrick","family":"Schaumont","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,18]]},"reference":[{"key":"10_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/978-3-642-12510-2_13","volume-title":"Smart Card Research and Advanced Application","author":"M Agoyan","year":"2010","unstructured":"Agoyan, M., Dutertre, J.-M., Naccache, D., Robisson, B., Tria, A.: When clocks fail: on critical paths and clock faults. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol. 6035, pp. 182\u2013193. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-12510-2_13"},{"issue":"6","key":"10_CR2","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1109\/TC.1978.1675141","volume":"27","author":"SB Akers","year":"1978","unstructured":"Akers, S.B.: Binary decision diagrams. IEEE Trans. Computers 27(6), 509\u2013516 (1978)","journal-title":"IEEE Trans. Computers"},{"key":"10_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96131-6","volume-title":"The Science of Quantitative Information Flow. Information Security and Cryptography","author":"MS Alvim","year":"2020","unstructured":"Alvim, M.S., Chatzikokolakis, K., McIver, A., Morgan, C., Palamidessi, C., Smith, G.: The Science of Quantitative Information Flow. Information Security and Cryptography. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-319-96131-6"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Arribas, V., Wegener, F., Moradi, A., Nikova, S.: Cryptographic fault diagnosis using VerFI. In: HOST 2020, pp. 229\u2013240. IEEE (2020)","DOI":"10.1109\/HOST45689.2020.9300264"},{"key":"10_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1007\/978-3-030-92075-3_5","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2021","author":"A Baksi","year":"2021","unstructured":"Baksi, A., et al.: DEFAULT: cipher level resistance against differential fault attack. In: Tibouchi, M., Wang, H. (eds.) ASIACRYPT 2021, Part II. LNCS, vol. 13091, pp. 124\u2013156. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-92075-3_5"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-030-42068-0_11","volume-title":"Smart Card Research and Advanced Applications","author":"A Beckers","year":"2020","unstructured":"Beckers, A., et al.: Design considerations for EM pulse fault\u00a0injection. In: Bela\u00efd, S., G\u00fcneysu, T. (eds.) CARDIS 2019. LNCS, vol. 11833, pp. 176\u2013192. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-42068-0_11"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/978-3-642-38348-9_19","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2013","author":"G Bertoni","year":"2013","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Keccak. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 313\u2013314. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38348-9_19"},{"key":"10_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/11502760_24","volume-title":"Fast Software Encryption","author":"E Biham","year":"2005","unstructured":"Biham, E., Granboulan, L., Nguyen, P.Q.: Impossible fault analysis of RC4 and differential fault analysis of RC4. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 359\u2013367. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11502760_24"},{"key":"10_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201997","author":"E Biham","year":"1997","unstructured":"Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513\u2013525. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/BFb0052259"},{"key":"10_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/11889700_11","volume-title":"Fault Diagnosis and Tolerance in Cryptography","author":"J Bl\u00f6mer","year":"2006","unstructured":"Bl\u00f6mer, J., Krummel, V.: Fault based collision attacks on AES. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2006. LNCS, vol. 4236, pp. 106\u2013120. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11889700_11"},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"A Bogdanov","year":"2007","unstructured":"Bogdanov, A., et al.: PRESENT: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450\u2013466. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74735-2_31"},{"key":"10_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201997","author":"D Boneh","year":"1997","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37\u201351. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/3-540-69053-0_4"},{"issue":"8","key":"10_CR13","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1109\/TC.1986.1676819","volume":"35","author":"RE Bryant","year":"1986","unstructured":"Bryant, R.E.: Graph-based algorithms for Boolean function manipulation. IEEE Trans. Computers 35(8), 677\u2013691 (1986)","journal-title":"IEEE Trans. Computers"},{"issue":"10","key":"10_CR14","doi-asserted-by":"publisher","first-page":"1677","DOI":"10.1109\/TC.2020.3022979","volume":"70","author":"G Cassiers","year":"2021","unstructured":"Cassiers, G., Gr\u00e9goire, B., Levi, I., Standaert, F.: Hardware private circuits: from trivial composition to full verification. IEEE Trans. Computers 70(10), 1677\u20131690 (2021)","journal-title":"IEEE Trans. Computers"},{"key":"10_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1007\/3-540-48405-1_26","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"S Chari","year":"1999","unstructured":"Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards sound approaches to counteract power-analysis attacks. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 398\u2013412. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_26"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Clark, D., Hunt, S., Malacaria, P.: Quantitative analysis of the leakage of confidential data. In: Workshop on Quantitative Aspects of Programming Laguages, QAPL 2001, Satellite Event of PLI 2001, Firenze, Italy, 7 September 2001, pp. 238\u2013251 (2001)","DOI":"10.1016\/S1571-0661(04)00290-7"},{"issue":"3","key":"10_CR17","doi-asserted-by":"publisher","first-page":"321","DOI":"10.3233\/JCS-2007-15302","volume":"15","author":"D Clark","year":"2007","unstructured":"Clark, D., Hunt, S., Malacaria, P.: A static analysis for quantifying information flow in a simple imperative language. J. Comput. Secur. 15(3), 321\u2013371 (2007)","journal-title":"J. Comput. Secur."},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Cnudde, T.D., Nikova, S.: More efficient private circuits II through threshold implementations. In: FDTC 2016, pp. 114\u2013124. IEEE Computer Society (2016)","DOI":"10.1109\/FDTC.2016.15"},{"key":"10_CR19","unstructured":"Courtois, N., Jackson, K., Ware, D.: Fault-algebraic attacks on inner rounds of DES. In: E-Smart 2010 Proceedings: The Future of Digital Security Technologies. Strategies Telecom and Multimedia (2010)"},{"issue":"3","key":"10_CR20","doi-asserted-by":"publisher","first-page":"508","DOI":"10.46586\/tches.v2020.i3.508-543","volume":"2020","author":"J Daemen","year":"2020","unstructured":"Daemen, J., Dobraunig, C., Eichlseder, M., Gro\u00df, H., Mendel, F., Primas, R.: Protecting against statistical ineffective fault attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3), 508\u2013543 (2020)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"issue":"4","key":"10_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.46586\/tosc.v2018.i4.1-38","volume":"2018","author":"J Daemen","year":"2018","unstructured":"Daemen, J., Hoffert, S., Assche, G.V., Keer, R.V.: The design of Xoodoo and Xoofff. IACR Trans. Symmetric Cryptol. 2018(4), 1\u201338 (2018)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"10_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-030-40186-3_3","volume-title":"Topics in Cryptology \u2013 CT-RSA 2020","author":"S Dhooghe","year":"2020","unstructured":"Dhooghe, S., Nikova, S.: My gadget just cares for me - how NINA can prove security against combined attacks. In: Jarecki, S. (ed.) CT-RSA 2020. LNCS, vol. 12006, pp. 35\u201355. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-40186-3_3"},{"issue":"3","key":"10_CR23","doi-asserted-by":"publisher","first-page":"547","DOI":"10.46586\/tches.v2018.i3.547-572","volume":"2018","author":"C Dobraunig","year":"2018","unstructured":"Dobraunig, C., Eichlseder, M., Korak, T., Mangard, S., Mendel, F., Primas, R.: SIFA: exploiting ineffective fault inductions on symmetric cryptography. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3), 547\u2013572 (2018)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"issue":"3","key":"10_CR24","doi-asserted-by":"publisher","first-page":"89","DOI":"10.46586\/tches.v2018.i3.89-120","volume":"2018","author":"S Faust","year":"2018","unstructured":"Faust, S., Grosso, V., Pozo, S.M.D., Paglialonga, C., Standaert, F.: Composable masking schemes in the presence of physical defaults & the robust probing model. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3), 89\u2013120 (2018)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Feldtkeller, J., Richter-Brockmann, J., Sasdrich, P., G\u00fcneysu, T.: CINI MINIS: domain isolation for fault and combined security, pp. 1023\u20131036. ACM CCS (2022)","DOI":"10.1145\/3548606.3560614"},{"key":"10_CR26","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1109\/TIFS.2019.2903653","volume":"15","author":"J Feng","year":"2020","unstructured":"Feng, J., Chen, H., Li, Y., Jiao, Z., Xi, W.: A framework for evaluation and analysis on infection countermeasures against fault attacks. IEEE Trans. Inf. Forensics Secur. 15, 391\u2013406 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-44709-1_21","volume-title":"Cryptographic Hardware and Embedded Systems \u2014 CHES 2001","author":"K Gandolfi","year":"2001","unstructured":"Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: concrete results. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 251\u2013261. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44709-1_21"},{"key":"10_CR28","doi-asserted-by":"crossref","unstructured":"Gnad, D.R.E., Oboril, F., Tahoori, M.B.: Voltage drop-based fault attacks on FPGAs using valid bitstreams. In: 27th International Conference on Field Programmable Logic and Applications, FPL 2017, Ghent, Belgium, 4\u20138 September 2017, pp. 1\u20137 (2017)","DOI":"10.23919\/FPL.2017.8056840"},{"key":"10_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/978-3-319-40667-1_15","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"D Gruss","year":"2016","unstructured":"Gruss, D., Maurice, C., Mangard, S.: Rowhammer.js: a remote software-induced fault attack in JavaScript. In: Caballero, J., Zurutuza, U., Rodr\u00edguez, R.J. (eds.) DIMVA 2016. LNCS, vol. 9721, pp. 300\u2013321. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-40667-1_15"},{"key":"10_CR30","doi-asserted-by":"crossref","unstructured":"Guo, X., Dutta, R.G., He, J., Tehranipoor, M.M., Jin, Y.: QIF-Verilog: quantitative information-flow based hardware description languages for pre-silicon security assessment. In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2019, McLean, VA, USA, 5\u201310 May 2019, pp. 91\u2013100 (2019)","DOI":"10.1109\/HST.2019.8740840"},{"key":"10_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/978-3-030-88885-5_17","volume-title":"Automated Technology for Verification and Analysis","author":"V Had\u017ei\u0107","year":"2021","unstructured":"Had\u017ei\u0107, V., Primas, R., Bloem, R.: Proving SIFA protection of masked redundant circuits. In: Hou, Z., Ganesh, V. (eds.) ATVA 2021. LNCS, vol. 12971, pp. 249\u2013265. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-88885-5_17"},{"issue":"2","key":"10_CR32","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1080\/03610919008812866","volume":"19","author":"M Hutchinson","year":"1990","unstructured":"Hutchinson, M.: A stochastic estimator of the trace of the influence matrix for Laplacian smoothing splines. Commun. Stat. Simul. Comput. 19(2), 433\u2013450 (1990)","journal-title":"Commun. Stat. Simul. Comput."},{"key":"10_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1007\/978-3-540-45146-4_27","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"Y Ishai","year":"2003","unstructured":"Ishai, Y., Sahai, A., Wagner, D.: Private Circuits: Securing Hardware against Probing Attacks. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 463\u2013481. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45146-4_27"},{"key":"10_CR34","doi-asserted-by":"crossref","unstructured":"Khanna, P., Rebeiro, C., Hazra, A.: XFC: a framework for eXploitable fault characterization in block ciphers. In: Proceedings of the 54th Annual Design Automation Conference, DAC 2017, Austin, TX, USA, 18\u201322 June 2017, pp. 8:1\u20138:6 (2017)","DOI":"10.1145\/3061639.3062340"},{"key":"10_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201996","author":"PC Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104\u2013113. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-68697-5_9"},{"key":"10_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_25"},{"key":"10_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/978-3-642-15031-9_22","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"Y Li","year":"2010","unstructured":"Li, Y., Sakiyama, K., Gomisawa, S., Fukunaga, T., Takahashi, J., Ohta, K.: Fault sensitivity analysis. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 320\u2013334. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15031-9_22"},{"key":"10_CR38","doi-asserted-by":"publisher","first-page":"141920","DOI":"10.1109\/ACCESS.2019.2944024","volume":"7","author":"Q Liu","year":"2019","unstructured":"Liu, Q., Ning, B., Deng, P.: Information theory-based quantitative evaluation method for countermeasures against fault injection attacks. IEEE Access 7, 141920\u2013141928 (2019)","journal-title":"IEEE Access"},{"key":"10_CR39","doi-asserted-by":"crossref","unstructured":"Mao, B., Hu, W., Althoff, A., Matai, J., Oberg, J., Mu, D., Sherwood, T., Kastner, R.: Quantifying timing-based information flow in cryptographic hardware. In: Proceedings of the IEEE\/ACM International Conference on Computer-Aided Design, ICCAD 2015, Austin, TX, USA, 2\u20136 November 2015, pp. 552\u2013559 (2015)","DOI":"10.1109\/ICCAD.2015.7372618"},{"issue":"1","key":"10_CR40","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s41635-017-0006-1","volume":"1","author":"S Patranabis","year":"2017","unstructured":"Patranabis, S., Chakraborty, A., Mukhopadhyay, D.: Fault Tolerant Infective Countermeasure for AES. J. Hardw. Syst. Secur. 1(1), 3\u201317 (2017)","journal-title":"J. Hardw. Syst. Secur."},{"key":"10_CR41","doi-asserted-by":"crossref","unstructured":"Reimann, L.M., Hanel, L., Sisejkovic, D., Merchant, F., Leupers, R.: QFlow: quantitative information flow for security-aware hardware design in verilog. In: 39th IEEE International Conference on Computer Design, ICCD 2021, Storrs, CT, USA, 24\u201327 October 2021, pp. 603\u2013607 (2021)","DOI":"10.1109\/ICCD53106.2021.00097"},{"issue":"4","key":"10_CR42","doi-asserted-by":"publisher","first-page":"255","DOI":"10.46586\/tches.v2022.i4.255-284","volume":"2022","author":"J Richter-Brockmann","year":"2022","unstructured":"Richter-Brockmann, J., Feldtkeller, J., Sasdrich, P., G\u00fcneysu, T.: VERICA - verification of combined attacks: automated formal verification of security against simultaneous information leakage and tampering. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4), 255\u2013284 (2022)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"issue":"4","key":"10_CR43","doi-asserted-by":"publisher","first-page":"447","DOI":"10.46586\/tches.v2021.i4.447-473","volume":"2021","author":"J Richter-Brockmann","year":"2021","unstructured":"Richter-Brockmann, J., Rezaei Shahmirzadi, A., Sasdrich, P., Moradi, A., G\u00fcneysu, T.: FIVER - robust verification of countermeasures against fault injections. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4), 447\u2013473 (2021)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"10_CR44","first-page":"1","volume":"72","author":"J Richter-Brockmann","year":"2022","unstructured":"Richter-Brockmann, J., Sasdrich, P., G\u00fcneysu, T.: Revisiting fault adversary models - hardware faults in theory and practice. IEEE Trans. Computers 72, 1\u201314 (2022)","journal-title":"IEEE Trans. Computers"},{"issue":"3","key":"10_CR45","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s00145-023-09462-6","volume":"36","author":"S Saha","year":"2023","unstructured":"Saha, S., Alam, M., Bag, A., Mukhopadhyay, D., Dasgupta, P.: Learn from your faults: leakage assessment in fault attacks using deep learning. J. Cryptol. 36(3), 19 (2023)","journal-title":"J. Cryptol."},{"key":"10_CR46","doi-asserted-by":"crossref","unstructured":"Saha, S., Kumar, S.N., Patranabis, S., Mukhopadhyay, D., Dasgupta, P.: ALAFA: automatic leakage assessment for fault attack countermeasures. In: Proceedings of the 56th Annual Design Automation Conference 2019, DAC 2019, Las Vegas, NV, USA, 02\u201306 June 2019, p. 136 (2019)","DOI":"10.1145\/3316781.3317763"},{"issue":"2","key":"10_CR47","doi-asserted-by":"publisher","first-page":"242","DOI":"10.46586\/tches.v2018.i2.242-276","volume":"2018","author":"S Saha","year":"2018","unstructured":"Saha, S., Mukhopadhyay, D., Dasgupta, P.: ExpFault: an automated framework for exploitable fault characterization in block ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(2), 242\u2013276 (2018)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"issue":"1","key":"10_CR48","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1109\/TIFS.2011.2174984","volume":"7","author":"K Sakiyama","year":"2012","unstructured":"Sakiyama, K., Li, Y., Iwamoto, M., Ohta, K.: Information-theoretic approach to optimal differential fault analysis. IEEE Trans. Inf. Forensics Secur. 7(1), 109\u2013120 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/978-3-662-53008-5_11","volume-title":"Advances in Cryptology \u2013 CRYPTO 2016","author":"T Schneider","year":"2016","unstructured":"Schneider, T., Moradi, A., G\u00fcneysu, T.: ParTI \u2013 towards combined hardware countermeasures against side-channel and fault-injection attacks. In: Robshaw, M., Katz, J. (eds.) CRYPTO 2016. LNCS, vol. 9815, pp. 302\u2013332. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53008-5_11"},{"key":"10_CR50","doi-asserted-by":"crossref","unstructured":"Selmane, N., Guilley, S., Danger, J.: Practical setup time violation attacks on AES. In: EDCC-7 2008, pp. 91\u201396. IEEE Computer Society (2008)","DOI":"10.1109\/EDCC-7.2008.11"},{"key":"10_CR51","doi-asserted-by":"crossref","unstructured":"Shahmirzadi, A.R., Rasoolzadeh, S., Moradi, A.: Impeccable circuits II. In: DAC 2020, pp. 1\u20136. IEEE (2020)","DOI":"10.1109\/DAC18072.2020.9218615"},{"key":"10_CR52","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/3-540-36400-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"SP Skorobogatov","year":"2003","unstructured":"Skorobogatov, S.P., Anderson, R.J.: Optical fault induction attacks. In: Kaliski, B.S., Ko\u00e7, K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 2\u201312. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36400-5_2"},{"key":"10_CR53","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/978-3-642-00596-1_21","volume-title":"Foundations of Software Science and Computational Structures","author":"G Smith","year":"2009","unstructured":"Smith, G.: On the foundations of quantitative information flow. In: de Alfaro, L. (ed.) FoSSaCS 2009. LNCS, vol. 5504, pp. 288\u2013302. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-00596-1_21"},{"key":"10_CR54","unstructured":"Sullivan, G.A., Sippe, J., Heninger, N., Wustrow, E.: Open to a fault: on the passive compromise of TLS keys via transient errors. In: 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, 10\u201312 August 2022, pp. 233\u2013250 (2022)"},{"key":"10_CR55","unstructured":"Tang, A., Sethumadhavan, S., Stolfo, S.J.: CLKSCREW: exposing the perils of security-oblivious energy management. In: 26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, 16\u201318 August 2017, pp. 1057\u20131074 (2017)"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2023"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-8730-6_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T01:02:40Z","timestamp":1765933360000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-8730-6_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819987290","9789819987306"],"references-count":55,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-8730-6_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"18 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASIACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Application of Cryptology and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asiacrypt2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asiacrypt.iacr.org\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"HotCRP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"375","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"106","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}