{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T14:48:53Z","timestamp":1761662933657},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2011,5,21]],"date-time":"2011-05-21T00:00:00Z","timestamp":1305936000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1007\/s10623-011-9518-9","type":"journal-article","created":{"date-parts":[[2011,5,20]],"date-time":"2011-05-20T03:57:58Z","timestamp":1305863878000},"page":"289-311","source":"Crossref","is-referenced-by-count":21,"title":["Fault analysis of Trivium"],"prefix":"10.1007","volume":"62","author":[{"given":"Yupu","family":"Hu","sequence":"first","affiliation":[]},{"given":"Juntao","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Qing","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yiwei","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,5,21]]},"reference":[{"key":"9518_CR1","unstructured":"Canni\u00e8re C.D., Preneel B.: Trivium: a stream cipher construction inspired by block cipher design principle. eSTREAM, ECRYPT Stream Cipher Project, Report 2005\/30. http:\/\/www.ecrypt.eu.org\/stream (2005). Accessed 30 June 2006."},{"key":"9518_CR2","unstructured":"Canni\u00e8re C.D., Preneel B.: Trivium specifications. www.ecrypt.eu.org\/stream\/p3ciphers\/trivium\/trivium_p3.pdf (2007). Accessed 29 Apr 2007."},{"key":"9518_CR3","unstructured":"Raddum H.: Cryptanalytic results on Trivium. eSTREAM, ECRYPT Stream Cipher Project, Report 2006\/039. http:\/\/www.ecrypt.eu.org\/stream (2006). Accessed 3 Apr 2006."},{"key":"9518_CR4","unstructured":"Maximov A., Biryukov A.: Two trivial attacks on Trivium. eSTREAM, ECRYPT Stream Cipher Project, Report 2007\/006. http:\/\/www.ecrypt.eu.org\/stream (2007). Accessed 29 Apr 2007."},{"key":"9518_CR5","unstructured":"Babbage S.: Some thoughts on Trivium. eSTREAM, ECRYPT Stream Cipher Project, Report 2007\/007. http:\/\/www.ecrypt.eu.org\/stream (2007). Accessed 29 Apr 2007."},{"key":"9518_CR6","unstructured":"Turan M.S., Kara O.: Linear approximations for 2-round Trivium. eSTREAM, ECRYPT Stream Cipher Project, Report 2007\/008. http:\/\/www.ecrypt.eu.org\/stream (2007). Accessed 29 Apr 2007."},{"key":"9518_CR7","unstructured":"Hwang D., Chaney M., Karanam S., Ton N., Gaj K.: Comparison of FPGA-targeted hardware implementations of eSTREAM stream cipher candidates. In: SASC 2008\u2014The State of the Art of Stream Ciphers, Workshop Record, pp. 151\u2013162. http:\/\/www.ecrypt.eu.org\/stream (2008). Accessed 10 Mar 2009."},{"key":"9518_CR8","unstructured":"Good T., Benaissa M.: Hardware performance of eSTREAM phase-III stream cipher candidates. In: SASC 2008\u2014The State of the Art of Stream Ciphers, Workshop Record, pp. 163\u2013174. http:\/\/www.ecrypt.eu.org\/stream (2008). Accessed 10 Mar 2009."},{"key":"9518_CR9","unstructured":"Biham E., Dunkelman O.: Differential cryptanalysis in stream ciphers. COSIC internal report (2007)."},{"key":"9518_CR10","unstructured":"Rechberger C., Oswald E.: Stream ciphers and side-channel analysis. In: SASC 2004\u2014The State of the Art of Stream Ciphers, Workshop Record, pp. 320\u2013326. http:\/\/www.ecrypt.eu.org\/stream (2004). Accessed 9 Apr 2005."},{"key":"9518_CR11","unstructured":"Fisher W., Gammel B.M., Kniffler O., Velten J.: Differential power analysis of stream ciphers. eSTREAM, ECRYPT Stream Cipher Project, Report 2007\/014. http:\/\/www.ecrypt.eu.org\/stream (2007). Accessed 29 Apr 2007."},{"key":"9518_CR12","first-page":"240","volume-title":"CHES 2004. LNCS, vol. 3156","author":"J.J. Hoch","year":"2004","unstructured":"Hoch J.J., Shamir A.: Fault analysis of stream ciphers. In: Joye, M., Quisquater, J.-J. (eds) CHES 2004. LNCS, vol. 3156, pp. 240\u2013253. Springer, Heidelberg (2004)"},{"key":"9518_CR13","unstructured":"Biham E., Granboulan L., Nguyen P.: Impossible fault analysis of RC4 and differential fault analysis of RC4. In: SASC 2004\u2014The State of the Art of Stream Ciphers, Workshop Record, pp. 147\u2013155. http:\/\/www.ecrypt.eu.org\/stream (2004). Accessed 9 Apr 2005."},{"key":"9518_CR14","unstructured":"Gierlichs B., Batina L., Clavier C., Eisenbarth T., Gouget A., Handschuh H., Kasper T., Lemke-Rust K., Mangard S., Moradi A., Oswald E.: Susceptibility of eSTREAM candidates towards side channel analysis. In: SASC 2008\u2014The State of the Art of Stream Ciphers, Workshop Record, pp. 123\u2013150. http:\/\/www.ecrypt.eu.org\/stream (2008). Accessed 10 Mar 2009."},{"key":"9518_CR15","unstructured":"Fisher S., Khazaei S., Meier W.: Chosen IV statistical analysis for key recovery attacks on stream cipher. In: SASC 2008\u2014The State of the Art of Stream Ciphers, Workshop Record, pp. 31\u201341. http:\/\/www.ecrypt.eu.org\/stream (2008). Accessed 10 Mar 2009."},{"key":"9518_CR16","first-page":"158","volume-title":"FSE 2008. LNCS, vol. 5086","author":"M. Hojs\u00edk","year":"2008","unstructured":"Hojs\u00edk M., Rudolf B.: Differential fault analysis of Trivium. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 158\u2013172. Springer, Heidelberg (2008)"},{"key":"9518_CR17","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/978-3-540-89754-5_19","volume-title":"INDOCRYPT 2008. LNCS, vol. 5365","author":"M. Hojs\u00edk","year":"2008","unstructured":"Hojs\u00edk M., Rudolf B.: Floating fault analysis of Trivium. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds) INDOCRYPT 2008. LNCS, vol. 5365, pp. 239\u2013250. Springer, Heidelberg (2008)"},{"key":"9518_CR18","unstructured":"Biham E., Shamir A.: Differential fault analysis of secret key cryptosystems. In: Advances in Cryptology-CRYPTO\u201997. LNCS, vol. 1294, pp. 513\u2013525. Springer-Verlag, Berlin, Heidelberg (1997)."},{"key":"9518_CR19","unstructured":"Pasalic E.: Key differentiation attacks on stream ciphers. Cryptology ePrint Archive. http:\/\/eprint.iacr.org\/2008\/443 (2008). Accessed 12 Dec 2008."},{"key":"9518_CR20","unstructured":"Dinur I., Shamir A. Cube attacks on tweakable black box polynomials. Cryptology ePrint Archive. http:\/\/eprint.iacr.org\/2008\/385 (2008). Accessed 12 Dec 2008."},{"key":"9518_CR21","unstructured":"Bedi S.S., Pillai N.R.: Cube attacks on Trivium. Cryptology ePrint Archive. http:\/\/eprint.iacr.org\/2009\/015 (2009). Accessed 10 Feb 2009."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-011-9518-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-011-9518-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-011-9518-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:58:30Z","timestamp":1559246310000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-011-9518-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5,21]]},"references-count":21,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,3]]}},"alternative-id":["9518"],"URL":"https:\/\/doi.org\/10.1007\/s10623-011-9518-9","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,5,21]]}}}