{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:24:52Z","timestamp":1761675892523},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2011,10,15]],"date-time":"2011-10-15T00:00:00Z","timestamp":1318636800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1007\/s11042-011-0895-x","type":"journal-article","created":{"date-parts":[[2011,10,14]],"date-time":"2011-10-14T12:17:11Z","timestamp":1318594631000},"page":"691-708","source":"Crossref","is-referenced-by-count":7,"title":["Fault analysis study of the block cipher FOX64"],"prefix":"10.1007","volume":"63","author":[{"given":"Ruilin","family":"Li","sequence":"first","affiliation":[]},{"given":"Jianxiong","family":"You","sequence":"additional","affiliation":[]},{"given":"Bing","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,10,15]]},"reference":[{"key":"895_CR1","unstructured":"Ali S, Mukhopadhyay D, Tunstall M (2010) Differential fault analysis of AES using a single multiple-byte fault. Cryptology ePrint archive: Report 2010\/636, available through: http:\/\/eprint.iacr.org\/2010\/636"},{"key":"895_CR2","unstructured":"Anderson R, Kuhn M (1996) Tamper resistance\u2014a cautionary note. In: Second USENIX workshop on eletronic commerce, pp 1\u201311"},{"key":"895_CR3","unstructured":"Anderson R, Kuhn M (1997) Low cost attacks on tamper resistant devices. Security protocols 1997. LNCS 1361. Springer, pp 125\u2013136"},{"key":"895_CR4","doi-asserted-by":"crossref","unstructured":"Armknecht F, Meier W (2006) Fault attacks on combiners with memory. In: SAC 2005, LNCS 3897. Springer, pp 36\u201350","DOI":"10.1007\/11693383_3"},{"issue":"2","key":"895_CR5","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1109\/JPROC.2005.862424","volume":"94","author":"H Bar-El","year":"2006","unstructured":"Bar-El H, Choukri H, Naccache D, Tunstall M, Whelan C (2006) The sorcerer\u2019s apprentice guide to fault attacks. Proc IEEE 94(2):370\u2013386","journal-title":"Proc IEEE"},{"issue":"4","key":"895_CR6","doi-asserted-by":"crossref","first-page":"492","DOI":"10.1109\/TC.2003.1190590","volume":"52","author":"G Bertoni","year":"2003","unstructured":"Bertoni G, Breveglieri L, Koren I, Maistri P, Piuri V (2003) Error analysis and detection procedures for a hardware implementation of the advanced encryption standard. IEEE Trans Comput 52(4):492\u2013505","journal-title":"IEEE Trans Comput"},{"key":"895_CR7","doi-asserted-by":"crossref","unstructured":"Berzati A, Canovas-Dumas C, Goubin L (2009) Fault analysis of Rabbit: toward a secret key leakage. In: INDOCRYPT 2009, LNCS 5922. Springer, pp 72\u201387","DOI":"10.1007\/978-3-642-10628-6_5"},{"key":"895_CR8","doi-asserted-by":"crossref","unstructured":"Biham E, Shamir A (1997) Differential fault analysis of secret key cryptosystems. In: CRYPTO 97, LNCS 1294. Springer, pp 513\u2013525","DOI":"10.1007\/BFb0052259"},{"key":"895_CR9","doi-asserted-by":"crossref","unstructured":"Biham E, Granboulan L, Nguyn PQ (2005) Impossible fault analysis of RC4 and differential fault analysis of RC4. In: FSE 2005, LNCS 3557. Springer, pp 359\u2013367","DOI":"10.1007\/11502760_24"},{"key":"895_CR10","doi-asserted-by":"crossref","unstructured":"Bl\u00f6mer J, Seifert J-P (2003) Fault based cryptanalysis of the advanced encryption standard (AES). In: FC 2003, LNCS 2742. Springer, pp 162\u2013181","DOI":"10.1007\/978-3-540-45126-6_12"},{"key":"895_CR11","doi-asserted-by":"crossref","unstructured":"Boneh D, DeMillo RA, Lipton RJ (1997) On the importance of checking cryptographic protocols for faults. In: EUROCRYPT\u201997, LNCS 1233. Springer, pp 37\u201351","DOI":"10.1007\/3-540-69053-0_4"},{"key":"895_CR12","unstructured":"Boseher A, Handschuh H (2008) Masking does not protect against differential fault attacks. In: FDTC 2008. IEEE Computer Society, pp 35\u201340"},{"key":"895_CR13","doi-asserted-by":"crossref","unstructured":"Breveglieri L, Koren I, Maistri P (2006) A fault attack against the FOX cipher family. In: FDTC 2006, LNCS 4236. Springer, pp 98\u2013105","DOI":"10.1007\/11889700_10"},{"key":"895_CR14","unstructured":"Chen C-N, Yen S-M (2003) Differential fault analysis on AES key schedule and some countermeasures. In: ACISP 2003, LNCS 2727. Springer, pp 118\u2013129"},{"key":"895_CR15","doi-asserted-by":"crossref","unstructured":"Clavier C, Gierlichs B, Verbauwhede I (2008) Fault analysis study of IDEA. In: CT-RSA 2008, LNCS 4964. Springer, pp 274\u2013287","DOI":"10.1007\/978-3-540-79263-5_17"},{"key":"895_CR16","doi-asserted-by":"crossref","unstructured":"Dusart P, Letourneux G, Vivolo O (2003) Differential fault analysis on A.E.S. In: ACNS 2003, LNCS 2846. Springer, pp 293\u2013306","DOI":"10.1007\/978-3-540-45203-4_23"},{"key":"895_CR17","doi-asserted-by":"crossref","unstructured":"Giraud C (2005) DFA on AES. In: AES 2004, LNCS 3373. Springer, pp 27\u201341","DOI":"10.1007\/11506447_4"},{"key":"895_CR18","doi-asserted-by":"crossref","unstructured":"Giraud C, Thiebeauld H (2004) A survey on fault attacks. In: CARDIS 2004. Springer, pp 159\u2013176","DOI":"10.1007\/1-4020-8147-2_11"},{"key":"895_CR19","unstructured":"Hoch JJ, Shamir A (2004) Fault analysis of stream ciphers. In: CHES 2004. LNCS 3156. Springer, pp 240\u2013253"},{"key":"895_CR20","doi-asserted-by":"crossref","unstructured":"Hojsik M, Rudolf B (2008) Differential fault analysis of Trivium. In: FSE 2008, LNCS 5086. Springer, pp 158\u2013172","DOI":"10.1007\/978-3-540-71039-4_10"},{"key":"895_CR21","doi-asserted-by":"crossref","unstructured":"Hojsik M, Rudolf B (2008) Floating fault analysis of Trivium. In: INDOCRYPT 2008, LNCS 5365. Springer, pp 239\u2013250","DOI":"10.1007\/978-3-540-89754-5_19"},{"key":"895_CR22","unstructured":"Junod P, Vaudenay S (2005) FOX: a new family of block ciphers. In: SAC 2004, LNCS 3357. Springer, pp 114\u2013129"},{"key":"895_CR23","doi-asserted-by":"crossref","unstructured":"Karpovsky M, Kulikowski KJ, Taubin A (2004) Robust protection against fault-injection attacks on smart cards implementing the advanced encryption standard. In: DSN 2004. IEEE Computer Society, pp 93\u2013101","DOI":"10.1109\/DSN.2004.1311880"},{"key":"895_CR24","doi-asserted-by":"crossref","unstructured":"Kim CH, Quisquater J-J (2008) New differential fault analysis on AES key schedule: two faults are enough. In: CARDIS 2008, LNCS 5189. Springer, pp 48\u201360","DOI":"10.1007\/978-3-540-85893-5_4"},{"key":"895_CR25","doi-asserted-by":"crossref","unstructured":"Kircanski A, Youssef AM (2009) Differential fault analysis of Rabbit. In: SAC 2009, LNCS 5867. Springer, pp 197\u2013214","DOI":"10.1007\/978-3-642-05445-7_13"},{"key":"895_CR26","doi-asserted-by":"crossref","unstructured":"Kircanski A, Youssef AM (2010) Differential fault analysis of HC-128. In: AFRICACRYPT 2010, LNCS 6055. Springer, pp 261\u2013278","DOI":"10.1007\/978-3-642-12678-9_16"},{"key":"895_CR27","doi-asserted-by":"crossref","unstructured":"Li Y, Sakiyama K, Gomisawa S, Fukunaga T (2010) Fault sensitivity analysis. In: CHES 2010, LNCS 6225. Springer, pp 320\u2013334","DOI":"10.1007\/978-3-642-15031-9_22"},{"issue":"2","key":"895_CR28","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/j.ipl.2010.10.012","volume":"111","author":"Y Luo","year":"2010","unstructured":"Luo Y, Lai X, Gong Z (2010) Pseudorandomness analysis of the (extended) Lai\u2013Massey scheme. Inf Process Lett 111(2):90\u201396 (Elsevier)","journal-title":"Inf Process Lett"},{"issue":"11","key":"895_CR29","doi-asserted-by":"crossref","first-page":"1528","DOI":"10.1109\/TC.2008.149","volume":"57","author":"P Maistri","year":"2008","unstructured":"Maistri P, Leveugle R (2008) Double-data-rate computation as a countermeasure against fault analysis. IEEE Trans Comput 57(11):1528\u20131539","journal-title":"IEEE Trans Comput"},{"key":"895_CR30","doi-asserted-by":"crossref","unstructured":"Moradi A, Shalmani MTM, Salmasizadeh M (2006) A generalized method of differential fault attack against AES cryptosystem. In: CHES 2006, LNCS 4249. Springer, pp 91\u2013100","DOI":"10.1007\/11894063_8"},{"key":"895_CR31","doi-asserted-by":"crossref","unstructured":"Mukhopadhyay D (2009) An improved fault based attack of the advanced encryption standard. In: AFRICACRYPT 2009, LNCS 5580, pp 421\u2013434","DOI":"10.1007\/978-3-642-02384-2_26"},{"key":"895_CR32","unstructured":"Piret G, Quisquater J-J (2003) A differential fault attack technque against SPN structures, with application to the AES and KHAZAD. In: CHES 2003, LNCS 2779. Springer, pp 77\u201388"},{"key":"895_CR33","doi-asserted-by":"crossref","unstructured":"Rajendran J, Borad H, Mantravadi S, Karri R (2010) SLICED: Slide-based concurrent error detection technique for symmetric block ciphers. In: HOST 2010, IEEE International Symposium, pp 70\u201375","DOI":"10.1109\/HST.2010.5513109"},{"key":"895_CR34","doi-asserted-by":"crossref","unstructured":"Satoh A, Sugawara T, Homma N, Aoki T (2008) High-performance concurrent error detection scheme for AES hardware. In: CHES 2008, LNCS 5154. Springer, pp 100\u2013112","DOI":"10.1007\/978-3-540-85053-3_7"},{"key":"895_CR35","unstructured":"Skorobogatov SP, Anderson RJ (2003) Optical fault induction attacks. In: CHES 2002, LNCS 2523. Springer, pp 2\u201312"},{"key":"895_CR36","doi-asserted-by":"crossref","unstructured":"Takahashi J, Fukunaga T, Yamakoshi K (2007) DFA mechanism on the AES key schedule. In: FDTC 2007. IEEE Computer Society, pp 62\u201374","DOI":"10.1109\/FDTC.2007.13"},{"key":"895_CR37","unstructured":"Vaudenay S (2000) On the Lai\u2013Massey scheme. In: ASIACRYPT 1999, LNCS 1716. Springer, pp 8\u201319"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-011-0895-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-011-0895-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-011-0895-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,17]],"date-time":"2019-06-17T14:38:12Z","timestamp":1560782292000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-011-0895-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,15]]},"references-count":37,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,4]]}},"alternative-id":["895"],"URL":"https:\/\/doi.org\/10.1007\/s11042-011-0895-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,10,15]]}}}