{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:14:08Z","timestamp":1761581648718},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,1,12]],"date-time":"2018-01-12T00:00:00Z","timestamp":1515715200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1007\/s11432-017-9209-0","type":"journal-article","created":{"date-parts":[[2018,1,16]],"date-time":"2018-01-16T03:41:45Z","timestamp":1516074105000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Impossible meet-in-the-middle fault analysis on the LED lightweight cipher in VANETs"],"prefix":"10.1007","volume":"61","author":[{"given":"Wei","family":"Li","sequence":"first","affiliation":[]},{"given":"Vincent","family":"Rijmen","sequence":"additional","affiliation":[]},{"given":"Zhi","family":"Tao","sequence":"additional","affiliation":[]},{"given":"Qingju","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yunwen","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Chaoyun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Ya","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,12]]},"reference":[{"key":"9209_CR1","first-page":"1","volume":"11","author":"A J Misener","year":"2005","unstructured":"Misener A J. Vehicle-infrastructure integration (VII) and safety: rubber and radio meets the road in California. Intellimotion, 2005, 11: 1\u201312","journal-title":"Intellimotion"},{"key":"9209_CR2","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MSP.2004.26","volume":"2","author":"P J Hubaux","year":"2004","unstructured":"Hubaux P J, Capkun S, Luo J. The security and privacy of smart vehicles. IEEE Secur Priv, 2004, 2: 49\u201355","journal-title":"IEEE Secur Priv"},{"key":"9209_CR3","doi-asserted-by":"publisher","first-page":"39","DOI":"10.3233\/JCS-2007-15103","volume":"15","author":"M Raya","year":"2007","unstructured":"Raya M, Hubaux P J. Securing vehicular ad hoc networks. J Com Secur, 2007, 15: 39\u201368","journal-title":"J Com Secur"},{"key":"9209_CR4","first-page":"8","volume":"13","author":"M Raya","year":"2006","unstructured":"Raya M, Papadimitratos P, Hubaux P J. Securing vehicular communications. IEEE Trans Dependable Secure Comput, 2006, 13: 8\u201315","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"9209_CR5","first-page":"122103","volume":"58","author":"W T Zhang","year":"2015","unstructured":"Zhang W T, Bao Z Z, Lin D D, et al. RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms. Sci China Inf Sci, 2015, 58: 122103","journal-title":"Sci China Inf Sci"},{"key":"9209_CR6","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.micpro.2016.03.011","volume":"45","author":"L Li","year":"2016","unstructured":"Li L, Liu B T, Wang H. QTL: a new ultra-lightweight block cipher. Microprocessor Microsy, 2016, 45: 45\u201355","journal-title":"Microprocessor Microsy"},{"key":"9209_CR7","first-page":"19","volume-title":"The Hummingbird-2 lightweight authenticated encryption algorithm","author":"D Engels","year":"2011","unstructured":"Engels D, Saarinen O J M, Schweitzer P, et al. The Hummingbird-2 lightweight authenticated encryption algorithm. In: Proceedings of the 7th International Conference on RFID Security and Privacy, Amherst, 2011. 19\u201331"},{"key":"9209_CR8","first-page":"46","volume-title":"HIGHT: a new block cipher suitable for low-resource device","author":"D Hong","year":"2006","unstructured":"Hong D, Sung J, Hong S, et al. HIGHT: a new block cipher suitable for low-resource device. In: Proceedings of the 8th International Conference on Cryptographic Hardware and Embedded Systems, Yokohama, 2006. 46\u201359"},{"key":"9209_CR9","first-page":"243","volume-title":"mCrypton-a lightweight block cipher for security of low-cost RFID tags and sensors","author":"H C Lim","year":"2005","unstructured":"Lim H C, Korkishko T. mCrypton-a lightweight block cipher for security of low-cost RFID tags and sensors. In: Proceedings of the 6th International Conference on Information Security Applications, Jeju Island, 2005. 243\u2013258"},{"key":"9209_CR10","first-page":"280","volume-title":"TWIS-a lightweight block cipher","author":"K S Ojha","year":"2009","unstructured":"Ojha K S, Kumar N, Jain K. TWIS-a lightweight block cipher. In: Proceedings of the 5th International Conference on Information Systems Security, Kolkata, 2009. 280\u2013291"},{"key":"9209_CR11","first-page":"450","volume-title":"PRESENT: an ultra-lightweight block cipher","author":"A Bogdanov","year":"2007","unstructured":"Bogdanov A, Knudsen L R, Lender G, et al. PRESENT: an ultra-lightweight block cipher. In: Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems, Vienna, 2007. 450\u2013466"},{"key":"9209_CR12","first-page":"327","volume-title":"LBlock: a lightweight block cipher","author":"W L Wu","year":"2011","unstructured":"Wu W L, Zhang L. LBlock: a lightweight block cipher. In: Proceedings of the 9th International Conference on Applied Cryptography and Network Security, Nerja, 2011. 327\u2013344"},{"key":"9209_CR13","first-page":"3","volume-title":"VH: a lightweight block cipher based on dual pseudo-random transformation","author":"X Dai","year":"2015","unstructured":"Dai X, Huang Y, Chen L, et al. VH: a lightweight block cipher based on dual pseudo-random transformation. In: Proceedings of International Conference on Cloud Computing and Security, Nanjing, 2015. 3\u201313"},{"key":"9209_CR14","first-page":"326","volume-title":"The LED block cipher","author":"J Guo","year":"2011","unstructured":"Guo J, Peyrin T, Poschmann A, et al. The LED block cipher. In: Proceedings of the 13th International Conference on Cryptographic Hardware and Embedded Systems, Nara, 2011. 326\u2013341"},{"key":"9209_CR15","first-page":"190","volume-title":"Differential analysis of the LED block cipher","author":"F Mendel","year":"2012","unstructured":"Mendel F, Rijmen V, Toz D, et al. Differential analysis of the LED block cipher. In: Proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, 2012. 190\u2013207"},{"key":"9209_CR16","first-page":"71","volume-title":"Security analysis of the lightweight block ciphers XTEA, LED and Piccolo","author":"T Isobe","year":"2012","unstructured":"Isobe T, Shibutani K. Security analysis of the lightweight block ciphers XTEA, LED and Piccolo. In: Proceedings of the 17th Australasian Conference on Information Security and Privacy, Wollongong, 2012. 71\u201386"},{"key":"9209_CR17","first-page":"112","volume-title":"Cryptanalysis of round-reduced LED","author":"I Nikoli\u0107","year":"2013","unstructured":"Nikoli\u0107 I, Wang L, Wu S. Cryptanalysis of round-reduced LED. In: Proceedings of International Workshop on Fast Software Encryption, Washington, 2013. 112\u2013129"},{"key":"9209_CR18","first-page":"373","volume-title":"Probabilistic slide cryptanalysis and its applications to LED-64 and Zorro","author":"H Soleimany","year":"2014","unstructured":"Soleimany H. Probabilistic slide cryptanalysis and its applications to LED-64 and Zorro. In: Proceedings of International Workshop on Fast Software Encryption, London, 2014. 373\u2013389"},{"key":"9209_CR19","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1007\/978-94-007-4516-2_79","volume-title":"Future Information Technology, Application, and Service","author":"K Jeong","year":"2012","unstructured":"Jeong K, Lee C. Differential fault analysis on block cipher LED-64. In: Future Information Technology, Application, and Service. Berlin: Springer, 2012. 747\u2013775"},{"key":"9209_CR20","doi-asserted-by":"publisher","first-page":"896","DOI":"10.1080\/18756891.2012.733223","volume":"5","author":"W Li","year":"2012","unstructured":"Li W, Gu D W, Xia X L, et al. Single byte differential fault analysis on the LED lightweight cipher in the wireless sensor network. Int J Comput Intell Syst, 2012, 5: 896\u2013904","journal-title":"Int J Comput Intell Syst"},{"key":"9209_CR21","first-page":"120","volume-title":"A fault attack on the LED block cipher","author":"P Jovanovic","year":"2012","unstructured":"Jovanovic P, Kreuzer M, Polian I. A fault attack on the LED block cipher. In: Proceedings of the 3rd International Conference on Constructive Side-Channel Analysis and Secure Design, Darmstadt, 2012. 120\u2013134"},{"key":"9209_CR22","first-page":"41","volume-title":"Improving and evaluating differential fault analysis on LED with algebraic techniques","author":"X J Zhao","year":"2013","unstructured":"Zhao X J, Guo S Z, Zhang F. Improving and evaluating differential fault analysis on LED with algebraic techniques. In: Proceedings of the 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, Washington, 2013. 41\u201351"},{"key":"9209_CR23","first-page":"174","volume-title":"Differential fault intensity analysis on PRESENT and LED block ciphers","author":"F N Ghalaty","year":"2015","unstructured":"Ghalaty F N, Yuce B, Schaumont P. Differential fault intensity analysis on PRESENT and LED block ciphers. In: Proceedings of the 6th International Workshop on Constructive Side-Channel Analysis and Secure, Berlin, 2015. 174\u2013188"},{"key":"9209_CR24","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/TDSC.2015.2449849","volume":"13","author":"W Li","year":"2016","unstructured":"Li W, Zhang W W, Gu D W, et al. Impossible differential fault analysis on the LED lightweight cryptosystem in the vehicular ad-hoc networks. IEEE Trans Depend Secure Comput, 2016, 13: 84\u201392","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"9209_CR25","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s001450010016","volume":"14","author":"D Boneh","year":"2001","unstructured":"Boneh D, DeMillo A R, Lipton J R. On the importance of eliminating errors in cryptgraphic computations. J Cryptol, 2001, 14: 101\u2013119","journal-title":"J Cryptol"},{"key":"9209_CR26","first-page":"37","volume-title":"On the importance of checking cryptographic protocols for faults","author":"D Boneh","year":"1997","unstructured":"Boneh D, DeMillo A R, Lipto J R, et al. On the importance of checking cryptographic protocols for faults. In: Proceedings of the 16th Annual International Conference on Theory and Application of Cryptographic Techniques, Konstanz, 1997. 37\u201351"},{"key":"9209_CR27","first-page":"293","volume-title":"Differential fault analysis on A.E.S","author":"P Dusart","year":"2003","unstructured":"Dusart P, Letourneux G, Vivolo O. Differential fault analysis on A.E.S. In: Proceedings of International Conference on Applied Cryptography and Network Security, Kunming, 2003. 293\u2013306"},{"key":"9209_CR28","first-page":"162","volume-title":"Fault based cryptanalysis of the advanced encryption standard (AES)","author":"J Bl\u00f6mer","year":"2003","unstructured":"Bl\u00f6mer J, Seifert J P. Fault based cryptanalysis of the advanced encryption standard (AES). In: Proceedings of International Conference of Financial Cryptography, Guadeloupe, 2003. 162\u2013181"},{"key":"9209_CR29","doi-asserted-by":"publisher","first-page":"048102","DOI":"10.1007\/s11432-016-0233-0","volume":"60","author":"F Zhang","year":"2017","unstructured":"Zhang F, Zhao X J, He W, et al. Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers. Sci China Inf Sci, 2017, 60: 048102","journal-title":"Sci China Inf Sci"},{"key":"9209_CR30","doi-asserted-by":"publisher","first-page":"039106","DOI":"10.1007\/s11432-017-9179-4","volume":"61","author":"X J Zhao","year":"2018","unstructured":"Zhao X J, Zhang F, Guo S Z, et al. Optimal model search for hardware-trojan-based bit-level fault attacks on block ciphers. Sci China Inf Sci, 2018, 61: 039106","journal-title":"Sci China Inf Sci"},{"key":"9209_CR31","doi-asserted-by":"publisher","first-page":"042401","DOI":"10.1007\/s11432-016-0071-7","volume":"60","author":"N Liao","year":"2017","unstructured":"Liao N, Cui X X, Liao K, et al. Improving DFA attacks on AES with unknown and random faults. Sci China Inf Sci, 2017, 60: 042401","journal-title":"Sci China Inf Sci"},{"key":"9209_CR32","first-page":"274","volume-title":"Meet-in-the-middle and impossible differential fault analysis on AES","author":"P Derbez","year":"2011","unstructured":"Derbez P, Fouque A P, Lereateux D. Meet-in-the-middle and impossible differential fault analysis on AES. In: Proceedings of International Workshop of Cryptographic Hardware and Embedded Systems, Nara, 2011. 274\u2013291"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-017-9209-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-017-9209-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-017-9209-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,12]],"date-time":"2019-01-12T01:35:11Z","timestamp":1547256911000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-017-9209-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,12]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,3]]}},"alternative-id":["9209"],"URL":"https:\/\/doi.org\/10.1007\/s11432-017-9209-0","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,12]]},"assertion":[{"value":"10 May 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 July 2017","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"032110"}}