{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T06:08:00Z","timestamp":1648879680264},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,9,20]],"date-time":"2014-09-20T00:00:00Z","timestamp":1411171200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1007\/s12095-014-0108-3","type":"journal-article","created":{"date-parts":[[2014,9,19]],"date-time":"2014-09-19T10:11:22Z","timestamp":1411121482000},"page":"35-69","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Construction of RSBFs with improved cryptographic properties to resist differential fault attack on grain family of stream ciphers"],"prefix":"10.1007","volume":"7","author":[{"given":"Bodhisatwa","family":"Mazumdar","sequence":"first","affiliation":[]},{"given":"Debdeep","family":"Mukhopadhyay","sequence":"additional","affiliation":[]},{"given":"Indranil","family":"Sengupta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,9,20]]},"reference":[{"key":"108_CR1","unstructured":"ECRYPT Stream Cipher Project. eSTREAM Portfolio of Stream Ciphers (2008). http:\/\/www.ecrypt.eu.org\/stream Revised Access 8 Sept 2008"},{"key":"108_CR2","doi-asserted-by":"crossref","unstructured":"Anderson, R.J., Kuhn, M.G.: Low cost attacks on tamper resistant devices. In: Security Protocols Workshop, pp. 125\u2013136 (1997)","DOI":"10.1007\/BFb0028165"},{"key":"108_CR3","doi-asserted-by":"crossref","unstructured":"Banik, S., Maitra, S., Sarkar, S.: A differential fault attack on the grain family of stream ciphers. In: CHES, pp. 122\u2013139 (2012)","DOI":"10.1007\/978-3-642-33027-8_8"},{"key":"108_CR4","doi-asserted-by":"crossref","unstructured":"Banik, S., Maitra, S., Sarkar, S.: A differential fault attack on the grain family under reasonable assumptions. In: INDOCRYPT, pp. 191\u2013208 (2012)","DOI":"10.1007\/978-3-642-34931-7_12"},{"key":"108_CR5","doi-asserted-by":"crossref","unstructured":"Berzati, A., Canovas-Dumas, C., Goubin, L.: Fault analysis of rabbit: Toward a secret key leakage. In: INDOCRYPT, pp. 72\u201387 (2009)","DOI":"10.1007\/978-3-642-10628-6_5"},{"key":"108_CR6","doi-asserted-by":"crossref","unstructured":"Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: CRYPTO, pp. 513\u2013525 (1997)","DOI":"10.1007\/BFb0052259"},{"key":"108_CR7","doi-asserted-by":"crossref","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults (extended abstract). In: EUROCRYPT, pp. 37\u201351 (1997)","DOI":"10.1007\/3-540-69053-0_4"},{"issue":"3","key":"108_CR8","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1111\/j.0824-7935.2004.00245.x","volume":"20","author":"JA Clark","year":"2004","unstructured":"Clark, J.A., Jacob, J.L., Maitra, S., Stanica, P.: Almost boolean functions: the design of boolean functions by spectral inversion. Comput. Intell. 20(3), 450\u2013462 (2004)","journal-title":"Comput. Intell."},{"key":"108_CR9","doi-asserted-by":"crossref","unstructured":"Dalai, D.K., Gupta, K.C., Maitra, S.: Results on algebraic immunity for cryptographically significant boolean functions. In: INDOCRYPT, pp. 92\u2013106 (2004)","DOI":"10.1007\/978-3-540-30556-9_9"},{"key":"108_CR10","doi-asserted-by":"crossref","unstructured":"Filiol, E., Fontaine, C.: Highly nonlinear balanced boolean functions with a good correlation-immunity. In: EUROCRYPT, pp. 475\u2013488 (1998)","DOI":"10.1007\/BFb0054147"},{"issue":"4","key":"108_CR11","doi-asserted-by":"crossref","first-page":"1237","DOI":"10.1109\/18.761276","volume":"45","author":"C Fontaine","year":"1999","unstructured":"Fontaine, C.: On some cosets of the first-order reed-muller code with high minimum weight. IEEE Trans. Inf. Theory 45(4), 1237\u20131243 (1999)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"108_CR12","unstructured":"Hell, M., Johansson, T., Meier, W.: Grain - a stream cipher for constrained environments. eSTREAM, ECRYPT Stream Cipher Project, Report 2005\/001. http:\/\/www.ecrypt.eu.org\/stream (2005)"},{"key":"108_CR13","unstructured":"Hell, M., Maximov, E., Maitra, S.: On efficient implementation of search strategy for rotation symmetric boolean functions. In: 9th International Workshop on Algebraic and Combinatoral Coding Theory, ACCT 2004, 2004-06-19\/2006-06-25 (2004)"},{"key":"108_CR14","doi-asserted-by":"crossref","unstructured":"Hoch J.J., Shamir A.: Fault analysis of stream ciphers. In: Joye M., Quisquater J.J. (eds.) CHES, Lecture Notes in Computer Science, vol. 3156, pp. 240\u2013253. Springer (2004)","DOI":"10.1007\/978-3-540-28632-5_18"},{"key":"108_CR15","doi-asserted-by":"crossref","unstructured":"Karmakar, S., Chowdhury, D.R.: Fault analysis of grain-128 by targeting NFSR. In: AFRICACRYPT, pp. 298\u2013315 (2011)","DOI":"10.1007\/978-3-642-21969-6_19"},{"issue":"5","key":"108_CR16","doi-asserted-by":"crossref","first-page":"1743","DOI":"10.1109\/TIT.2007.894696","volume":"53","author":"S Kavut","year":"2007","unstructured":"Kavut, S., Maitra, S., Y\u00fccel, M.D.: Search for boolean functions with excellent profiles in the rotation symmetric class. IEEE Trans. Inf. Theory 53(5), 1743\u20131751 (2007)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"108_CR17","unstructured":"Maximov, A., Hell, M., Maitra, S.: Plateaued rotation symmetric boolean functions on odd number of variables. In: 1st Workshop on Boolean Functions: Cryptography and Applications, BFCA, pp. 83\u2013104 (2005)"},{"key":"108_CR18","doi-asserted-by":"crossref","unstructured":"Preneel, B., Leekwijck, W.V., Linden, L.V., Govaerts, R., Vandewalle, J.: Propagation characteristics of boolean functions. In: EUROCRYPT, pp. 161\u2013173 (1990)","DOI":"10.1007\/3-540-46877-3_14"},{"key":"108_CR19","unstructured":"Quan, L., Guang-pu, G., Wen-fen, L.: Analysis of properties and counting of orbits for k-rotation symetric Boolean functions. J. Commun. 33(1), 114\u2013119 (2012)"},{"key":"108_CR20","first-page":"494","volume":"2013","author":"S Sarkar","year":"2013","unstructured":"Sarkar, S., Banik, S., Maitra, S.: Differential fault attack against grain family with very few faults and minimal assumptions. IACR Cryptol. ePrint Arch. 2013, 494 (2013)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"108_CR21","doi-asserted-by":"crossref","unstructured":"Skorobogatov, S.P.: Optically enhanced position-locked power analysis. In: CHES, pp. 61\u201375 (2006)","DOI":"10.1007\/11894063_6"},{"key":"108_CR22","doi-asserted-by":"crossref","unstructured":"Skorobogatov, S.P., Anderson, R.J.: Optical fault induction attacks. In: CHES, pp. 2\u201312 (2002)","DOI":"10.1007\/3-540-36400-5_2"},{"key":"108_CR23","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/S1571-0653(04)00560-8","volume":"15","author":"P Stanica","year":"2003","unstructured":"Stanica, P., Maitra, S.: Rotation symmetric boolean functions - count and cryptographic properties. Electron Notes Discrete Math. 15, 139\u2013145 (2003)","journal-title":"Electron Notes Discrete Math."},{"key":"108_CR24","doi-asserted-by":"crossref","unstructured":"Stanica, P., Maitra, S., Clark, J.A.: Results on rotation symmetric bent and correlation immune Boolean functions. In: FSE, pp. 161\u2013177 (2004)","DOI":"10.1007\/978-3-540-25937-4_11"},{"key":"108_CR25","doi-asserted-by":"crossref","unstructured":"Su, S., Tang, X.: Construction of Rotation Symmetric Boolean Functions with Optimal Algebraic Immunity and High Nonlinearity. Des. Codes Cryptogr. (2012)","DOI":"10.1007\/s10623-012-9727-x"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-014-0108-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-014-0108-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-014-0108-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,15]],"date-time":"2019-08-15T05:14:50Z","timestamp":1565846090000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-014-0108-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,20]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,3]]}},"alternative-id":["108"],"URL":"https:\/\/doi.org\/10.1007\/s12095-014-0108-3","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,9,20]]}}}