{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:44:20Z","timestamp":1762004660320},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,10,23]],"date-time":"2014-10-23T00:00:00Z","timestamp":1414022400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1007\/s12095-014-0112-7","type":"journal-article","created":{"date-parts":[[2014,10,22]],"date-time":"2014-10-22T07:38:41Z","timestamp":1413963521000},"page":"121-162","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Complete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacks"],"prefix":"10.1007","volume":"7","author":[{"given":"Christophe","family":"Clavier","sequence":"first","affiliation":[]},{"given":"Quentin","family":"Isorez","sequence":"additional","affiliation":[]},{"given":"Damien","family":"Marion","sequence":"additional","affiliation":[]},{"given":"Antoine","family":"Wurcker","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,23]]},"reference":[{"key":"112_CR1","doi-asserted-by":"crossref","unstructured":"Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski, Jr., B.S. (ed.) Advances in Cryptology \u2013 CRYPTO \u201997, of Lecture Notes in Computer Science, vol. 1294, pp 513\u2013525. Springer-Verlag (1997)","DOI":"10.1007\/BFb0052259"},{"key":"112_CR2","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Bogdanov, A., Khovratovich, D., Kasper, T.: Collision attacks on AES-based MAC: Alpha-MAC. In: Paillier and Verbauwhede [27], pages 166\u2013180","DOI":"10.1007\/978-3-540-74735-2_12"},{"key":"112_CR3","doi-asserted-by":"crossref","unstructured":"Bogdanov, A.: Improved side-channel collision attacks on AES. In: Adams, C.M., Miri, A., Wiener, M.J. (eds.) Selected Areas in Cryptography \u2013 SAC \u201907, of Lecture Notes in Computer Science, vol. 4876, pp 84\u201395. Springer (2007)","DOI":"10.1007\/978-3-540-77360-3_6"},{"key":"112_CR4","doi-asserted-by":"crossref","unstructured":"Bogdanov, A.: Multiple-differential side-channel collision attacks on AES. In: Oswald, E., Rohatgi, P. (eds.) Cryptographic Hardware and Embedded Systems \u2013 CHES \u201908, of Lecture Notes in Computer Science, vol. 5154, pp 30\u201344. Springer (2008)","DOI":"10.1007\/978-3-540-85053-3_3"},{"key":"112_CR5","doi-asserted-by":"crossref","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults (extended abstract). In: Fumy, W. (ed.) Advances in Cryptology \u2013 EUROCRYPT \u201997, of Lecture Notes in Computer Science, vol. 1233, pp 37\u201351. Springer-Verlag (1997)","DOI":"10.1007\/3-540-69053-0_4"},{"key":"112_CR6","doi-asserted-by":"crossref","unstructured":"Brier, \u00c9., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In Joye and Quisquater [15], pages 16\u201329","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"112_CR7","doi-asserted-by":"crossref","unstructured":"Clavier, C.: Secret external encodings do not prevent transient fault analysis. In Paillier and Verbauwhede [27], pages 181\u2013194","DOI":"10.1007\/978-3-540-74735-2_13"},{"key":"112_CR8","doi-asserted-by":"crossref","unstructured":"Clavier, C.: An improved SCARE cryptanalysis against a secret A3\/A8 GSM algorithm. In: McDaniel, P.D., Gupta, S.K. (eds.) International Conference on Information Systems Security \u2013 ICISS \u201907, of Lecture Notes in Computer Science, vol. 4812, pp 143\u2013155. Springer (2007)","DOI":"10.1007\/978-3-540-77086-2_11"},{"key":"112_CR9","doi-asserted-by":"crossref","unstructured":"Clavier, C., Wurcker, A.: Reverse engineering of a secret AES-like cipher by ineffective fault analysis. In: Fischer, W., Schmidt, J.-M. (eds.) Fault Diagnosis and Tolerance in Cryptography \u2013 FDTC \u201913, pp 119\u2013128. IEEE Computer Society Press (2013)","DOI":"10.1109\/FDTC.2013.16"},{"key":"112_CR10","doi-asserted-by":"crossref","unstructured":"Clavier, C., Gierlichs, B., Verbauwhede, I.: Fault analysis study of IDEA. In: Malkin, T. (ed.) Topics in Cryptology \u2013 CT-RSA \u201908, of Lecture Notes in Computer Science, vol. 274\u2013287. Springer (2008)","DOI":"10.1007\/978-3-540-79263-5_17"},{"key":"112_CR11","doi-asserted-by":"crossref","unstructured":"Clavier, C., Feix, B., Gagnerot, G., Roussellet, M., Verneuil, V.: Improved collision-correlation power analysis on first order protected AES. In: Preneel, B., Takagi, T. (eds.) Cryptographic Hardware and Embedded Systems \u2013 CHES \u201911, of Lecture Notes in Computer Science, vol. 6917 , pp 49\u201362. Springer (2011)","DOI":"10.1007\/978-3-642-23951-9_4"},{"key":"112_CR12","doi-asserted-by":"crossref","unstructured":"Clavier, C., Isorez, Q., Wurcker, A.: Complete SCARE of AES-like block ciphers by chosen plaintext collision power analysis. In: Paul, G., Vaudenay, S. (eds.) International Conference on Cryptology in India \u2013 INDOCRYPT \u201913, Lecture Notes in Computer Science, pp 116\u2013135. Springer (2013)","DOI":"10.1007\/978-3-319-03515-4_8"},{"key":"112_CR13","doi-asserted-by":"crossref","unstructured":"Daudigny, R., Ledig, H., Muller, F., Valette, F.: SCARE of the DES. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) Applied Cryptography and Network Security \u2013 ACNS \u201905, of Lecture Notes in Computer Science, vol. 3531, pp 393\u2013406. Springer-Verlag (2003)","DOI":"10.1007\/11496137_27"},{"key":"112_CR14","doi-asserted-by":"crossref","unstructured":"Guilley, S., Sauvage, L., Micolod, J., R\u00e9al, D., Valette, F.: Defeating any secret cryptography with SCARE attacks. In: Abdalla, M., Barreto, P.S.L.M. (eds.) Progress in Cryptology \u2013 LATINCRYPT \u201910, of Lecture Notes in Computer Science, vol. 6212, pp 273\u2013293. Springer (2010)","DOI":"10.1007\/978-3-642-14712-8_17"},{"key":"112_CR15","doi-asserted-by":"crossref","unstructured":"Joye, M., Quisquater, J.-J. (eds.): Cryptographic Hardware and Embedded Systems \u2013 CHES \u201904. In: Proceedings of 6th International Workshop Cambridge, MA, USA, of Lecture Notes in Computer Science. August 11-13, vol. 3156. Springer-Verlag (2004)","DOI":"10.1007\/b99451"},{"key":"112_CR16","doi-asserted-by":"crossref","unstructured":"Joye, M., Quisquater, J.-J., Yen, S.-M., Yung, M.: Observability analysis \u2013 detecting when improved cryptosystems fail. In: Preneel, B. (ed.) Topics in Cryptology \u2013 CT-RSA \u201902, of Lecture Notes in Computer Science, vol. 2271 , pp 17\u201329. Springer-Verlag (2002)","DOI":"10.1007\/3-540-45760-7_2"},{"key":"112_CR17","doi-asserted-by":"crossref","unstructured":"Ko\u00e7, \u00c7.K., Paar, C. (eds.): Cryptographic Hardware and Embedded Systems \u2013 CHES \u201900. In: Proceedings of Second International Workshop, Worcester, MA, USA, of Lecture Notes in Computer Science. August 17-18, vol. 1965. Springer-Verlag (2000)","DOI":"10.1007\/3-540-44499-8"},{"key":"112_CR18","doi-asserted-by":"crossref","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) Advances in Cryptology \u2013 CRYPTO \u201996, of Lecture Notes in Computer Science, vol. 1109, pp 104\u2013113. Springer-Verlag (1996)","DOI":"10.1007\/3-540-68697-5_9"},{"key":"112_CR19","doi-asserted-by":"crossref","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M.J. (ed.) Advances in Cryptology \u2013 CRYPTO \u201999, of Lecture Notes in Computer Science, vol. 1666, pp 388\u2013397. Springer-Verlag (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"key":"112_CR20","doi-asserted-by":"crossref","unstructured":"Mayer-Sommer, R.: Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smartcards. In Ko\u00e7 and Paar [17], pp. 78\u201392","DOI":"10.1007\/3-540-44499-8_6"},{"key":"112_CR21","doi-asserted-by":"crossref","unstructured":"Messerges, T.S.: Using Second-Order Power Analysis to Attack DPA Resistant Software. In Ko\u00e7 and Paar [17], pages 238\u2013251","DOI":"10.1007\/3-540-44499-8_19"},{"key":"112_CR22","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Investigations of power analysis attacks on smartcards WOST \u201999. In: Proceedings of the USENIX Workshop on Smartcard Technology, USENIX Association. Berkeley, CA, pp 151\u2013162, USA (1999)"},{"key":"112_CR23","unstructured":"National Bureau of Standards. Data Encryption Standard. Federal Information Processing Standard #46, 1977"},{"key":"112_CR24","unstructured":"National Institute of Standards and Technology. Advanced Encryption Standard (AES). Federal Information Processing Standard #197, (2001)"},{"key":"112_CR25","doi-asserted-by":"crossref","unstructured":"Novak, R.: Side-channel attack on substitution blocks. In: Zhou, J., Yung, M., Han, Y. (eds.) Applied Cryptography and Network Security \u2013 ACNS \u201903, of Lecture Notes in Computer Science, vol. 2846, pp 307\u2013318. Springer-Verlag (2003)","DOI":"10.1007\/978-3-540-45203-4_24"},{"key":"112_CR26","doi-asserted-by":"crossref","unstructured":"Novak, R.: Sign-based differential power analysis. In: Chae, K., Yung, M. (eds.) Workshop on Information Security Applications \u2013 WISA \u201903, of Lecture Notes in Computer Science, vol. 2908, pp 203\u2013216. Springer (2003)","DOI":"10.1007\/978-3-540-24591-9_16"},{"key":"112_CR27","doi-asserted-by":"crossref","unstructured":"Paillier, P., Verbauwhede, I. (eds.): Cryptographic Hardware and Embedded Systems \u2013 CHES \u201907. In: Proceedings of 9th International Workshop, Vienna, Austria, of Lecture Notes in Computer Science. September 10\u201313, vol. 4727. Springer-Verlag (2007)","DOI":"10.1007\/978-3-540-74735-2"},{"key":"112_CR28","doi-asserted-by":"crossref","unstructured":"R\u00e9al, D., Dubois, V., Guilloux, A.-M., Valette, F., Drissi, M.: SCARE of an unknown hardware feistel implementation. In: Grimaud, G., Standaert, F.-X. (eds.) Smart Card Research and Advanced Application \u2013 CARDIS \u201908, of Lecture Notes in Computer Science, vol. 5189, pp 218\u2013227. Springer (2008)","DOI":"10.1007\/978-3-540-85893-5_16"},{"key":"112_CR29","doi-asserted-by":"crossref","unstructured":"Rivain, M., Roche, T.: SCARE of secret ciphers with SPN structures. In: Sako, K., Sarkar, P. (eds.) Advances in Cryptology \u2013 ASIACRYPT \u201913, of Lecture Notes in Computer Science, vol. 8269, pp 526\u2013544. Springer-Verlag (2013)","DOI":"10.1007\/978-3-642-42033-7_27"},{"key":"112_CR30","doi-asserted-by":"crossref","unstructured":"Schramm, K., Wollinger, T.J., Paar, C.: A new class of collision attacks and its application to DES. In: Johansson, T. (ed.) Fast Software Encryption \u2013 FSE \u201903, of Lecture Notes in Computer Science, vol. 2887, pp 206\u2013222. Springer-Verlag (2003)","DOI":"10.1007\/978-3-540-39887-5_16"},{"key":"112_CR31","doi-asserted-by":"crossref","unstructured":"Schramm, K., Leander, G., Felke, P., Paar, C.: A collision-attack on AES: combining side channel- and differential-attack. In Joye and Quisquater [15], pages 163\u2013175","DOI":"10.1007\/978-3-540-28632-5_12"},{"issue":"9","key":"112_CR32","doi-asserted-by":"crossref","first-page":"967","DOI":"10.1109\/12.869328","volume":"49","author":"S-M Yen","year":"2000","unstructured":"Yen, S.-M., Joye, M.: Checking before output may not be enough against fault-based cryptanalysis. IEEE Trans. Comput. 49(9), 967\u2013970 (2000)","journal-title":"IEEE Trans. Comput."}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-014-0112-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-014-0112-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-014-0112-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,16]],"date-time":"2019-08-16T13:20:10Z","timestamp":1565961610000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-014-0112-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,23]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,3]]}},"alternative-id":["112"],"URL":"https:\/\/doi.org\/10.1007\/s12095-014-0112-7","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,10,23]]}}}