{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:45:12Z","timestamp":1761324312287,"version":"3.37.3"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T00:00:00Z","timestamp":1599523200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T00:00:00Z","timestamp":1599523200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s12095-020-00452-0","type":"journal-article","created":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T05:02:32Z","timestamp":1599541352000},"page":"71-100","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Design of fault-resilient S-boxes for AES-like block ciphers"],"prefix":"10.1007","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9847-011X","authenticated-orcid":false,"given":"Swapan","family":"Maiti","sequence":"first","affiliation":[]},{"given":"Dipanwita Roy","family":"Chowdhury","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,8]]},"reference":[{"key":"452_CR1","doi-asserted-by":"publisher","unstructured":"Akdemir, K.D., Wang, Z., Karpovsky, M.G., Sunar, B.: Design of cryptographic devices resilient to fault injection attacks using nonlinear robust codes. In: Fault Analysis in Cryptography, pp. 171\u2013199. https:\/\/doi.org\/10.1007\/978-3-642-29656-7_11","DOI":"10.1007\/978-3-642-29656-7_11"},{"issue":"11","key":"452_CR2","doi-asserted-by":"publisher","first-page":"3056","DOI":"10.1109\/JPROC.2012.2188769","volume":"100","author":"A Barenghi","year":"2012","unstructured":"Barenghi, A., Breveglieri, L., Koren, I., Naccache, D.: Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures. Proc. IEEE 100(11), 3056\u20133076 (2012). https:\/\/doi.org\/10.1109\/JPROC.2012.2188769","journal-title":"Proc. IEEE"},{"key":"452_CR3","doi-asserted-by":"publisher","unstructured":"Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Advances in Cryptology - CRYPTO \u201997, 17Th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings. pp. 513\u2013525. https:\/\/doi.org\/10.1007\/BFb0052259 (1997)","DOI":"10.1007\/BFb0052259"},{"key":"452_CR4","doi-asserted-by":"crossref","unstructured":"Boneh, D., DeMillo, R. A., Lipton, R. J.: On the importance of checking cryptographic protocols for faults (Extended Abstract). In: Advances in Cryptology - EUROCRYPT \u201997, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding. pp. 37\u201351 (1997)","DOI":"10.1007\/3-540-69053-0_4"},{"key":"452_CR5","doi-asserted-by":"publisher","unstructured":"Bousselam, K., Natale, G.D., Flottes, M., Rouzeyre, B.: On countermeasures against fault attacks on the advanced encryption standard. In: Fault Analysis in Cryptography, pp. 89\u2013108 (2012), . https:\/\/doi.org\/10.1007\/978-3-642-29656-7_6","DOI":"10.1007\/978-3-642-29656-7_6"},{"key":"452_CR6","doi-asserted-by":"publisher","unstructured":"Carlet, C.: S-boxes, boolean functions and codes for the resistance of block ciphers to cryptographic attacks, with or without side channels. In: Security, Privacy, and Applied Cryptography Engineering - 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings. pp. 151\u2013171 (2015), . https:\/\/doi.org\/10.1007\/978-3-319-24126-5_10","DOI":"10.1007\/978-3-319-24126-5_10"},{"issue":"3","key":"452_CR7","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1109\/43.489103","volume":"15","author":"K Cattell","year":"1996","unstructured":"Cattell, K., Muzio, J.C.: Synthesis of one-dimensional linear hybrid cellular automata. IEEE Trans. on CAD of Integrated Circuits and Systems 15 (3), 325\u2013335 (1996)","journal-title":"IEEE Trans. on CAD of Integrated Circuits and Systems"},{"key":"452_CR8","unstructured":"Chaudhuri, P.P., Roy Chowdhury, D., Nandi, S., Chattopadhyay, S.: Additive Cellular automata: Theory and Applications. IEEE Computer Socity press (1997)"},{"key":"452_CR9","doi-asserted-by":"crossref","unstructured":"Cusick, T.W., Stanica, P.: Cryptographic boolean functions and applications. Academic Press (2009)","DOI":"10.1016\/B978-0-12-374890-4.00009-4"},{"key":"452_CR10","doi-asserted-by":"publisher","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael: AES - the Advanced Encryption Standard. Information Security and Cryptography, Springer. https:\/\/doi.org\/10.1007\/978-3-662-04722-4 (2002)","DOI":"10.1007\/978-3-662-04722-4"},{"key":"452_CR11","doi-asserted-by":"publisher","unstructured":"Ghosh, S., Saha, D., Sengupta, A., Roy Chowdhury, D.: Preventing fault attacks using fault randomization with a case study on AES. In: Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings. pp. 343\u2013355. https:\/\/doi.org\/10.1007\/978-3-319-19962-7_20(2015)","DOI":"10.1007\/978-3-319-19962-7_20"},{"issue":"3","key":"452_CR12","doi-asserted-by":"publisher","first-page":"311","DOI":"10.13154\/tosc.v2018.i3.311-334","volume":"2018","author":"A Ghoshal","year":"2018","unstructured":"Ghoshal, A., Sadhukhan, R., Patranabis, S., Datta, N., Picek, S., Mukhopadhyay, D.: Lightweight and side-channel secure 4 \u00d7 4 S-boxes from cellular automata rules. IACR Trans. Symmetric Cryptol. 2018(3), 311\u2013334 (2018). https:\/\/doi.org\/10.13154\/tosc.v2018.i3.311-334","journal-title":"IACR Trans. Symmetric Cryptol."},{"issue":"3","key":"452_CR13","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1080\/0161-110291890885","volume":"26","author":"HM Heys","year":"2002","unstructured":"Heys, H.M.: A tutorial on linear and differential cryptanalysis. Cryptologia 26 (3), 189\u2013221 (2002). https:\/\/doi.org\/10.1080\/0161-110291890885","journal-title":"Cryptologia"},{"key":"452_CR14","doi-asserted-by":"publisher","unstructured":"Lomn\u00e9, V., Roche, T., Thillard, A.: On the need of randomness in fault attack countermeasures - application to AES. In: 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven, Belgium, September 9, 2012. Pp. 85\u201394. https:\/\/doi.org\/10.1109\/FDTC.2012.19 (2012)","DOI":"10.1109\/FDTC.2012.19"},{"issue":"1","key":"452_CR15","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/s12095-018-0311-8","volume":"11","author":"L Mariot","year":"2019","unstructured":"Mariot, L., Picek, S., Leporati, A., Jakobovic, D.: Cellular automata based S-boxes. Cryptogr. Commun. 11(1), 41\u201362 (2019). https:\/\/doi.org\/10.1007\/s12095-018-0311-8","journal-title":"Cryptogr. Commun."},{"key":"452_CR16","unstructured":"Mui, E.N.: Practical implementation of Rijndael S-box using combinational logic. Custom R & D Engineer Texco Enterprise Pvt Ltd (2007)"},{"key":"452_CR17","doi-asserted-by":"publisher","unstructured":"Mukhopadhyay, D.: An improved fault based attack of the advanced encryption standard. In: Progress in Cryptology - AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings. pp. 421\u2013434. https:\/\/doi.org\/10.1007\/978-3-642-02384-2_26 (2009)","DOI":"10.1007\/978-3-642-02384-2_26"},{"key":"452_CR18","doi-asserted-by":"publisher","unstructured":"Natale, G. D., Flottes, M., Rouzeyre, B.: An on-line fault detection scheme for Sboxes in secure circuits. In: 13Th IEEE international on-line testing symposium (IOLTS 2007), 8-11 July 2007, Heraklion, Crete, Greece. pp. 57\u201362. https:\/\/doi.org\/10.1109\/IOLTS.2007.16 (2007)","DOI":"10.1109\/IOLTS.2007.16"},{"key":"452_CR19","unstructured":"Neumann, J.V.: The theory of self- reproducing automata. (edited by A.W. Burks) univ of illinois press urbana (1966)"},{"key":"452_CR20","doi-asserted-by":"publisher","unstructured":"Picek, S., Mariot, L., Yang, B., Jakobovic, D., Mentens, N.: Design of S-boxes defined with cellular automata rules. In: Proceedings of the computing frontiers conference, CF\u201917, Siena, Italy, May 15-17, 2017. pp. 409\u2013414. https:\/\/doi.org\/10.1145\/3075564.3079069 (2017)","DOI":"10.1145\/3075564.3079069"},{"key":"452_CR21","doi-asserted-by":"publisher","unstructured":"Piret, G., Quisquater, J.: A differential fault attack technique against SPN structures, with application to the AES and KHAZAD. In: Cryptographic Hardware and Embedded Systems - CHES 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings. pp. 77\u201388. https:\/\/doi.org\/10.1007\/978-3-540-45238-6_7 (2003)","DOI":"10.1007\/978-3-540-45238-6_7"},{"key":"452_CR22","doi-asserted-by":"publisher","unstructured":"Saarinen, M.O.: Cryptographic analysis of all 4 \u00d7 4-bit s-boxes. In: Selected Areas in Cryptography - 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers. pp. 118\u2013133. https:\/\/doi.org\/10.1007\/978-3-642-28496-0_7 (2011)","DOI":"10.1007\/978-3-642-28496-0_7"},{"key":"452_CR23","doi-asserted-by":"crossref","unstructured":"Saha, D., Mukhopadhyay, D., Roy Chowdhury, D.: A diagonal fault attack on the advanced encryption standard. IACR Cryptology ePrint Archive 2009, 581. http:\/\/eprint.iacr.org\/2009\/581 (2009)","DOI":"10.1007\/978-3-642-02384-2_26"},{"key":"452_CR24","doi-asserted-by":"publisher","unstructured":"Schmidt, J., Medwed, M.: Countermeasures for symmetric key ciphers. In: Fault analysis in cryptography, pp. 73\u201387. https:\/\/doi.org\/10.1007\/978-3-642-29656-7_5(2012)","DOI":"10.1007\/978-3-642-29656-7_5"},{"key":"452_CR25","unstructured":"Stallings, W.: Cryptography and network security - principles and practice (3. ed.), Prentice Hall (2003)"},{"key":"452_CR26","doi-asserted-by":"publisher","unstructured":"Tunstall, M., Mukhopadhyay, D., Ali, S.: Differential fault analysis of the advanced encryption standard using a single fault. In: Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings. pp. 224\u2013233. https:\/\/doi.org\/10.1007\/978-3-642-21040-2_15 (2011)","DOI":"10.1007\/978-3-642-21040-2_15"},{"key":"452_CR27","doi-asserted-by":"publisher","unstructured":"Tupsamudre, H., Bisht, S., Mukhopadhyay, D.: Destroying fault invariant with randomization - A countermeasure for AES against differential fault attacks. In: Cryptographic Hardware and Embedded Systems - CHES 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings. pp. 93\u2013111. https:\/\/doi.org\/10.1007\/978-3-662-44709-3_6 (2014)","DOI":"10.1007\/978-3-662-44709-3_6"},{"key":"452_CR28","doi-asserted-by":"crossref","unstructured":"Wolfram, S.: Cryptography with cellular automata. In: Advances in Cryptology - CRYPTO \u201985, Santa Barbara, California, USA, August 18-22, 1985, Proceedings. pp. 429\u2013432 (1985)","DOI":"10.1007\/3-540-39799-X_32"},{"key":"452_CR29","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/0196-8858(86)90028-X","volume":"7","author":"S Wolfram","year":"1986","unstructured":"Wolfram, S.: Random sequence generation by cellular automata. Adv. Appl. Math. 7, 123\u2013169 (1986)","journal-title":"Adv. Appl. Math."}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-020-00452-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-020-00452-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-020-00452-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,8]],"date-time":"2021-09-08T00:09:12Z","timestamp":1631059752000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-020-00452-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,8]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["452"],"URL":"https:\/\/doi.org\/10.1007\/s12095-020-00452-0","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"type":"print","value":"1936-2447"},{"type":"electronic","value":"1936-2455"}],"subject":[],"published":{"date-parts":[[2020,9,8]]},"assertion":[{"value":"20 November 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 August 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 September 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}