{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T05:28:20Z","timestamp":1749619700930,"version":"3.28.0"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,1,25]],"date-time":"2024-01-25T00:00:00Z","timestamp":1706140800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,25]],"date-time":"2024-01-25T00:00:00Z","timestamp":1706140800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1007\/s12095-024-00698-y","type":"journal-article","created":{"date-parts":[[2024,1,25]],"date-time":"2024-01-25T08:02:29Z","timestamp":1706169749000},"page":"721-744","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Theoretical differential fault attacks on FLIP and FiLIP"],"prefix":"10.1007","volume":"16","author":[{"given":"Pierrick","family":"M\u00e9aux","sequence":"first","affiliation":[]},{"given":"Dibyendu","family":"Roy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,25]]},"reference":[{"key":"698_CR1","doi-asserted-by":"crossref","unstructured":"Babbage, M., Dodd, S.: The MICKEY Stream Ciphers, pages 191\u2013209. Springer Berlin Heidelberg, Berlin Heidelberg (2008)","DOI":"10.1007\/978-3-540-68351-3_15"},{"key":"698_CR2","doi-asserted-by":"crossref","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults (extended abstract). In: Fumy, W. (ed.) Advances in Cryptology - EUROCRYPT \u201997, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding, vol. 1233 of Lecture Notes in Computer Science, pages 37\u201351. Springer (1997)","DOI":"10.1007\/3-540-69053-0_4"},{"key":"698_CR3","doi-asserted-by":"crossref","unstructured":"Banik, S., Maitra, S.: A differential fault attack on mickey 2.0. In: Bertoni, G., Coron, J.-S., (eds.) Cryptographic Hardware and Embedded Systems - CHES 2013, pages 215\u2013232. Springer, Berlin Heidelberg (2013)","DOI":"10.1007\/978-3-642-40349-1_13"},{"key":"698_CR4","doi-asserted-by":"crossref","unstructured":"Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski, B.S. Jr. (ed.) Advances in Cryptology - CRYPTO \u201997, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings, vol. 1294 of Lecture Notes in Computer Science, pages 513\u2013525. Springer (1997)","DOI":"10.1007\/BFb0052259"},{"key":"698_CR5","doi-asserted-by":"crossref","unstructured":"Bellare, M., Yee, B.: Forward-security in private-key cryptography. In: Joye, M. (ed.) Topics in Cryptology \u2013 CT-RSA 2003. Springer, Berlin Heidelberg (2003)","DOI":"10.1007\/3-540-36563-X_1"},{"key":"698_CR6","doi-asserted-by":"crossref","unstructured":"Carlet, C.: Boolean Functions for Cryptography and Coding Theory. Cambridge University Press (2021)","DOI":"10.1017\/9781108606806"},{"key":"698_CR7","doi-asserted-by":"crossref","unstructured":"Canteaut, A., Carpov, S., Fontaine, C., Lepoint, T., Naya-Plasencia, M., Paillier, P., Sirdey, R.: Stream ciphers: A practical solution for efficient homomorphic-ciphertext compression. In: Peyrin, T. (ed.) FSE 2016, vol. 9783 of LNCS (2016)","DOI":"10.1007\/978-3-662-52993-5_16"},{"key":"698_CR8","unstructured":"Cong, K., Das, D., Park, J., Pereira, H.V.L.: Sortinghat: Efficient private decision tree evaluation via homomorphic encryption and transciphering. In: Yin, H., Stavrou, A., Cremers, C., Shi, E. (eds.) Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pages 563\u2013577. ACM (2022)"},{"key":"698_CR9","doi-asserted-by":"crossref","unstructured":"Courtois, N., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: Biham, E. (ed.) EUROCRYPT 2003, vol. 2656 of LNCS. Springer, Heidelberg (2003)","DOI":"10.1007\/3-540-39200-9_21"},{"issue":"5","key":"698_CR10","doi-asserted-by":"publisher","first-page":"3404","DOI":"10.1109\/TIT.2021.3139804","volume":"68","author":"C Carlet","year":"2022","unstructured":"Carlet, C., M\u00e9aux, P.: A complete study of two classes of boolean functions: direct sums of monomials and threshold functions. IEEE Trans. Inf. Theory 68(5), 3404\u20133425 (2022)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"698_CR11","first-page":"2017","volume":"3","author":"C Carlet","year":"2017","unstructured":"Carlet, C., M\u00e9aux, P., Rotella, Y.: Boolean functions with restricted input and their robustness; application to the FLIP cipher. IACR Trans. Symmetric Cryptol. 3, 2017 (2017)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"698_CR12","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-540-45146-4_11","volume-title":"CRYPTO 2003","author":"N Courtois","year":"2003","unstructured":"Courtois, N.: Fast algebraic attacks on stream ciphers with linear feedback. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 176\u2013194. Springer, Heidelberg (2003)"},{"key":"698_CR13","doi-asserted-by":"crossref","unstructured":"Courtois, N.T.: Higher order correlation attacks, xl algorithm and cryptanalysis of toyocrypt. In: Lee, P.J., Lim, C.H. (eds) Information Security and Cryptology \u2013 ICISC 2002, pages 182\u2013199. Springer, Berlin Heidelberg (2003)","DOI":"10.1007\/3-540-36552-4_13"},{"key":"698_CR14","doi-asserted-by":"crossref","unstructured":"Dobraunig, C., Eichlseder, M., Grassi, L., Lallemand, V., Leander, G., List, E., Mendel, F., Rechberger, C.: Rasta: A cipher with low and depth and few ands per bit. In: CRYPTO 2018, 662\u2013692 (2018)","DOI":"10.1007\/978-3-319-96884-1_22"},{"key":"698_CR15","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/978-3-662-53018-4_17","volume-title":"CRYPTO 2016, Part I","author":"S Duval","year":"2016","unstructured":"Duval, S., Lallemand, V., Rotella, Y.: Cryptanalysis of the FLIP family of stream ciphers. In: Robshaw, Matthew, Katz, Jonathan (eds.) CRYPTO 2016, Part I. LNCS, vol. 9814, pp. 457\u2013475. Springer, Heidelberg (2016)"},{"key":"698_CR16","doi-asserted-by":"crossref","unstructured":"Hell, M., Johansson, T., Maximov, A., Meier, W.: The grain family of stream ciphers. In: Robshaw, M.J.B., Billet, O. (eds.) New Stream Cipher Designs - The eSTREAM Finalists, vol. 4986 of Lecture Notes in Computer Science, pages 179\u2013190. Springer (2008)","DOI":"10.1007\/978-3-540-68351-3_14"},{"issue":"1","key":"698_CR17","doi-asserted-by":"publisher","first-page":"45","DOI":"10.46586\/tosc.v2017.i1.45-79","volume":"2017","author":"M Hamann","year":"2017","unstructured":"Hamann, M., Krause, M., Meier, W.: LIZARD - A lightweight stream cipher for power-constrained devices. IACR Trans. Symmetric Cryptol. 2017(1), 45\u201379 (2017)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"698_CR18","doi-asserted-by":"crossref","unstructured":"Hoffmann, C., M\u00e9aux, P., Ricosset, T.: Transciphering, using filip and TFHE for an efficient delegation of computation. In: Bhargavan, K., Oswald, E., Prabhakaran, M. (eds) Progress in Cryptology - INDOCRYPT 2020 - 21st International Conference on Cryptology in India, Bangalore, India, December 13-16, 2020, Proceedings, vol. 12578 of Lecture Notes in Computer Science, pages 39\u201361. Springer (2020)","DOI":"10.1007\/978-3-030-65277-7_3"},{"key":"698_CR19","unstructured":"Hongjun, W.: A lightweight authenticated cipher. https:\/\/competitions.cr.yp.to\/round3\/acornv3.pdf (2016)"},{"key":"698_CR20","doi-asserted-by":"crossref","unstructured":"Hoch, J.J., Shamir, A.: Fault analysis of stream ciphers. In: Joye, M., Quisquater, J.-J. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2004, pages 240\u2013253. Springer, Berlin Heidelberg (2004)","DOI":"10.1007\/978-3-540-28632-5_18"},{"key":"698_CR21","doi-asserted-by":"crossref","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M.J. (ed.) Advances in Cryptology - CRYPTO \u201999, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings, vol. 1666 of Lecture Notes in Computer Science, pages 388\u2013397. Springer (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"key":"698_CR22","doi-asserted-by":"crossref","unstructured":"Kahn, J., Kalai, G., Linial, N.: The influence of variables on boolean functions. In: [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science, pages 68\u201380 (1988)","DOI":"10.1109\/SFCS.1988.21923"},{"key":"698_CR23","doi-asserted-by":"crossref","unstructured":"Kocher, P.C.: Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems. In: Advances in Cryptology - CRYPTO \u201996, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings, vol. 1109 of Lecture Notes in Computer Science, pages 104\u2013113. Springer (1996)","DOI":"10.1007\/3-540-68697-5_9"},{"issue":"2","key":"698_CR24","doi-asserted-by":"publisher","first-page":"52","DOI":"10.46586\/tosc.v2016.i2.52-79","volume":"2016","author":"Vasily Mikhalev","year":"2017","unstructured":"Mikhalev, Vasily, Armknecht, Frederik, M\u00fcller, Christian: On ciphers that continuously access the non-volatile key. IACR Trans. Symmetric Cryptol. 2016(2), 52\u201379 (2017)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"698_CR25","doi-asserted-by":"crossref","unstructured":"M\u00e9aux, P., Carlet, C., Journault, A., Standaert, F.: Improved filter permutators for efficient FHE: better instances and implementations. In: Hao, F., Ruj, S., Sen Gupta, S. (eds) INDOCRYPT, vol. 11898 of LNCS, pages 68\u201391 (2019)","DOI":"10.1007\/978-3-030-35423-7_4"},{"key":"698_CR26","unstructured":"M\u00e9aux, P., Carlet, C., Journault, A., Standaert, F.-X.: Improved filter permutators: Combining symmetric encryption design, boolean functions, low complexity cryptography, and homomorphic encryption, for private delegation of computations. Cryptology ePrint Archive, Report 2019\/483 (2019)"},{"key":"698_CR27","doi-asserted-by":"crossref","unstructured":"M\u00e9aux, P., Journault, A., Standaert, F.-X., Carlet, C.: Towards stream ciphers for efficient fhe with low-noise ciphertexts. In: Fischlin, M., Coron, J.-S. (eds) Advances in Cryptology \u2013 EUROCRYPT 2016, pages 311\u2013343. Springer, Berlin Heidelberg (2016)","DOI":"10.1007\/978-3-662-49890-3_13"},{"key":"698_CR28","doi-asserted-by":"crossref","unstructured":"M\u00e9aux, P., Park, J., Pereira, H.V.L.: Towards practical transciphering for FHE with setup independent of the plaintext space. IACR Cryptol. ePrint Arch., page 1531, (2023)","DOI":"10.62056\/anxrxrxqi"},{"issue":"10","key":"698_CR29","doi-asserted-by":"publisher","first-page":"1804","DOI":"10.1109\/TC.2017.2700469","volume":"66","author":"S Maitra","year":"2017","unstructured":"Maitra, S., Siddhanti, A., Sarkar, S.: A differential fault attack on plantlet. IEEE Trans. Comput. 66(10), 1804\u20131808 (2017)","journal-title":"IEEE Trans. Comput."},{"key":"698_CR30","doi-asserted-by":"crossref","unstructured":"Naehrig, M., Lauter, K., Vaikuntanathan, V.: Can homomorphic encryption be practical? In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, CCSW \u201911, page 113\u2013124. Association for Computing Machinery, New York, NY, USA (2011)","DOI":"10.1145\/2046660.2046682"},{"key":"698_CR31","doi-asserted-by":"crossref","unstructured":"Roy, D., Bathe, B., Maitra, S.: Differential fault attack on kreyvium flip. IEEE Trans. Comput. (2020)","DOI":"10.1109\/TC.2020.3038236"},{"key":"698_CR32","doi-asserted-by":"crossref","unstructured":"Radheshwar, R., Kansal, M., M\u00e9aux, P., Roy, D.: Differential fault attack on rasta and filip-dsm. IEEE Trans. Comput. 1\u20138 (2023)","DOI":"10.1109\/TC.2023.3244629"},{"key":"698_CR33","unstructured":"Robshaw, M.: The eSTREAM Project, pages 1\u20136. Springer Berlin Heidelberg, Berlin, Heidelberg (2008)"},{"key":"698_CR34","unstructured":"Sage Developers: SageMath, the Sage Mathematics Software System (Version 8.1). https:\/\/www.sagemath.org (2017)"},{"issue":"5","key":"698_CR35","doi-asserted-by":"publisher","first-page":"776","DOI":"10.1109\/TIT.1984.1056949","volume":"30","author":"T Siegenthaler","year":"1984","unstructured":"Siegenthaler, T.: Correlation-immunity of nonlinear combining functions for cryptographic applications. IEEE Trans. Inf. Theory 30(5), 776\u2013780 (1984)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"698_CR36","doi-asserted-by":"crossref","unstructured":"Siddhanti, A., Sarkar, S., Maitra, S., Chattopadhyay, A.: Differential fault attack on grain v1, ACORN v3 and lizard. In: Ali, SS, Danger, J.-L., Eisenbarth, T. (eds.) Security, Privacy, and Applied Cryptography Engineering - 7th International Conference, SPACE 2017, Goa, India, December 13\u201317, 2017, Proceedings, vol. 10662 of Lecture Notes in Computer Science, pages 247\u2013263. Springer (2017)","DOI":"10.1007\/978-3-319-71501-8_14"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-024-00698-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-024-00698-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-024-00698-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,9]],"date-time":"2024-11-09T03:10:21Z","timestamp":1731121821000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-024-00698-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,25]]},"references-count":36,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["698"],"URL":"https:\/\/doi.org\/10.1007\/s12095-024-00698-y","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"type":"print","value":"1936-2447"},{"type":"electronic","value":"1936-2455"}],"subject":[],"published":{"date-parts":[[2024,1,25]]},"assertion":[{"value":"17 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 January 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}