{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T10:25:58Z","timestamp":1771064758032,"version":"3.50.1"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2014,12,20]],"date-time":"2014-12-20T00:00:00Z","timestamp":1419033600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptogr Eng"],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1007\/s13389-014-0092-8","type":"journal-article","created":{"date-parts":[[2014,12,19]],"date-time":"2014-12-19T12:22:34Z","timestamp":1418991754000},"page":"153-169","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":64,"title":["Security analysis of concurrent error detection against differential fault analysis"],"prefix":"10.1007","volume":"5","author":[{"given":"Xiaofei","family":"Guo","sequence":"first","affiliation":[]},{"given":"Debdeep","family":"Mukhopadhyay","sequence":"additional","affiliation":[]},{"given":"Chenglu","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Ramesh","family":"Karri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,12,20]]},"reference":[{"key":"92_CR1","doi-asserted-by":"crossref","unstructured":"Agoyan, M., Dutertre, J.M., Mirbaha, A.P., Naccache, D., Ribotta, A.L., Tria, A.: How to Flip a Bit? IOLTS pp. 235\u2013239 (2010)","DOI":"10.1109\/IOLTS.2010.5560194"},{"key":"92_CR2","doi-asserted-by":"crossref","unstructured":"Agoyan, M., Dutertre, J.M., Naccache, D., Robisson, B., Tria, A.: When clocks fail: on critical paths and clock faults. In: Proc. CARDIS, pp. 182\u2013193 (2010)","DOI":"10.1007\/978-3-642-12510-2_13"},{"key":"92_CR3","doi-asserted-by":"crossref","unstructured":"Ali, S.S., Mukhopadhyay, D.: A differential fault analysis on AES key schedule using single fault. In: 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2011, Tokyo, Japan, September 29, 2011, pp. 35\u201342 (2011)","DOI":"10.1109\/FDTC.2011.10"},{"key":"92_CR4","doi-asserted-by":"crossref","unstructured":"Ali, S.S., Mukhopadhyay, D.: Differential fault analysis of AES-128 key schedule using a single multi-byte fault. In: Smart Card Research and Advanced Applications - 10th IFIP WG 8.8\/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14\u201316, 2011, Revised Selected Papers, pp. 50\u201364 (2011)","DOI":"10.1007\/978-3-642-27257-8_4"},{"key":"92_CR5","doi-asserted-by":"crossref","unstructured":"Ali, S.S., Mukhopadhyay, D.: An improved differential fault analysis on AES-256. In: Progress in Cryptology - AFRICACRYPT 2011: 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5\u20137, 2011, Proceedings, pp. 332\u2013347 (2011)","DOI":"10.1007\/978-3-642-21969-6_21"},{"key":"92_CR6","doi-asserted-by":"crossref","unstructured":"Ali, S.S., Mukhopadhyay, D., Tunstall, M.: Differential fault analysis of AES: towards reaching its limits. J. Cryptogr. Eng. 3, 73\u201397 (2013)","DOI":"10.1007\/s13389-012-0046-y"},{"key":"92_CR7","doi-asserted-by":"crossref","unstructured":"Amiel, F., Clavier, C., Tunstall, M.: Fault analysis of dpa-resistant algorithms. FDTC, pp. 223\u2013236 (2006)","DOI":"10.1007\/11889700_20"},{"issue":"11","key":"92_CR8","doi-asserted-by":"crossref","first-page":"3056","DOI":"10.1109\/JPROC.2012.2188769","volume":"100","author":"A Barenghi","year":"2012","unstructured":"Barenghi, A., Breveglieri, L., Koren, I., Naccache, D.: Fault injection attacks on cryptographic devices: theory, practice, and countermeasures. Proc. IEEE 100(11), 3056\u20133076 (2012)","journal-title":"Proc. IEEE"},{"key":"92_CR9","doi-asserted-by":"crossref","unstructured":"Barenghi, A., Hocquet, C., Bol, D., Standaert, F.X., Regazzoni, F., Koren, I.: Exploring the Feasibility of low cost fault injection attacks on sub-threshold devices through an example of a 65 nm AES implementation, pp. 48\u201360 (2011)","DOI":"10.1007\/978-3-642-25286-0_4"},{"key":"92_CR10","doi-asserted-by":"crossref","unstructured":"Battistello, A., Giraud, C.: Fault analysis of infective AES computations. FDTC, pp. 101\u2013107 (2013)","DOI":"10.1109\/FDTC.2013.12"},{"issue":"4","key":"92_CR11","doi-asserted-by":"crossref","first-page":"492","DOI":"10.1109\/TC.2003.1190590","volume":"52","author":"G Bertoni","year":"2003","unstructured":"Bertoni, G., Breveglieri, L., Koren, I., Maistri, P., Piuri, V.: Error analysis and detection procedures for a hardware implementation of the advanced encryption standard. IEEE Trans. Comput. 52(4), 492\u2013505 (2003)","journal-title":"IEEE Trans. Comput."},{"key":"92_CR12","doi-asserted-by":"crossref","unstructured":"Bl\u00f6mer, J., Seifert, J.P.: Fault Based cryptanalysis of the advanced encryption standard. FC, pp. 162\u2013181 (2003)","DOI":"10.1007\/978-3-540-45126-6_12"},{"key":"92_CR13","unstructured":"Boost C++ Libraries. http:\/\/www.boost.org\/"},{"key":"92_CR14","doi-asserted-by":"crossref","first-page":"635","DOI":"10.1109\/TC.2007.1015","volume":"56","author":"L Breveglieri","year":"2007","unstructured":"Breveglieri, L., Koren, I., Maistri, P.: An Operation-centered approach to fault detection in symmetric cryptography ciphers. IEEE Trans. Comput. 56, 635\u2013649 (2007)","journal-title":"IEEE Trans. Comput."},{"key":"92_CR15","doi-asserted-by":"crossref","unstructured":"Briais, S., Cioranesco, J.M., Danger, J.L., Guilley, S., Naccache, D., Porteboeuf, T.: Random active shield. FDTC, pp. 103\u2013113 (2012)","DOI":"10.1109\/FDTC.2012.11"},{"key":"92_CR16","doi-asserted-by":"crossref","unstructured":"Canivet, G., Clediere, J., Ferron, J., Valette, F., Renaudin, M., Leveugle, R.: Detailed analyses of single laser shot effects in the configuration of a Virtex-II FPGA. IOLTS, pp. 289\u2013294 (2008)","DOI":"10.1109\/IOLTS.2008.41"},{"key":"92_CR17","doi-asserted-by":"crossref","unstructured":"Canivet, G., Maistri, P., Leveugle, R., Cl\u00e9di\u00e8re, J., Valette, F., Renaudin, M.: Glitch and laser fault attacks onto a secure aes implementation on a sram-based fpga. J. Cryptol. 24 (2011)","DOI":"10.1007\/s00145-010-9083-9"},{"issue":"6","key":"92_CR18","first-page":"730","volume":"55","author":"Y Chih-Hsu","year":"2006","unstructured":"Chih-Hsu, Y., Bing-Fei, W.: Simple error detection methods for hardware implementation of advanced encryption standard. IEEE Trans. Comput. 55(6), 730\u2013731 (2006)","journal-title":"IEEE Trans. Comput."},{"key":"92_CR19","doi-asserted-by":"crossref","unstructured":"Cover, T.M., Thomas, J.A.: Elements of information theory. Wiley (1991)","DOI":"10.1002\/0471200611"},{"key":"92_CR20","doi-asserted-by":"crossref","unstructured":"Dehbaoui, A., Dutertre, J., Robisson, B., Tria, A.: Electromagnetic transient faults injection on a hardware and a software implementations of AES. In: Proc. IEEE FDTC, pp. 7\u201315 (2012)","DOI":"10.1109\/FDTC.2012.15"},{"key":"92_CR21","doi-asserted-by":"crossref","unstructured":"Dutertre, J.M., Fournier, J., Mirbaha, A.P., Naccache, D., Rigaud, J.B., Robisson, B., Tria, A.: Review of fault injection mechanisms and consequences on countermeasures design. DTIS, pp. 1\u20136 (2011)","DOI":"10.1109\/DTIS.2011.5941421"},{"key":"92_CR22","doi-asserted-by":"crossref","unstructured":"Giraud, C.: DFA on AES. AES, pp. 27\u201341 (2005)","DOI":"10.1007\/11506447_4"},{"key":"92_CR23","doi-asserted-by":"crossref","unstructured":"Guo, X., Karri, R.: Invariance-based concurrent error detection for advanced encryption standard. In: Design Automation Conference (DAC), 2012 49th ACM\/EDAC\/IEEE, 3\u20137 June 2012, San Francisco, CA, 573\u2013578 (2012)","DOI":"10.1145\/2228360.2228463"},{"issue":"10","key":"92_CR24","doi-asserted-by":"crossref","first-page":"1595","DOI":"10.1109\/TCAD.2013.2263037","volume":"32","author":"X Guo","year":"2013","unstructured":"Guo, X., Karri, R.: Recomputing with permuted operands: a concurrent error detection approach. IEEE Trans. CAD 32(10), 1595\u20131608 (2013)","journal-title":"IEEE Trans. CAD"},{"key":"92_CR25","doi-asserted-by":"crossref","unstructured":"Guo, X., Mukhopadhyay, D., Jin, C., Karri, R.: NREPO: normal basis recomputing with permuted operands. In: IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2014, pp. 118\u2013123 (2014)","DOI":"10.1109\/HST.2014.6855581"},{"key":"92_CR26","doi-asserted-by":"crossref","unstructured":"Jarvinen, K., Blondeau, C., Page, D., Tunstall, M.: Harnessing biased faults in attacks on ECC-based signature schemes. FDTC, pp. 72\u201382 (2012)","DOI":"10.1109\/FDTC.2012.13"},{"key":"92_CR27","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1049\/iet-ifs:20060163","volume":"1","author":"M Joye","year":"2007","unstructured":"Joye, M., Manet, P., Rigaud, J.: Strengthening hardware AES implementations against fault attack. IET Inf. Sec. 1, 106\u2013110 (2007)","journal-title":"IET Inf. Sec."},{"key":"92_CR28","doi-asserted-by":"crossref","unstructured":"Kaminsky, A., Kurdziel, M., Radziszowski, S.: An overview of cryptanalysis research for the advanced encryption standard. MILCOM, pp. 1310\u20131316 (2010)","DOI":"10.1109\/MILCOM.2010.5680130"},{"issue":"12","key":"92_CR29","doi-asserted-by":"crossref","first-page":"2295","DOI":"10.1109\/TVLSI.2012.2231707","volume":"21","author":"D Karaklaji\u0107","year":"2013","unstructured":"Karaklaji\u0107, D., Schmidt, J.M., Verbauwhede, I.: Hardware designer\u2019s guide to fault attacks. IEEE Trans. VLSI 21(12), 2295\u20132306 (2013)","journal-title":"IEEE Trans. VLSI"},{"key":"92_CR30","doi-asserted-by":"crossref","unstructured":"Karpovsky, M., Kulikowski, K.J., Taubin, A.: Robust protection against fault-injection attacks of smart cards implementing the advanced encryption standard. DNS, pp. 93\u2013101 (2004)","DOI":"10.1109\/DSN.2004.1311880"},{"issue":"12","key":"92_CR31","doi-asserted-by":"crossref","first-page":"1509","DOI":"10.1109\/TCAD.2002.804378","volume":"21","author":"R Karri","year":"2002","unstructured":"Karri, R., Wu, K., Mishra, P., Kim, Y.: Concurrent error detection schemes of fault based side-channel cryptanalysis of symmetric block ciphers. IEEE Trans. CAD 21(12), 1509\u20131517 (2002)","journal-title":"IEEE Trans. CAD"},{"key":"92_CR32","doi-asserted-by":"crossref","unstructured":"Khelil, F., Hamdi, M., Guilley, S., Danger, J.L., Selmane, N.: Fault analysis attack on an aes fpga implementation. In: Proc. New Technologies, Mobility and Security, pp. 1\u20135 (2008)","DOI":"10.1109\/NTMS.2008.ECP.45"},{"key":"92_CR33","doi-asserted-by":"crossref","unstructured":"Kim, C.H.: Differential fault analysis against AES-192 and AES-256 with minimal faults. FDTC, pp. 3\u20139 (2010)","DOI":"10.1109\/FDTC.2010.10"},{"key":"92_CR34","doi-asserted-by":"crossref","unstructured":"Lashermes, R., Reymond, G., Dutertre, J., Fournier, J., Robisson, B., Tria, A.: A DFA on AES based on the entropy of error distributions. FDTC, pp. 34\u201343 (2012)","DOI":"10.1109\/FDTC.2012.18"},{"key":"92_CR35","doi-asserted-by":"crossref","unstructured":"Li, Y., Sakiyama, K., Gomisawa, S., Fukunaga, T., Takahashi, J., Ohta, K.: Fault sensitivity analysis. In: Proc. CHES, pp. 320\u2013334 (2010)","DOI":"10.1007\/978-3-642-15031-9_22"},{"key":"92_CR36","doi-asserted-by":"crossref","unstructured":"Mozaffari-Kermani, M., Reyhani-Masoleh, A.: Concurrent structure-independent fault detection schemes for the advanced encryption standard. IEEE Trans. Comput. 59(5), 608\u2013622 (2010)","DOI":"10.1109\/TC.2010.33"},{"key":"92_CR37","doi-asserted-by":"crossref","unstructured":"Maistri, P.: Countermeasures against fault attacks: the good, the bad, and the ugly. IOLTS, pp. 134\u2013137 (2011)","DOI":"10.1109\/IOLTS.2011.5993825"},{"issue":"11","key":"92_CR38","doi-asserted-by":"crossref","first-page":"1528","DOI":"10.1109\/TC.2008.149","volume":"57","author":"P Maistri","year":"2008","unstructured":"Maistri, P., Leveugle, R.: Double-data-rate computation as a countermeasure against fault analysis. IEEE Trans. Comput. 57(11), 1528\u20131539 (2008)","journal-title":"IEEE Trans. Comput."},{"key":"92_CR39","doi-asserted-by":"crossref","unstructured":"Malkin, T., Standaert, F.X., Yung, M.: A comparative cost\/security analysis of fault attack countermeasures. FDTC, pp. 109\u2013123 (2005)","DOI":"10.1007\/11889700_15"},{"issue":"4","key":"92_CR40","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TR.2003.821937","volume":"52","author":"C Metra","year":"2003","unstructured":"Metra, C., Schiano, L., Favalli, M.: Concurrent detection of power supply noise. IEEE Trans. Reliab. 52(4), 469\u2013475 (2003)","journal-title":"IEEE Trans. Reliab."},{"key":"92_CR41","doi-asserted-by":"crossref","unstructured":"Moradi, A., Shalmani, M.T.M., Salmasizadeh, M.: A generalized method of differential fault attack against AES cryptosystem. In: Proc. CHES, pp. 91\u2013100 (2006)","DOI":"10.1007\/11894063_8"},{"issue":"1","key":"92_CR42","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1109\/TVLSI.2009.2031651","volume":"19","author":"M Mozaffari-Kermani","year":"2011","unstructured":"Mozaffari-Kermani, M., Reyhani-Masoleh, A.: A lightweight high-performance fault detection scheme for the advanced encryption standard using composite field. IEEE Trans. VLSI 19(1), 85\u201391 (2011)","journal-title":"IEEE Trans. VLSI"},{"key":"92_CR43","doi-asserted-by":"crossref","unstructured":"Mukhopadhyay, D.: An improved fault based attack of the advanced encryption standard. AFRICACRYPT, pp. 421\u2013434 (2009)","DOI":"10.1007\/978-3-642-02384-2_26"},{"key":"92_CR44","unstructured":"National Institute of Standards and Technology (NIST): Advanced Encryption Standard (AES). http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf (2001)"},{"key":"92_CR45","doi-asserted-by":"crossref","unstructured":"Dusart, P., L, G., Vivolo, O.: Differential fault analysis on AES. Cryptology ePrint Archive (2003)","DOI":"10.1007\/978-3-540-45203-4_23"},{"key":"92_CR46","doi-asserted-by":"crossref","unstructured":"Piret, G., Quisquater, J.: A differential fault attack technique against spn structures, with application to the AES and Khazad. In: Proc. CHES, pp. 77\u201388 (2003)","DOI":"10.1007\/978-3-540-45238-6_7"},{"key":"92_CR47","doi-asserted-by":"crossref","unstructured":"Saha, D., Mukhopadhyay, D., Chowdhury, D.R.: A diagonal fault attack on the advanced encryption standard. IACR Cryptology ePrint Archive, p. 581 (2009)","DOI":"10.1007\/978-3-642-02384-2_26"},{"issue":"1","key":"92_CR48","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1109\/TIFS.2011.2174984","volume":"7","author":"K Sakiyama","year":"2012","unstructured":"Sakiyama, K., Li, Y., Ohta, K., Iwamoto, M.: Information-theoretic approach to optimal differential fault analysis. IEEE Trans. Inf. Forensics Secur. 7(1), 109\u2013120 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"92_CR49","doi-asserted-by":"crossref","unstructured":"Satoh, A., Sugawara, T., Homma, N., Aoki, T.: High-performance concurrent error detection scheme for AES hardware. In: Proc. CHES, pp. 100\u2013112 (2008)","DOI":"10.1007\/978-3-540-85053-3_7"},{"key":"92_CR50","doi-asserted-by":"crossref","unstructured":"Selmane, N., Bhasin, S., Guilley, S., Graba, T., Danger, J.L.: WDDL is protected against setup time violation attacks. FDTC, pp. 73\u201383 (2009)","DOI":"10.1109\/FDTC.2009.40"},{"key":"92_CR51","doi-asserted-by":"crossref","unstructured":"Selmane, N., Guilley, S., Danger, J.L.: Practical setup time violation attacks on aes. EDCC, pp. 91\u201396 (2008)","DOI":"10.1109\/EDCC-7.2008.11"},{"key":"92_CR52","doi-asserted-by":"crossref","unstructured":"Takahashi, J., Fukunaga, T., Yamakoshi, K.: DFA mechanism on the AES key schedule. FDTC, pp. 62\u201374 (2007)","DOI":"10.1109\/FDTC.2007.13"},{"key":"92_CR53","doi-asserted-by":"crossref","unstructured":"Tunstall, M., Mukhopadhyay, D., Ali, S.: Differential fault analysis of the advanced encryption standard using a single fault. WISTP, pp. 224\u2013233 (2011)","DOI":"10.1007\/978-3-642-21040-2_15"},{"key":"92_CR54","doi-asserted-by":"crossref","unstructured":"Wu, K., Karri, R., Kuznetsov, G., Goessel, M.: Low cost concurrent error detection for the advanced encryption standard. ITC, pp. 1242\u20131248 (2004)","DOI":"10.1109\/TEST.2004.1387397"},{"key":"92_CR55","unstructured":"Xilinx: ChipScope Pro. http:\/\/www.xilinx.com\/support\/documentation\/dt_chipscopepro.htm"},{"key":"92_CR56","doi-asserted-by":"crossref","unstructured":"Yumbul, K., Erdem, S., Savas, E.: On selection of modulus of quadratic codes for the protection of cryptographic operations against fault attacks. IEEE Trans. Comput. (99), 1 (PP) (2012)","DOI":"10.1109\/FDTC.2011.14"}],"container-title":["Journal of Cryptographic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-014-0092-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13389-014-0092-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-014-0092-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,18]],"date-time":"2019-08-18T16:21:05Z","timestamp":1566145265000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13389-014-0092-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12,20]]},"references-count":56,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,9]]}},"alternative-id":["92"],"URL":"https:\/\/doi.org\/10.1007\/s13389-014-0092-8","relation":{},"ISSN":["2190-8508","2190-8516"],"issn-type":[{"value":"2190-8508","type":"print"},{"value":"2190-8516","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,12,20]]}}}