{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:23:40Z","timestamp":1760711020763,"version":"3.37.3"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,8,16]],"date-time":"2022-08-16T00:00:00Z","timestamp":1660608000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,8,16]],"date-time":"2022-08-16T00:00:00Z","timestamp":1660608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptogr Eng"],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1007\/s13389-022-00290-1","type":"journal-article","created":{"date-parts":[[2022,8,16]],"date-time":"2022-08-16T20:02:32Z","timestamp":1660680152000},"page":"475-494","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Fault analysis of the PRINCE family of lightweight ciphers"],"prefix":"10.1007","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0305-7347","authenticated-orcid":false,"given":"Anup Kumar","family":"Kundu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0934-2982","authenticated-orcid":false,"family":"Aikata","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6610-2187","authenticated-orcid":false,"given":"Banashri","family":"Karmakar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4668-073X","authenticated-orcid":false,"given":"Dhiman","family":"Saha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,16]]},"reference":[{"key":"290_CR1","doi-asserted-by":"crossref","unstructured":"Aikata, Karmakar, B., Saha, D.: PRINCE under differential fault attack: now in 3D. In: Chang, C.-H., R\u00fchrmair, U., Katzenbeisser, S., Schaumont, P. (eds.) Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security Workshop, ASHES@CCS 2020, Virtual Event, USA, November 13, 2020, pp. 81\u201391. ACM (2020)","DOI":"10.1145\/3411504.3421218"},{"key":"290_CR2","doi-asserted-by":"crossref","unstructured":"Borghoff, J., Canteaut, A. G\u00fcneysu, T., Kavun, E.B., Knezevic, M., Knudsen, L.R., Leander, G., Nikov, V., Paar, C., Rechberger, C., Rombouts, P., Thomsen, S.S., Yal\u00e7in, T.: PRINCE\u2014a low-latency block cipher for pervasive computing applications\u2014extended abstract. In: Wang, X., Sako, K. (eds.) Advances in cryptology\u2014ASIACRYPT 2012\u201418th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2\u20136, 2012. Proceedings. Lecture Notes in Computer Science, vol. 7658, pp. 208\u2013225. Springer (2012)","DOI":"10.1007\/978-3-642-34961-4_14"},{"issue":"3","key":"290_CR3","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1049\/iet-ifs.2015.0432","volume":"11","author":"P Morawiecki","year":"2017","unstructured":"Morawiecki, P.: Practical attacks on the round-reduced PRINCE. IET Inf. Secur. 11(3), 146\u2013151 (2017)","journal-title":"IET Inf. Secur."},{"key":"290_CR4","doi-asserted-by":"crossref","unstructured":"Jean, J., Nikolic, I., Peyrin, T., Wang, L., Wu, S.: Security analysis of PRINCE. In: Moriai, S. (ed.) Fast Software Encryption\u201420th International Workshop, FSE 2013, Singapore, March 11\u201313, 2013. Revised Selected Papers. Lecture Notes in Computer Science, vol. 8424, pp. 92\u2013111. Springer (2013)","DOI":"10.1007\/978-3-662-43933-3_6"},{"key":"290_CR5","unstructured":"Rasoolzadeh, S., Raddum, H.: Faster key recovery attack on round-reduced PRINCE. In: Bogdanov, A. (ed.) Lightweight Cryptography for Security and Privacy\u20145th International Workshop, LightSec 2016, Aksaray, Turkey, September 21\u201322, 2016, Revised Selected Papers. Lecture Notes in Computer Science, vol. 10098, pp. 3\u201317. Springer (2016)"},{"key":"290_CR6","first-page":"265","volume":"16","author":"R Posteuca","year":"2015","unstructured":"Posteuca, R., Negara, G.: Integral cryptanalysis of round-reduced prince cipher. Proc. Romanian Acad. Ser. A Math. Phys. Tech. Sci. Inf. Sci. 16, 265\u2013269 (2015)","journal-title":"Proc. Romanian Acad. Ser. A Math. Phys. Tech. Sci. Inf. Sci."},{"key":"290_CR7","doi-asserted-by":"crossref","unstructured":"Derbez, P., Perrin, L.: Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE. In: Leander, G. (ed.) Fast Software Encryption\u201422nd International Workshop, FSE 2015, Istanbul, Turkey, March 8\u201311, 2015, Revised Selected Papers. Lecture Notes in Computer Science, vol. 9054, pp. 190\u2013216. Springer (2015)","DOI":"10.1007\/978-3-662-48116-5_10"},{"key":"290_CR8","doi-asserted-by":"crossref","unstructured":"Canteaut, A., Fuhr, T., Gilbert, H., Naya-Plasencia, M., Reinhard, J.-R.: Multiple differential cryptanalysis of round-reduced PRINCE. In: Cid, C., Rechberger, C. (ed.) Fast Software Encryption\u201421st International Workshop, FSE 2014, London, UK, March 3\u20135, 2014. Revised Selected Papers. Lecture Notes in Computer Science, vol. 8540, pp. 591\u2013610. Springer (2014)","DOI":"10.1007\/978-3-662-46706-0_30"},{"key":"290_CR9","unstructured":"Abed, F., List, E., Lucks, S.: On the security of the core of PRINCE against biclique and differential cryptanalysis. IACR Cryptology ePrint Archive, p. 712 (2012)"},{"key":"290_CR10","doi-asserted-by":"crossref","unstructured":"Grassi, L., Rechberger, C.: Practical low data-complexity subspace-trail cryptanalysis of round-reduced PRINCE. In: Dunkelman, O., Sanadhya, S.K. (ed.) Progress in Cryptology\u2014INDOCRYPT 2016\u201417th International Conference on Cryptology in India, Kolkata, India, December 11\u201314, 2016, Proceedings. Lecture Notes in Computer Science, vol. 10095, pp. 322\u2013342 (2016)","DOI":"10.1007\/978-3-319-49890-4_18"},{"issue":"16","key":"290_CR11","doi-asserted-by":"publisher","first-page":"2875","DOI":"10.1002\/sec.1213","volume":"8","author":"G Zhao","year":"2015","unstructured":"Zhao, G., Sun, B., Li, C., Jinshu, S.: Truncated differential cryptanalysis of PRINCE. Secur. Commun. Netw. 8(16), 2875\u20132887 (2015)","journal-title":"Secur. Commun. Netw."},{"issue":"4","key":"290_CR12","first-page":"1041","volume":"33","author":"Y-L Ding","year":"2017","unstructured":"Ding, Y.-L., Zhao, J.-Y., Li, L.-B., Yu, H.-B.: Impossible differential analysis on round-reduced PRINCE. J. Inf. Sci. Eng. 33(4), 1041\u20131053 (2017)","journal-title":"J. Inf. Sci. Eng."},{"key":"290_CR13","unstructured":"Rasoolzadeh, S., Raddum, H.: Cryptanalysis of 6-round PRINCE using 2 known plaintexts. IACR Cryptology ePrint Archive, p. 132 (2016)"},{"key":"290_CR14","doi-asserted-by":"crossref","unstructured":"Rasoolzadeh, S., Raddum, H.: Cryptanalysis of PRINCE with minimal data. In: Pointcheval, D., Nitaj, A., Rachidi, T. (eds.) Progress in Cryptology\u2014AFRICACRYPT 2016\u20138th International Conference on Cryptology in Africa, Fes, Morocco, April 13\u201315, 2016, Proceedings. Lecture Notes in Computer Science, vol. 9646, pp. 109\u2013126. Springer (2016)","DOI":"10.1007\/978-3-319-31517-1_6"},{"key":"290_CR15","unstructured":"Li, L., Jia, K., Wang, X.: (2013) Improved meet-in-the-middle attacks on AES-192 and PRINCE. IACR Cryptology ePrint Archive, p. 573"},{"key":"290_CR16","doi-asserted-by":"crossref","unstructured":"Canteaut, A., Naya-Plasencia, M., Vayssi\u00e8re, B.: Sieve-in-the-middle: improved MITM attacks. In: Canetti, R., Garay, J.A. (eds.) Advances in Cryptology\u2014CRYPTO 2013\u2014-33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18\u201322, 2013. Proceedings, Part I. Lecture Notes in Computer Science, vol. 8042, pp. 222\u2013240. Springer (2013)","DOI":"10.1007\/978-3-642-40041-4_13"},{"key":"290_CR17","doi-asserted-by":"crossref","unstructured":"Fouque, P.-A., Joux, A., Mavromati, C.: Multi-user collisions: applications to discrete logarithm, even-mansour and PRINCE. In: Sarkar, P., Iwata, T. (eds.) Advances in Cryptology\u2014ASIACRYPT 2014\u201420th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7\u201311, 2014. Proceedings, Part I. Lecture Notes in Computer Science, vol. 8873, pp. 420\u2013438. Springer (2014)","DOI":"10.1007\/978-3-662-45611-8_22"},{"issue":"3","key":"290_CR18","doi-asserted-by":"publisher","first-page":"718","DOI":"10.1007\/s00145-013-9175-4","volume":"28","author":"H Soleimany","year":"2015","unstructured":"Soleimany, H., Blondeau, C., Yu, X., Wu, W., Kaisa, N., Zhang, H., Zhang, L., Wang, Y.: Reflection cryptanalysis of PRINCE-like ciphers. J. Cryptol. 28(3), 718\u2013744 (2015)","journal-title":"J. Cryptol."},{"key":"290_CR19","unstructured":"Zheng, Y., Zhen, P., Ou, H.: Two kinds of biclique attacks on lightweight block cipher PRINCE. IACR Cryptology ePrint Archive, p. 1208 (2015)"},{"key":"290_CR20","first-page":"253","volume":"16","author":"R Posteuca","year":"2015","unstructured":"Posteuca, R., Duta, C.-L., Negara, G.: New approaches for round-reduced prince cipher cryptanalysis. Proc. Romanian Acad. Ser. A Math. Phys. Tech. Sci. Inf. Sci. 16, 253\u2013264 (2015)","journal-title":"Proc. Romanian Acad. Ser. A Math. Phys. Tech. Sci. Inf. Sci."},{"key":"290_CR21","doi-asserted-by":"publisher","DOI":"10.1002\/9781118660027","volume-title":"Security of Block Ciphers-From Algorithm Design to Hardware Implementation","author":"K Sakiyama","year":"2015","unstructured":"Sakiyama, K., Sasaki, Y., Li, Y.: Security of Block Ciphers-From Algorithm Design to Hardware Implementation. Wiley, Hoboken (2015)"},{"key":"290_CR22","doi-asserted-by":"crossref","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults (extended abstract). In: Fumy, W. (ed.) Advances in Cryptology\u2014EUROCRYPT \u201997, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11\u201315, 1997, Proceeding. Lecture Notes in Computer Science, vol. 1233, pp. 37\u201351. Springer (1997)","DOI":"10.1007\/3-540-69053-0_4"},{"issue":"2","key":"290_CR23","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s001450010016","volume":"14","author":"D Boneh","year":"2001","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of eliminating errors in cryptographic computations. J. Cryptol. 14(2), 101\u2013119 (2001)","journal-title":"J. Cryptol."},{"key":"290_CR24","doi-asserted-by":"crossref","unstructured":"Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski, B.S. Jr. (ed.) Advances in Cryptology\u2014CRYPTO \u201997, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17\u201321, 1997, Proceedings. Lecture Notes in Computer Science, vol. 1294, pp. 513\u2013525. Springer (1997)","DOI":"10.1007\/BFb0052259"},{"key":"290_CR25","doi-asserted-by":"crossref","unstructured":"Piret, G., Quisquater, J.-J.: A differential fault attack technique against SPN structures, with application to the AES and KHAZAD. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems\u2014CHES 2003, 5th International Workshop, Cologne, Germany, September 8\u201310, 2003, Proceedings. Lecture Notes in Computer Science, vol. 2779, pp. 77\u201388. Springer (2003)","DOI":"10.1007\/978-3-540-45238-6_7"},{"key":"290_CR26","doi-asserted-by":"crossref","unstructured":"Song, L., Hu, L.: Differential fault attack on the PRINCE block cipher. In: Avoine, G., Kara, O. (eds.) Lightweight Cryptography for Security and Privacy - Second International Workshop, LightSec 2013, Gebze, Turkey, May 6\u20137, 2013, Revised Selected Papers. Lecture Notes in Computer Science, vol. 8162, pp. 43\u201354. Springer (2013)","DOI":"10.1007\/978-3-642-40392-7_4"},{"key":"290_CR27","unstructured":"Jovanovic, P., Kreuzer, M., Polian, I.: Multi-stage fault attacks on block ciphers. IACR Cryptology ePrint Archive, p. 778 (2013)"},{"issue":"127\u2013141","key":"290_CR28","first-page":"07","volume":"12","author":"F Zhang","year":"2015","unstructured":"Zhang, F., Zhao, X., Guo, S., Shen, J., Huang, J., Hu, Z.: A comprehensive study of algebraic fault analysis on PRINCE. China Commun. 12(127\u2013141), 07 (2015)","journal-title":"China Commun."},{"key":"290_CR29","doi-asserted-by":"crossref","unstructured":"Bozilov, D., Eichlseder, M., Knezevic, M., Lambin, B., Leander, G., Moos, T., Nikov, V., Rasoolzadeh, S., Todo, Y., Wiemer, F.: PRINCEv2\u2014more security for (almost) no overhead. In: Dunkelman, O., Jacobson, M.J. Jr., O\u2019Flynn, C. (eds.) Selected Areas in Cryptography\u2014SAC 2020\u201427th International Conference, Halifax, NS, Canada (Virtual Event), October 21\u201323, 2020, Revised Selected Papers. Lecture Notes in Computer Science, vol. 12804, pp. 483\u2013511. Springer (2020)","DOI":"10.1007\/978-3-030-81652-0_19"},{"key":"290_CR30","doi-asserted-by":"crossref","unstructured":"Knudsen, L.R., Wagner, D.A.: Integral cryptanalysis. In: Daemen, J., Rijmen V. (eds.) Fast Software Encryption, 9th International Workshop, FSE 2002, Leuven, Belgium, February 4\u20136, 2002, Revised Papers. Lecture Notes in Computer Science. vol. 2365, pp. 112\u2013127. Springer (2002)","DOI":"10.1007\/3-540-45661-9_9"},{"key":"290_CR31","doi-asserted-by":"crossref","unstructured":"Daemen, J., Knudsen, L., Rijmen, V.: The block cipher square. In: Biham, E. (ed.) Fast Software Encryption, 4th International Workshop, FSE \u201997, Haifa, Israel, January 20\u201322, 1997, Proceedings. Lecture Notes in Computer Science, vol. 1267, pp. 149\u2013165. Springer (1997)","DOI":"10.1007\/BFb0052343"},{"key":"290_CR32","volume-title":"A First Course in Probability","author":"S Ross","year":"2005","unstructured":"Ross, S.: A First Course in Probability, 7th edn. Prentice Hall, New York (2005)","edition":"7"},{"key":"290_CR33","doi-asserted-by":"crossref","unstructured":"Papadimitriou, A., Tampas, M., H\u00e9ly, D., Beroulle, V., Maistri, P., Leveugle R.: Validation of RTL laser fault injection model with respect to layout information. In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5\u20137 May, 2015, pp. 78\u201381. IEEE Computer Society (2015)","DOI":"10.1109\/HST.2015.7140241"},{"key":"290_CR34","unstructured":"Lionel, R., Najm, Z., Rauzy, P., Danger, J.-L., Bringer, J., Sauvage, L.: High precision fault injections on the instruction cache of armv7-m architectures. In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5\u20137 May, 2015, pp 62\u201367. IEEE Computer Society (2015)"},{"issue":"3","key":"290_CR35","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s41635-017-0016-z","volume":"1","author":"J Breier","year":"2017","unstructured":"Breier, J., He, W., Bhasin, S., Jap, D., Chef, S., Ong, H.G., Gan, C.L.: Extensive laser fault injection profiling of 65 nm FPGA. J. Hardw. Syst. Secur. 1(3), 237\u2013251 (2017)","journal-title":"J. Hardw. Syst. Secur."},{"key":"290_CR36","doi-asserted-by":"crossref","unstructured":"Dutertre, J.-M., Beroulle, V., Candelier, P., De Castro, S., Faber, L.-B., Flottes, M.-L., Gendrier, P., H\u00e9ly, D., Leveugle, R., Maistri, P., Di Natale, G., Papadimitriou, A., Rouzeyre, B.: Laser fault injection at the CMOS 28 nm technology node: an analysis of the fault model. In: 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2018, Amsterdam, The Netherlands, September 13, 2018, pp. 1\u20136. IEEE Computer Society (2018)","DOI":"10.1109\/FDTC.2018.00009"},{"key":"290_CR37","doi-asserted-by":"crossref","unstructured":"Colombier, B., Grandamme, P., Vernay, J., Chanavat, \u00c9., Bossuet, L., de\u00a0Laulani\u00e9, L., Chassagne, B.: Multi-spot laser fault injection setup: New possibilities for fault injection attacks. In: 20th Smart Card Research and Advanced Application Conference-CARDIS 2021(2021)","DOI":"10.1007\/978-3-030-97348-3_9"},{"key":"290_CR38","doi-asserted-by":"crossref","unstructured":"Sangchoolie, B., Pattabiraman, K., Karlsson, J.: One bit is (not) enough: an empirical study of the impact of single and multiple bit-flip errors. In: 47th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, DSN 2017, Denver, CO, USA, June 26\u201329, 2017, pp. 97\u2013108. IEEE Computer Society (2017)","DOI":"10.1109\/DSN.2017.30"},{"key":"290_CR39","doi-asserted-by":"crossref","unstructured":"Saha, S., Bag, A., Basu Roy, D., Patranabis, S., Mukhopadhyay, D.: Fault template attacks on block ciphers exploiting fault propagation. In: Canteaut, A., Ishai, Y. (eds.) Advances in Cryptology\u2014EUROCRYPT 2020\u201439th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10\u201314, 2020, Proceedings, Part I. Lecture Notes in Computer Science, vol. 12105, pp. 612\u2013643. Springer (2020)","DOI":"10.1007\/978-3-030-45721-1_22"},{"key":"290_CR40","doi-asserted-by":"crossref","unstructured":"Daemen, J., Vincent, R.: The Design of Rijndael: AES\u2014The Advanced Encryption Standard. Information Security and Cryptography. Springer (2002)","DOI":"10.1007\/978-3-662-04722-4"},{"key":"290_CR41","doi-asserted-by":"crossref","unstructured":"Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) Cryptographic Hardware and Embedded Systems\u2014CHES 2007, 9th International Workshop, Vienna, Austria, September 10\u201313, 2007, Proceedings. Lecture Notes in Computer Science, vol. 4727, pp. 450\u2013466. Springer (2007)","DOI":"10.1007\/978-3-540-74735-2_31"}],"container-title":["Journal of Cryptographic Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-022-00290-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13389-022-00290-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-022-00290-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,19]],"date-time":"2022-10-19T13:17:03Z","timestamp":1666185423000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13389-022-00290-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,16]]},"references-count":41,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["290"],"URL":"https:\/\/doi.org\/10.1007\/s13389-022-00290-1","relation":{},"ISSN":["2190-8508","2190-8516"],"issn-type":[{"type":"print","value":"2190-8508"},{"type":"electronic","value":"2190-8516"}],"subject":[],"published":{"date-parts":[[2022,8,16]]},"assertion":[{"value":"29 June 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 May 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 August 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}