{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T07:22:59Z","timestamp":1770880979893,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,6,2]],"date-time":"2023-06-02T00:00:00Z","timestamp":1685664000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,2]],"date-time":"2023-06-02T00:00:00Z","timestamp":1685664000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptogr Eng"],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1007\/s13389-023-00324-2","type":"journal-article","created":{"date-parts":[[2023,6,2]],"date-time":"2023-06-02T12:41:05Z","timestamp":1685709665000},"page":"57-70","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Detection of security vulnerabilities in cryptographic ICs against fault injection attacks based on compressed sensing and basis pursuit"],"prefix":"10.1007","volume":"14","author":[{"given":"Cuiping","family":"Shao","sequence":"first","affiliation":[]},{"given":"Dongyan","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Huiyun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Song","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Shunxian","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Liuqing","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,2]]},"reference":[{"issue":"5","key":"324_CR1","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1515\/msr-2018-0025","volume":"18","author":"I Andr\u00e1\u0161","year":"2018","unstructured":"Andr\u00e1\u0161, I., Dolinsk\u1ef3, P., Michaeli, L., \u0160aliga, J.: Sparse signal acquisition via compressed sensing and principal component analysis. Meas. Sci. Rev. 18(5), 175\u2013182 (2018)","journal-title":"Meas. Sci. Rev."},{"key":"324_CR2","doi-asserted-by":"publisher","first-page":"73133","DOI":"10.1109\/ACCESS.2021.3080257","volume":"9","author":"KZ Azar","year":"2021","unstructured":"Azar, K.Z., Kamali, H.M., Homayoun, H., Sasan, A.: From cryptography to logic locking: a survey on the architecture evolution of secure scan chains. IEEE Access 9, 73133\u201373151 (2021)","journal-title":"IEEE Access"},{"key":"324_CR3","doi-asserted-by":"crossref","unstructured":"Breier, J., Hou, X.: Introduction to fault analysis in cryptography. In: Automated Methods in Cryptographic Fault Analysis, pp. 1\u201310. Springer (2019)","DOI":"10.1007\/978-3-030-11333-9_1"},{"key":"324_CR4","doi-asserted-by":"crossref","unstructured":"Breier, J., Jap, D., Chen, C.N.: Laser-based fault injection on microcontrollers. In: Fault Tolerant Architectures for Cryptography and Hardware Security, pp. 81\u2013110. Springer (2018)","DOI":"10.1007\/978-981-10-1387-4_5"},{"issue":"1","key":"324_CR5","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/s00365-016-9338-2","volume":"45","author":"A Cohen","year":"2017","unstructured":"Cohen, A., Dahmen, W., DeVore, R.: Orthogonal matching pursuit under the restricted isometry property. Constr. Approx. 45(1), 113\u2013127 (2017)","journal-title":"Constr. Approx."},{"key":"324_CR6","unstructured":"Cooper, M., Schaffer, K.: Security requirements for cryptographic modules (2019)"},{"key":"324_CR7","first-page":"57","volume":"29","author":"P Dey","year":"2016","unstructured":"Dey, P., Rohit, R.S., Adhikari, A.: Full key recovery of acorn with a single fault. J. Inf. Secur. Appl. 29, 57\u201364 (2016)","journal-title":"J. Inf. Secur. Appl."},{"key":"324_CR8","doi-asserted-by":"crossref","unstructured":"Dutertre, J.M., Beroulle, V., Candelier, P., De\u00a0C., S., Faber, L.B., Flottes, M., Gendrier, P., Hely, D., Leveugle, R., Maistri, P.: Laser fault injection at the cmos 28 nm technology node: an analysis of the fault model. In: 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp. 1\u20136. IEEE (2018)","DOI":"10.1109\/FDTC.2018.00009"},{"key":"324_CR9","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.vlsi.2019.11.006","volume":"71","author":"M Eslami","year":"2020","unstructured":"Eslami, M., Ghavami, B., Raji, M., Mahani, A.: A survey on fault injection methods of digital integrated circuits. Integration 71, 154\u2013163 (2020). https:\/\/doi.org\/10.1016\/j.vlsi.2019.11.006","journal-title":"Integration"},{"key":"324_CR10","doi-asserted-by":"publisher","first-page":"894","DOI":"10.1016\/j.compeleceng.2018.01.013","volume":"72","author":"EPK Gilbert","year":"2018","unstructured":"Gilbert, E.P.K., Kaliaperumal, B., Rajsingh, E.B., Lydia, M.: Trust based data prediction, aggregation and reconstruction using compressed sensing for clustered wireless sensor networks. Comput. Electr. Eng. 72, 894\u2013909 (2018)","journal-title":"Comput. Electr. Eng."},{"key":"324_CR11","doi-asserted-by":"crossref","unstructured":"Given-Wilson, T., Jafri, N., Legay, A.: The state of fault injection vulnerability detection. In: International Conference on Verification and Evaluation of Computer and Communication Systems, pp. 3\u201321. Springer (2018)","DOI":"10.1007\/978-3-030-00359-3_1"},{"issue":"2","key":"324_CR12","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s11334-020-00364-5","volume":"16","author":"T Given-Wilson","year":"2020","unstructured":"Given-Wilson, T., Jafri, N., Legay, A.: Combined software and hardware fault injection vulnerability detection. Innov. Syst. Softw. Eng. 16(2), 101\u2013120 (2020)","journal-title":"Innov. Syst. Softw. Eng."},{"key":"324_CR13","doi-asserted-by":"crossref","unstructured":"Hauschild, F., Garb, K., Auer, L., Selmke, B., Obermaier, J.: Archie: A qemu-based framework for architecture-independent evaluation of faults. In: 2021 Workshop on Fault Detection and Tolerance in Cryptography (FDTC), pp. 20\u201330. IEEE (2021)","DOI":"10.1109\/FDTC53659.2021.00013"},{"key":"324_CR14","doi-asserted-by":"crossref","unstructured":"Jin, J.: Application of compressive sensing technology and image processing in space exploration. In: Proceedings of the 7th International Conference on Cyber Security and Information Engineering, pp. 240\u2013244 (2022)","DOI":"10.1145\/3558819.3565086"},{"issue":"7","key":"324_CR15","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.3390\/electronics9071153","volume":"9","author":"Z Kazemi","year":"2020","unstructured":"Kazemi, Z., Hely, D., Fazeli, M., Beroulle, V.: A review on evaluation and configuration of fault injection attack instruments to design attack resistant MCU-based IoT applications. Electronics 9(7), 1153 (2020)","journal-title":"Electronics"},{"key":"324_CR16","unstructured":"Lee, K.J., Liu, C.A., Wu, C.C.: A dynamic-key based secure scan architecture for manufacturing and in-field IC testing. IEEE Trans. Emerging Top. Comput. (2020)"},{"issue":"3","key":"324_CR17","doi-asserted-by":"publisher","first-page":"1341","DOI":"10.1109\/TNS.2015.2423672","volume":"62","author":"H Li","year":"2015","unstructured":"Li, H., Du, G., Shao, C., Dai, L., Xu, G., Guo, J.: Heavy-ion microbeam fault injection into SRAM-based FPGA implementations of cryptographic circuits. IEEE Trans. Nucl. Sci. 62(3), 1341\u20131348 (2015)","journal-title":"IEEE Trans. Nucl. Sci."},{"issue":"17","key":"324_CR18","doi-asserted-by":"publisher","first-page":"5909","DOI":"10.3390\/app10175909","volume":"10","author":"L Li","year":"2020","unstructured":"Li, L., Fang, Y., Liu, L., Peng, H., Kurths, J., Yang, Y.: Overview of compressed sensing: sensing model, reconstruction algorithm, and its applications. Appl. Sci. 10(17), 5909 (2020)","journal-title":"Appl. Sci."},{"key":"324_CR19","doi-asserted-by":"crossref","unstructured":"Petryk, D., Dyka, Z., Sorge, R., Sch\u00e4ffner, J., Langend\u00f6rfer, P.: Optical fault injection attacks against radiation-hard shift registers. In: 2021 24th Euromicro Conference on Digital System Design (DSD), pp. 371\u2013375. IEEE (2021)","DOI":"10.1109\/DSD53832.2021.00062"},{"key":"324_CR20","doi-asserted-by":"crossref","unstructured":"Polian, I.: Fault attacks on cryptographic circuits. In: 2019 17th IEEE International New Circuits and Systems Conference (NEWCAS), pp. 1\u20134 (2019). 10.1109\/NEWCAS44328.2019.8961309","DOI":"10.1109\/NEWCAS44328.2019.8961309"},{"issue":"5","key":"324_CR21","doi-asserted-by":"publisher","first-page":"2443","DOI":"10.3390\/app12052443","volume":"12","author":"FE Potestad-Ord\u00f3\u00f1ez","year":"2022","unstructured":"Potestad-Ord\u00f3\u00f1ez, F.E., Tena-S\u00e1nchez, E., Acosta-Jim\u00e9nez, A.J., Jim\u00e9nez-Fern\u00e1ndez, C.J., Chaves, R.: Hardware countermeasures benchmarking against fault attacks. Appl. Sci. 12(5), 2443 (2022)","journal-title":"Appl. Sci."},{"issue":"3","key":"324_CR22","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSP.2018.2789521","volume":"35","author":"Z Qin","year":"2018","unstructured":"Qin, Z., Fan, J., Liu, Y., Gao, Y., Li, G.Y.: Sparse representation for wireless communications: a compressive sensing approach. IEEE Signal Process. Mag. 35(3), 40\u201358 (2018)","journal-title":"IEEE Signal Process. Mag."},{"key":"324_CR23","doi-asserted-by":"crossref","unstructured":"Richter-Brockmann, J., Sasdrich, P., Guneysu, T.: Revisiting fault adversary models\u2013hardware faults in theory and practice. IEEE Trans. Comput. (2022)","DOI":"10.1109\/TC.2022.3164259"},{"key":"324_CR24","doi-asserted-by":"crossref","unstructured":"Rodriguez, J., Baldomero, A., Montilla, V., Mujal, J.: Llfi: Lateral laser fault injection attack. In: 2019 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp. 41\u201347. IEEE (2019)","DOI":"10.1109\/FDTC.2019.00014"},{"issue":"3","key":"324_CR25","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1016\/j.asej.2018.11.007","volume":"10","author":"NF Saudy","year":"2019","unstructured":"Saudy, N.F., Ali, I.A., Al Barkouky, R.: Error analysis and detection procedures for elliptic curve cryptography. Ain Shams Eng. J. 10(3), 587\u2013597 (2019)","journal-title":"Ain Shams Eng. J."},{"issue":"10","key":"324_CR26","doi-asserted-by":"publisher","first-page":"4928","DOI":"10.1007\/s11227-018-2287-8","volume":"74","author":"H Sedjelmaci","year":"2018","unstructured":"Sedjelmaci, H., Senouci, S.M.: Cyber security methods for aerial vehicle networks: taxonomy, challenges and solution. J. Supercomput. 74(10), 4928\u20134944 (2018)","journal-title":"J. Supercomput."},{"key":"324_CR27","doi-asserted-by":"crossref","unstructured":"Selmke, B., Pollanka, M., Duensing, A., Strieder, E., Wen, H., Mittermair, M., Sigl, G., et\u00a0al.: On the application of two-photon absorption for laser fault injection attacks: pushing the physical boundaries for laser-based fault injection. IACR Trans. Cryptogr. Hardware and Embedded Syst. pp. 862\u2013885 (2022)","DOI":"10.46586\/tches.v2022.i4.862-885"},{"key":"324_CR28","doi-asserted-by":"crossref","unstructured":"Selmke, B., Pollanka, M., Duensing, A., Strieder, E., Wen, H., Mittermair, M., Sigl, G., et\u00a0al.: On the application of two-photon absorption for laser fault injection attacks: Pushing the physical boundaries for laser-based fault injection. IACR Trans. Cryptogr. Hardw. Embed. Syst. pp. 862\u2013885 (2022)","DOI":"10.46586\/tches.v2022.i4.862-885"},{"key":"324_CR29","doi-asserted-by":"crossref","unstructured":"Selmke, B., Strieder, E., Heyszl, J., Freud, S., Damm, T.: Breaking black box crypto-devices using laser fault injection. In: International Symposium on Foundations and Practice of Security, pp. 75\u201390. Springer (2022)","DOI":"10.1007\/978-3-031-08147-7_6"},{"key":"324_CR30","doi-asserted-by":"crossref","unstructured":"Shao, C., Li, H., Zhang, X.: Cryptographic implementation of rsa for ion fault injection attack. In: 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), pp. 791\u2013796. IEEE (2014)","DOI":"10.1109\/CCNC.2014.6994410"},{"issue":"6","key":"324_CR31","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1049\/iet-ifs.2016.0203","volume":"11","author":"C Shao","year":"2017","unstructured":"Shao, C., Li, H., Zhou, J.: Fast and automatic security test on cryptographic ICs against fault injection attacks based on design for security test. IET Inf. Secur. 11(6), 312\u2013318 (2017)","journal-title":"IET Inf. Secur."},{"issue":"10","key":"324_CR32","first-page":"6148","volume":"56","author":"Y Shi","year":"2018","unstructured":"Shi, Y., Zhu, X.X., Yin, W., Bamler, R.: A fast and accurate basis pursuit denoising algorithm with application to super-resolving tomographic SAR. IEEE Trans. Geosci. Remote Sens. 56(10), 6148\u20136158 (2018)","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"324_CR33","doi-asserted-by":"crossref","unstructured":"Sravani, M.M., Durai, S.A.: Attacks on cryptosystems implemented via vlsi: a review. J. Inf. Secur. Appl. 60, 102,861 (2021)","DOI":"10.1016\/j.jisa.2021.102861"},{"key":"324_CR34","doi-asserted-by":"crossref","unstructured":"Tong, F., Li, L., Peng, H., Yang, Y.: Flexible construction of compressed sensing matrices with low storage space and low coherence. Signal Process. 182, 107,951 (2021)","DOI":"10.1016\/j.sigpro.2020.107951"},{"key":"324_CR35","doi-asserted-by":"publisher","first-page":"849","DOI":"10.1109\/TNANO.2019.2923040","volume":"18","author":"M Traiola","year":"2019","unstructured":"Traiola, M., Virazel, A., Girard, P., Barbareschi, M., Bosio, A.: A test pattern generation technique for approximate circuits based on an ILP-formulated pattern selection procedure. IEEE Trans. Nanotechnol. 18, 849\u2013857 (2019)","journal-title":"IEEE Trans. Nanotechnol."},{"issue":"3","key":"324_CR36","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1109\/TCAD.2021.3063998","volume":"41","author":"H Wang","year":"2021","unstructured":"Wang, H., Li, H., Rahman, F., Tehranipoor, M.M., Farahmandi, F.: Sofi: security property-driven vulnerability assessments of ICS against fault-injection attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(3), 452\u2013465 (2021)","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"issue":"4","key":"324_CR37","doi-asserted-by":"publisher","first-page":"5892","DOI":"10.1109\/JIOT.2018.2869872","volume":"6","author":"J Wang","year":"2018","unstructured":"Wang, J., Li, J., Wang, H., Zhang, L.Y., Cheng, L.M., Lin, Q.: Dynamic scalable elliptic curve cryptographic scheme and its application to in-vehicle security. IEEE Internet Things J. 6(4), 5892\u20135901 (2018)","journal-title":"IEEE Internet Things J."},{"key":"324_CR38","doi-asserted-by":"crossref","unstructured":"Wu, L., Ribera, G., Beringuier-Boher, N., Picek, S.: A fast characterization method for semi-invasive fault injection attacks. In: Topics in Cryptology\u2013CT-RSA 2020: The Cryptographers\u2019 Track at the RSA Conference 2020, San Francisco, CA, USA, February 24\u201328, 2020, Proceedings, pp. 146\u2013170. Springer (2020)","DOI":"10.1007\/978-3-030-40186-3_8"},{"key":"324_CR39","doi-asserted-by":"crossref","unstructured":"Zhang, Q., Chen, Y., Chen, Y., Chi, L., Wu, Y.: A cognitive signals reconstruction algorithm based on compressed sensing. In: 2015 IEEE 5th Asia-Pacific Conference on Synthetic Aperture Radar (APSAR), pp. 724\u2013727. IEEE (2015)","DOI":"10.1109\/APSAR.2015.7306308"}],"container-title":["Journal of Cryptographic Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-023-00324-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13389-023-00324-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-023-00324-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T18:31:17Z","timestamp":1729535477000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13389-023-00324-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,2]]},"references-count":39,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["324"],"URL":"https:\/\/doi.org\/10.1007\/s13389-023-00324-2","relation":{},"ISSN":["2190-8508","2190-8516"],"issn-type":[{"value":"2190-8508","type":"print"},{"value":"2190-8516","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,2]]},"assertion":[{"value":"17 October 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 May 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 June 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interests"}}]}}