{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T11:05:17Z","timestamp":1757588717488},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,8,4]],"date-time":"2024-08-04T00:00:00Z","timestamp":1722729600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,8,4]],"date-time":"2024-08-04T00:00:00Z","timestamp":1722729600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"National Institute of Information and Communications Technology (NICT), Japan","award":["05801"],"award-info":[{"award-number":["05801"]}]},{"name":"Ministry of Internal Affairs and Communications, Japan","award":["JPJ000254"],"award-info":[{"award-number":["JPJ000254"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptogr Eng"],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1007\/s13389-024-00360-6","type":"journal-article","created":{"date-parts":[[2024,8,4]],"date-time":"2024-08-04T13:02:00Z","timestamp":1722776520000},"page":"595-607","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Differential fault attack on AES-based encryption schemes: application to B5G\/6G ciphers\u2014Rocca, Rocca-S and AEGIS"],"prefix":"10.1007","volume":"14","author":[{"given":"Ravi","family":"Anand","sequence":"first","affiliation":[]},{"given":"Takanori","family":"Isobe","sequence":"additional","affiliation":[]},{"given":"Anup Kumar","family":"Kundu","sequence":"additional","affiliation":[]},{"given":"Mostafizar","family":"Rahman","sequence":"additional","affiliation":[]},{"given":"Sahiba","family":"Suryawanshi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,4]]},"reference":[{"key":"360_CR1","doi-asserted-by":"crossref","unstructured":"Anand, R., Banik, S., Caforio, A., Fukushima, K., Isobe, T., Kiyomoto, S., Liu, F., Nakano, Y., Sakamoto, K., Takeuchi, N.: An ultra-high throughput aes-based authenticated encryption scheme for 6g: design and implementation. In: ESORICS 2023 (Private Communication) (2023) (to appear)","DOI":"10.1007\/978-3-031-50594-2_12"},{"key":"360_CR2","doi-asserted-by":"crossref","unstructured":"Anand, R., Isobe, T.: Differential fault attack on rocca. In: International Conference on Information Security and Cryptology, pp. 283\u2013295. Springer, Berlin (2021)","DOI":"10.1007\/978-3-031-08896-4_14"},{"key":"360_CR3","doi-asserted-by":"crossref","unstructured":"Bartlett, H., Dawson, E., Al Mahri, H.Q., Salam, Md.I., Simpson, L., Wong, K.K.-H.: Random fault attacks on a class of stream ciphers. In: Security and Communication Networks (2019)","DOI":"10.1155\/2019\/1680263"},{"key":"360_CR4","doi-asserted-by":"crossref","unstructured":"Berti, F., Guo, C., Pereira, O., Peters, T., Standaert, F.-X.: Tedt, a leakage-resilient aead mode for high (physical) security applications. Cryptology ePrint Archive (2019)","DOI":"10.46586\/tches.v2020.i1.256-320"},{"key":"360_CR5","doi-asserted-by":"crossref","unstructured":"Biham, E., Shamir, A: Differential fault analysis of secret key cryptosystems. In: Advances in Cryptology-CRYPTO\u201997: 17th Annual International Cryptology Conference Santa Barbara, CA, USA August 17\u201321, 1997 Proceedings 17, pp. 513\u2013525. Springer, Berlin (1997)","DOI":"10.1007\/BFb0052259"},{"key":"360_CR6","doi-asserted-by":"crossref","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 37\u201351. Springer, Berlin (1997)","DOI":"10.1007\/3-540-69053-0_4"},{"key":"360_CR7","doi-asserted-by":"crossref","unstructured":"Dey, P., Rohit, R.S., Sarkar, S., Adhikari, A.: Differential fault analysis on tiaoxin and aegis family of ciphers. In: International Symposium on Security in Computing and Communication, pp. 74\u201386. Springer, Berlin (2016)","DOI":"10.1007\/978-981-10-2738-3_7"},{"issue":"3","key":"360_CR8","doi-asserted-by":"publisher","first-page":"547","DOI":"10.46586\/tches.v2018.i3.547-572","volume":"2018","author":"C Dobraunig","year":"2018","unstructured":"Dobraunig, C., Eichlseder, M., Korak, T., Mangard, S., Mendel, F., Primas, R.: SIFA: exploiting ineffective fault inductions on symmetric cryptography. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3), 547\u2013572 (2018)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"360_CR9","doi-asserted-by":"crossref","unstructured":"Fuhr, T., Jaulmes, \u00c9., Lomn\u00e9, V., Thillard, A.: Fault attacks on AES with faulty ciphertexts only. In: FDTC, pp. 108\u2013118. IEEE Computer Society (2013)","DOI":"10.1109\/FDTC.2013.18"},{"key":"360_CR10","unstructured":"Gueron, S.: Intel Advanced Encryption Standard (AES) New Instructions Set (2010)"},{"key":"360_CR11","unstructured":"I.: Intel Intrinsics Guide. Official\u00a0webpage Corporation. https:\/\/www.intel.com\/content\/www\/us\/en\/docs\/intrinsics-guide\/index.html"},{"key":"360_CR12","unstructured":"Jana, A., Kundu, A.K., Paul, G.: Sdfa: statistical-differential fault attack on linear structured sbox-based ciphers. Cryptology ePrint Archive, Paper 2023\/1018 (2023). https:\/\/eprint.iacr.org\/2023\/1018"},{"key":"360_CR13","doi-asserted-by":"crossref","unstructured":"Jean, J., Nikoli\u0107, I.: Efficient design strategies based on the aes round function. In: Fast Software Encryption: 23rd International Conference, FSE 2016, Bochum, Germany, March 20\u201323, 2016, Revised Selected Papers 23, pp. 334\u2013353. Springer, Berlin (2016)","DOI":"10.1007\/978-3-662-52993-5_17"},{"key":"360_CR14","doi-asserted-by":"crossref","unstructured":"Khairallah, M., Bhasin, S., Chattopadhyay, A: On misuse of nonce-misuse resistance: adapting differential fault attacks on (few) caesar winners. In: 2019 IEEE 8th International Workshop on Advances in Sensors and Interfaces (IWASI), pp. 189\u2013193. IEEE (2019)","DOI":"10.1109\/IWASI.2019.8791393"},{"key":"360_CR15","doi-asserted-by":"crossref","unstructured":"Khairallah, M., Hou, X., Najm, Z., Breier, J., Bhasin, S., Peyrin, T.: Sok: on dfa vulnerabilities of substitution-permutation networks. In: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, pp. 403\u2013414 (2019)","DOI":"10.1145\/3321705.3329810"},{"issue":"8","key":"360_CR16","doi-asserted-by":"publisher","first-page":"2418","DOI":"10.1109\/TC.2023.3244629","volume":"72","author":"R Radheshwar","year":"2023","unstructured":"Radheshwar, R., Kansal, M., M\u00e9aux, P., Roy, D.: Differential fault attack on rasta and filip_dsm. IEEE Trans. Comput. 72(8), 2418\u20132425 (2023)","journal-title":"IEEE Trans. Comput."},{"issue":"12","key":"360_CR17","first-page":"2161","volume":"70","author":"D Roy","year":"2021","unstructured":"Roy, D., Bathe, B.N., Maitra, S.: Differential fault attack on kreyvium & FLIP. IEEE Trans. Comput. 70(12), 2161\u20132167 (2021)","journal-title":"IEEE Trans. Comput."},{"key":"360_CR18","doi-asserted-by":"crossref","unstructured":"Sakamoto, K., Liu, F., Nakano, Y., Kiyomoto, S., Isobe, T.: Rocca: an efficient aes-based encryption scheme for beyond 5g. In: IACR Transactions on Symmetric Cryptology, pp. 1\u201330 (2021)","DOI":"10.46586\/tosc.v2021.i2.1-30"},{"key":"360_CR19","doi-asserted-by":"crossref","unstructured":"Sakamoto, K., Liu, F., Nakano, Y., Kiyomoto, S., Isobe, T.: Rocca: an efficient aes-based encryption scheme for beyond 5g (full version). Cryptology ePrint Archive (2022)","DOI":"10.46586\/tosc.v2021.i2.1-30"},{"key":"360_CR20","doi-asserted-by":"publisher","DOI":"10.1002\/9781118660027","volume-title":"Security of Block Ciphers-From Algorithm Design to Hardware Implementation","author":"K Sakiyama","year":"2015","unstructured":"Sakiyama, K., Sasaki, Y., Li, Y.: Security of Block Ciphers-From Algorithm Design to Hardware Implementation. Wiley, New York (2015)"},{"issue":"1","key":"360_CR21","doi-asserted-by":"publisher","first-page":"4","DOI":"10.3390\/cryptography2010004","volume":"2","author":"I Salam","year":"2018","unstructured":"Salam, I., Simpson, L., Bartlett, H., Dawson, E., Wong, K.K.-H.: Fault attacks on the authenticated encryption stream cipher morus. Cryptography 2(1), 4 (2018)","journal-title":"Cryptography"},{"issue":"6","key":"360_CR22","doi-asserted-by":"publisher","first-page":"1647","DOI":"10.1109\/TC.2014.2339854","volume":"64","author":"S Sarkar","year":"2014","unstructured":"Sarkar, S., Banik, S., Maitra, S.: Differential fault attack against grain family with very few faults and minimal assumptions. IEEE Trans. Comput. 64(6), 1647\u20131657 (2014)","journal-title":"IEEE Trans. Comput."},{"key":"360_CR23","doi-asserted-by":"crossref","unstructured":"Siddhanti, A., Sarkar, S., Maitra, S., Chattopadhyay, A.: Differential fault attack on grain v1, acorn v3 and lizard. In: Security, Privacy, and Applied Cryptography Engineering: 7th International Conference, SPACE 2017, Goa, India, December 13\u201317, 2017, Proceedings 7, pp. 247\u2013263. Springer, Berlin (2017)","DOI":"10.1007\/978-3-319-71501-8_14"},{"issue":"8","key":"360_CR24","doi-asserted-by":"publisher","first-page":"1875","DOI":"10.1007\/s10623-021-00892-6","volume":"89","author":"L Song","year":"2021","unstructured":"Song, L., Yi, T., Shi, D., Hu, L.: Security analysis of subterranean 2.0. Des Codes Cryptogr. 89(8), 1875\u20131905 (2021)","journal-title":"Des Codes Cryptogr."},{"key":"360_CR25","doi-asserted-by":"publisher","first-page":"1855","DOI":"10.1109\/TIFS.2022.3172634","volume":"17","author":"N Vafaei","year":"2022","unstructured":"Vafaei, N., Zarei, S., Bagheri, N., Eichlseder, M., Primas, R., Soleimany, H.: Statistical effective fault attacks: the other side of the coin. IEEE Trans. Inf. Forensics Secur. 17, 1855\u20131867 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"360_CR26","doi-asserted-by":"crossref","unstructured":"Wong, K.K.-H., Bartlett, H., Simpson, L., Dawson, E.: Differential random fault attacks on certain caesar stream ciphers. In: International Conference on Information Security and Cryptology, pp. 297\u2013315. Springer, Berlin (2019)","DOI":"10.1007\/978-3-030-40921-0_18"},{"key":"360_CR27","doi-asserted-by":"crossref","unstructured":"Wu, H., Preneel, B.: Aegis: a fast authenticated encryption algorithm. In: Selected Areas in Cryptography\u2014SAC 2013: 20th International Conference, Burnaby, BC, Canada, August 14\u201316, 2013, Revised Selected Papers 20, pp. 185\u2013201. Springer, Berlin (2014)","DOI":"10.1007\/978-3-662-43414-7_10"},{"issue":"3","key":"360_CR28","doi-asserted-by":"publisher","first-page":"150","DOI":"10.46586\/tches.v2018.i3.150-172","volume":"2018","author":"F Zhang","year":"2018","unstructured":"Zhang, F., Lou, X., Zhao, X., Bhasin, S., He, W., Ding, R., Qureshi, S., Ren, K.: Persistent fault analysis on block ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3), 150\u2013172 (2018)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."}],"container-title":["Journal of Cryptographic Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-024-00360-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13389-024-00360-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-024-00360-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,15]],"date-time":"2024-10-15T18:14:14Z","timestamp":1729016054000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13389-024-00360-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,4]]},"references-count":28,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,11]]}},"alternative-id":["360"],"URL":"https:\/\/doi.org\/10.1007\/s13389-024-00360-6","relation":{},"ISSN":["2190-8508","2190-8516"],"issn-type":[{"type":"print","value":"2190-8508"},{"type":"electronic","value":"2190-8516"}],"subject":[],"published":{"date-parts":[[2024,8,4]]},"assertion":[{"value":"28 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 July 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 August 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no Conflict of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This research has been conducted with no human involvement in data collection. The project obtained ethical approval from the authors\u2019 institution.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical standards"}}]}}