{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:56:37Z","timestamp":1771700197356,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T00:00:00Z","timestamp":1504224000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Hardw Syst Secur"],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1007\/s41635-017-0022-1","type":"journal-article","created":{"date-parts":[[2017,12,12]],"date-time":"2017-12-12T19:16:59Z","timestamp":1513106219000},"page":"252-268","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Two Efficient Fault-Based Attacks on CLOC and SILC"],"prefix":"10.1007","volume":"1","author":[{"given":"Debapriya Basu","family":"Roy","sequence":"first","affiliation":[]},{"given":"Avik","family":"Chakraborti","sequence":"additional","affiliation":[]},{"given":"Donghoon","family":"Chang","sequence":"additional","affiliation":[]},{"given":"S. V. Dilip","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Debdeep","family":"Mukhopadhyay","sequence":"additional","affiliation":[]},{"given":"Mridul","family":"Nandi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,12]]},"reference":[{"key":"22_CR1","unstructured":"Chakraborti A, Chang D, Dilip Kumar SV, Mukhopadhyay D, Nandi M CAESAR Competition. http:\/\/competitions.cr.yp.to\/caesar.html"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Basu RD (2016) Fault Based Almost Universal Forgeries on CLOC and SILC. SPACE, 2016, Lecture Notes in Computer Science, 10076, 66\u201386","DOI":"10.1007\/978-3-319-49445-6_4"},{"key":"22_CR3","unstructured":"Banik S, Maitra S (2012) A Differential Fault Attack on MICKEY 2.0, 215\u2013232. CHES, 2013, Lecture Notes in Computer Science 8086, 2012"},{"key":"22_CR4","unstructured":"Banik S, Maitra S, Sarkar S (2012) A differential fault attack on the grain family of stream ciphers, 122\u2013139. CHES 2012, Lecture Notes in Computer Science 7428"},{"key":"22_CR5","volume-title":"Hardware Security: Design, Threats, and Safeguards","author":"M Debdeep","year":"2014","unstructured":"Debdeep M, Chakraborty RS (2014) Hardware Security: Design, Threats, and Safeguards. CRC Press, Boca Raton"},{"key":"22_CR6","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1007\/978-3-642-34931-7_12","volume":"7668","author":"S Banik","year":"2012","unstructured":"Banik S, Maitra S, Sarkar S (2012) A Differential Fault Attack on the Grain Family under Reasonable Assumptions, INDOCRYPT, 2012 . Lect Notes Comput Sci 7668:191\u2013208","journal-title":"Lect Notes Comput Sci"},{"key":"22_CR7","doi-asserted-by":"crossref","first-page":"1092","DOI":"10.1109\/TIFS.2016.2646638","volume":"12","author":"S Patranabis","year":"2017","unstructured":"Patranabis S, Chakraborty A, Mukhopadhyay D, Chakrabarti PP (2017) Fault space transformation: a generic approach to counter differential fault analysis and differential fault intensity analysis on aes-like block ciphers. IEEE Trans Inf Forensics Secur 12:1092\u20131102","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"22_CR8","first-page":"37","volume":"1233","author":"M Bellare","year":"2004","unstructured":"Bellare M, Rogaway P, Wagner D (2004) The EAX Mode of Operation. Lect Notes Comput Sci 1233:37\u201351. FSE, 2004","journal-title":"Lect Notes Comput Sci"},{"key":"22_CR9","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/BFb0052259","volume":"1294","author":"E Biham","year":"1997","unstructured":"Biham E, Shamir A (1997) Differential fault analysis of secret key cryptosystems. CRYPTO. Lect Notes Comput Sci 1294:513\u2013525","journal-title":"Lect Notes Comput Sci"},{"key":"22_CR10","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1007\/11502760_24","volume":"3557","author":"E Biham","year":"2005","unstructured":"Biham E, Granboulan L, Nguyen PQ (2005) Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4. FSE. Lect Notes Comput Sci 3557:359\u2013367","journal-title":"Lect Notes Comput Sci"},{"key":"22_CR11","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume":"4727","author":"A Bogdanov","year":"2007","unstructured":"Bogdanov A, Knudsen LR, Leander G, Paar C, Poschmann A, Robshaw MJB, Seurin Y, Vikkelsoe C (2007) PRESENT: An Ultra-Lightweight Block Cipher. CHES. Lect Notes Comput Sci 4727:450\u2013466","journal-title":"Lect Notes Comput Sci"},{"key":"22_CR12","first-page":"389","volume":"3017","author":"D Boneh","year":"1997","unstructured":"Boneh D, DeMillo RA, Lipton RJ (1997) On the Importance of Checking Cryptographic Protocols for Faults. EUROCRYPT. Lect Notes Comput Sci 3017:389\u2013407","journal-title":"Lect Notes Comput Sci"},{"key":"22_CR13","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/s001450010016","volume":"2001","author":"D Boneh","year":"2001","unstructured":"Boneh D, DeMillo RA, Lipton RJ (2001) On the importance of eliminating errors in cryptgraphic computations. J Cryptol 2001:101\u2013119","journal-title":"J Cryptol"},{"key":"22_CR14","unstructured":"Daemen J, Rijmen V (2000) Rijndael for AES. In: AES Candidate Conference 343\u2013348"},{"key":"22_CR15","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The design of Rijndael: AES - the advanced encryption standard. Information security and cryptography","author":"J Daemen","year":"2002","unstructured":"Daemen J, Rijmen V (2002) The design of Rijndael: AES - the advanced encryption standard. Information security and cryptography. Springer, Berlin"},{"key":"22_CR16","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/978-3-540-45203-4_23","volume":"2846","author":"P Dusart","year":"2003","unstructured":"Dusart P, Letourneux G, Vivolo O (2003) Differential Fault Analysis on A.E.S. ACNS. Lect Notes Comput Sci 2846:293\u2013306","journal-title":"Lect Notes Comput Sci"},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Dworkin M (2004) Recommendation for block cipher modes of operation: The CCM mode for authentication and confidentiality, nist special publication 800-38C","DOI":"10.6028\/NIST.SP.800-38b-2005"},{"key":"22_CR18","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1007\/978-3-642-23951-9_22","volume":"6917","author":"J Guo","year":"2011","unstructured":"Guo J, Peyrin T, Poschmann A, Robshaw M (2011) The LED Block Cipher. CHES. Lect Notes Comput Sci 6917:326\u2013341","journal-title":"Lect Notes Comput Sci"},{"key":"22_CR19","doi-asserted-by":"crossref","unstructured":"Hemme L, Hoffman L, Lee C (2011) Differential Fault Analysis on the SHA1 Compression Function. FDTC, 11 54\u201362","DOI":"10.1109\/FDTC.2011.16"},{"key":"22_CR20","first-page":"41","volume":"3156","author":"J Hoch","year":"2004","unstructured":"Hoch J, Shamir A (2004) Fault Analysis of Stream Ciphers. CHES. Lect Notes Comput Sci 3156:41\u201351","journal-title":"Lect Notes Comput Sci"},{"key":"22_CR21","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/978-3-540-89754-5_19","volume":"5365","author":"M Hojsik","year":"2008","unstructured":"Hojsik M, Rudolf B (2008) Floating fault analysis of Trivium. INDOCRYPT. Lect Notes Comput Sci 5365:239\u2013250","journal-title":"Lect Notes Comput Sci"},{"key":"22_CR22","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1007\/978-3-540-71039-4_10","volume":"5086","author":"M Hojsik","year":"2008","unstructured":"Hojsik M, Rudolf B (2008) Differential fault analysis of Trivium. FSE. Lect Notes Comput Sci 5086:158\u2013172","journal-title":"Lect Notes Comput Sci"},{"key":"22_CR23","unstructured":"Iwata T, Minematsu K, Guo J, Morioka S, Kobayashi E Re: Fault Based Forgery on CLOC and SILC. https:\/\/groups.google.com\/forum\/#!searchin\/crypto-competitions\/tetsu20iwata\/crypto-competitions\/_qxORmqcSrY\/L47qfEdY9uoJ"},{"key":"22_CR24","unstructured":"Iwata T, Minematsu K, Guo J, Morioka S, Kobayashi E (2014) SILC: SImple Lightweight CFB. http:\/\/competitions.cr.yp.to\/round1\/silcv1.pdf"},{"key":"22_CR25","unstructured":"Iwata T, Minematsu K, Guo J, Morioka S, Kobayashi E (2014) CLOC: Compact Low-Overhead CFB. http:\/\/competitions.cr.yp.to\/round1\/clocv1.pdf"},{"key":"22_CR26","doi-asserted-by":"crossref","first-page":"747","DOI":"10.1007\/978-94-007-4516-2_79","volume":"164","author":"K Jeong","year":"2012","unstructured":"Jeong K, Lee C (2012) Differential Fault Analysis on Block Cipher LED-64. FutureTech, 12. Lect Notes in Electr Eng 164:747\u2013755","journal-title":"Lect Notes in Electr Eng"},{"key":"22_CR27","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1007\/978-3-642-29912-4_10","volume":"7275","author":"P Jovanovic","year":"2012","unstructured":"Jovanovic P, Kreuzer M, Poilan I, Lee C (2012) A Fault Attack on the LED Block Cipher. COSADE, 12. Lect Notes Comput Sci 7275:120\u2013134","journal-title":"Lect Notes Comput Sci"},{"key":"22_CR28","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1007\/978-3-642-41227-1_11","volume":"8209","author":"K Minematsu","year":"2013","unstructured":"Minematsu K, Lucks S, Iwata T (2013) Improved Authenticity Bound of EAX, and Refinements. Provsec. Lect Notes Comput Sci 8209:184\u2013201","journal-title":"Lect Notes Comput Sci"},{"key":"22_CR29","unstructured":"Moise A, Beroset E, Phinney T, Burns M (2011) EAX\u2032 Cipher Mode. NIST Submission, 2011. http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/BCM\/documents\/proposedmodes\/eax-prime\/eax-prime-spec.pdf . Technique against SPN Structures with Application to the AES and KHAZAD"},{"key":"22_CR30","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/978-3-540-45238-6_7","volume":"2779","author":"G Piret","year":"2003","unstructured":"Piret G, Quisquater J. J. (2003) Differential Fault Attack. CHES. Lect Notes Comput Sci 2779:77\u201388","journal-title":"Lect Notes Comput Sci"},{"key":"22_CR31","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/978-3-319-13039-2_12","volume":"8885","author":"D Saha","year":"2014","unstructured":"Saha D, Kuila S, Roy Chowdhury D (2014) EscApe: Diagonal Fault Analysis of APE. INDOCRYPT, 2014. Lect Notes Comput Sci 8885:197\u2013216","journal-title":"Lect Notes Comput Sci"},{"key":"22_CR32","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1007\/978-3-642-35999-6_22","volume":"7707","author":"T Suzaki","year":"2012","unstructured":"Suzaki T, Minematsu K, Morioka S, Kobayashi E (2012) TWINE: A Lightweight Block Cipher for Multiple Platforms. SAC, 2012. Lect Notes Comput Sci 7707:339\u2013354","journal-title":"Lect Notes Comput Sci"},{"key":"22_CR33","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1007\/978-3-642-21040-2_15","volume":"6633","author":"M Tunstall","year":"2011","unstructured":"Tunstall M, Mukhopadhyay D, Ali S (2011) Differential fault analysis of the advanced encryption standard using a single fault workshop on security and privacy of mobile devices in wireless communication. Lect Notes Comput Sci 6633:224\u2013233","journal-title":"Lect Notes Comput Sci"},{"key":"22_CR34","unstructured":"Whiting D, Houeley R, Ferguson N (2002) Counter with CBC-MAC Submission to NIST (2002). http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/BCM\/modesdevelopment.html"},{"key":"22_CR35","doi-asserted-by":"crossref","unstructured":"Agoyan M, Dutertre J-M, Mirbaha A-P, Tria A (2010) How to Flip a Bit? On-Line Testing Symposium (IOLTS). In: 2010 IEEE 16th International","DOI":"10.1109\/IOLTS.2010.5560194"},{"key":"22_CR36","unstructured":"Fournier JJA, Moore S, Li H, Mullins R, Taylor G Security evaluation of asynchronous circuits, Cryptographic hardware and embedded systems"},{"key":"22_CR37","doi-asserted-by":"crossref","unstructured":"Skorobogatov SP, Anderson RJ (2002) Optical fault induction attacks, Cryptographic hardware and embedded systems","DOI":"10.1007\/3-540-36400-5_2"},{"key":"22_CR38","doi-asserted-by":"crossref","unstructured":"Skorobogatov S (2009) Local heating attacks on flash memory devices. In: IEEE International Workshop on Hardware-Oriented Security and Trust","DOI":"10.1109\/HST.2009.5225028"},{"key":"22_CR39","doi-asserted-by":"crossref","unstructured":"Dehbaoui A, Dutertre J-M, Robisson B, Tria A (2012) Electromagnetic transient faults injection on a hardware and a software implementations of AES fault diagnosis and tolerance","DOI":"10.1109\/FDTC.2012.15"},{"key":"22_CR40","unstructured":"Moro N, Dehbaoui A, Heydemann K, Robisson B, Encrenaz E (2014) Electromagnetic fault injection: towards a fault model on a 32-bit micro-controller. arXiv: 1402.6421"},{"key":"22_CR41","doi-asserted-by":"crossref","unstructured":"Barenghi A, Breveglieri L, Koren I, Naccache D (2012) Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures proceedings of the IEEE pp 3056\u20133076","DOI":"10.1109\/JPROC.2012.2188769"},{"key":"22_CR42","doi-asserted-by":"crossref","unstructured":"Zajic A, Prvulovic M, Chu D (2017) Path loss prediction for electromagnetic side-channel signals. In: 11th European Conference on Antennas and Propagation (EUCAP) pp 3877\u20133881","DOI":"10.23919\/EuCAP.2017.7928125"},{"key":"22_CR43","doi-asserted-by":"crossref","unstructured":"Callan R, Zajic A, Prvulovic M (2014) A practical methodology for measuring the side-channel signal available to the attacker for instruction-level events. In: 47th Annual IEEE\/ACM international symposium on microarchitecture pp 242\u2013254","DOI":"10.1109\/MICRO.2014.39"}],"container-title":["Journal of Hardware and Systems Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s41635-017-0022-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-017-0022-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-017-0022-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T14:59:48Z","timestamp":1751122788000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s41635-017-0022-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":43,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,9]]}},"alternative-id":["22"],"URL":"https:\/\/doi.org\/10.1007\/s41635-017-0022-1","relation":{},"ISSN":["2509-3428","2509-3436"],"issn-type":[{"value":"2509-3428","type":"print"},{"value":"2509-3436","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,9]]}}}