{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T05:10:31Z","timestamp":1740114631413,"version":"3.37.3"},"reference-count":28,"publisher":"Informa UK Limited","issue":"2","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Cryptologia"],"published-print":{"date-parts":[[2025,3,4]]},"DOI":"10.1080\/01611194.2024.2328548","type":"journal-article","created":{"date-parts":[[2024,4,15]],"date-time":"2024-04-15T06:31:17Z","timestamp":1713162677000},"page":"153-169","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":0,"title":["Fault-assisted side-channel analysis of HMAC-Streebog"],"prefix":"10.1080","volume":"49","author":[{"given":"Gautham","family":"Sekar","sequence":"first","affiliation":[]},{"given":"Mabin","family":"Joseph","sequence":"additional","affiliation":[]},{"given":"R.","family":"Balasubramanian","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2024,4,14]]},"reference":[{"key":"e_1_3_3_2_1","doi-asserted-by":"crossref","unstructured":"Abdelkhalek A. R. AlTawy and A. M. Youssef. 2015. Impossible differential properties of reduced round Streebog. In Proceedings of C2SI 2015 LNCS Rabat Morocco Vol. 9084 274\u201386.","DOI":"10.1007\/978-3-319-18681-8_22"},{"key":"e_1_3_3_3_1","doi-asserted-by":"crossref","unstructured":"AlTawy R. and A. M. Youssef. 2015a. Differential fault analysis of Streebog. In Proceedings of ISPEC 2015 LNCS Beijing China Vol. 9065 35\u201349.","DOI":"10.1007\/978-3-319-17533-1_3"},{"key":"e_1_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2014.0540"},{"key":"e_1_3_3_5_1","doi-asserted-by":"crossref","unstructured":"Biryukov A. L. Perrin and A. Udovenko. 2016. Reverse-engineering the S-box of Streebog Kuznyechik and STRIBOBr1. In Proceedings of EUROCRYPT 2016 LNCS Vol. 9665 372\u2013402.","DOI":"10.1007\/978-3-662-49890-3_15"},{"key":"e_1_3_3_6_1","doi-asserted-by":"crossref","unstructured":"Cojocar L. K. Razavi C. Giuffrida and H. Bos. 2019. Exploiting correcting codes: On the effectiveness of ECC memory against Rowhammer attacks. In IEEE Proceedings of SP 2019 San Francisco USA 279\u201395.","DOI":"10.1109\/SP.2019.00089"},{"key":"e_1_3_3_7_1","unstructured":"Degtyarev A. 2019. GOST R 34.11-2012 hash function with 512\/256\u2009bit digest. GitHub. Accessed July 18 2023. https:\/\/github.com\/adegtyarev\/streebog."},{"key":"e_1_3_3_8_1","doi-asserted-by":"crossref","unstructured":"Dinur I. and G. Leurent. 2014. Improved generic attacks against hash-based MACs and HAIFA. In Proceedings of CRYPTO 2014 LNCS Vol. 8616 149\u201368.","DOI":"10.1007\/978-3-662-44371-2_9"},{"key":"e_1_3_3_9_1","doi-asserted-by":"crossref","unstructured":"Dolmatov V. and A. Degtyarev. 2013. GOST R 34.11-2012: Hash function. RFC 6986. Accessed July 18 2023. https:\/\/tools.ietf.org\/html\/rfc6986.","DOI":"10.17487\/rfc6986"},{"key":"e_1_3_3_10_1","doi-asserted-by":"crossref","unstructured":"Fouque P. D. Masgana and F. Valette. 2009. Fault attack on Schnorr based identification and signature schemes. In IEEE Proceedings of FDTC 2009 Lausanne Switzerland 32\u20138.","DOI":"10.1109\/FDTC.2009.36"},{"key":"e_1_3_3_11_1","doi-asserted-by":"crossref","unstructured":"Fouque P. D. R\u00e9al F. Valette and M. Drissi. 2008. The carry leakage on the randomized exponent countermeasure. In Proceedings of CHES 2008 LNCS Washington DC USA Vol. 5154 198\u2013213.","DOI":"10.1007\/978-3-540-85053-3_13"},{"key":"e_1_3_3_12_1","doi-asserted-by":"crossref","unstructured":"Garmany B. and T. M\u00fcller. 2013. PRIME: Private RSA infrastructure for memory-less encryption. In Proceedings of ACSAC 2013 New Orleans USA 149\u201358.","DOI":"10.1145\/2523649.2523656"},{"key":"e_1_3_3_13_1","doi-asserted-by":"crossref","unstructured":"G\u00f6tzfried J. and T. M\u00fcller. 2013. ARMORED: CPU-bound encryption for android-driven ARM devices. In IEEE Proceedings of ARES 2013 Regensburg Germany 161\u20138.","DOI":"10.1109\/ARES.2013.23"},{"key":"e_1_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1506409.1506429"},{"key":"e_1_3_3_15_1","unstructured":"Hubert C. and M. C\u00f4me. 2017. ERROL\u2014InfraRed (IR) laser bench solution for security evaluation in 2017. GitHub. Accessed July 18 2023. https:\/\/www.errol-laser.com\/_files\/ugd\/1c6d8e_1e3b60623c454f02b125c891cd53a245.pdf."},{"key":"e_1_3_3_16_1","doi-asserted-by":"crossref","unstructured":"Kim Y. R. Daly J. Kim C. Fallin J. H. Lee D. Lee C. Wilkerson K. Lai and O. Mutlu. 2014. Flipping bits in memory without accessing them: An experimental study of DRAM disturbance errors. In Proceedings of ACM\/IEEE ISCA 2014 Minneapolis USA 361\u201372.","DOI":"10.1109\/ISCA.2014.6853210"},{"key":"e_1_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3399742"},{"key":"e_1_3_3_18_1","doi-asserted-by":"crossref","unstructured":"Krawczyk H. M. Bellare and R. Canetti. 1997. HMAC: Keyed-hashing for message authentication. RFC 2104. Accessed July 18 2023. https:\/\/tools.ietf.org\/html\/rfc2104.","DOI":"10.17487\/rfc2104"},{"key":"e_1_3_3_19_1","doi-asserted-by":"crossref","unstructured":"Kwong A. D. Genkin D. Gruss and Y. Yarom. 2020. RAMBleed: Reading bits in memory without accessing them. In Proceedings of IEEE Proceedings of SP 2020 San Francisco USA 695\u2013711.","DOI":"10.1109\/SP40000.2020.00020"},{"key":"e_1_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357033"},{"key":"e_1_3_3_21_1","unstructured":"Mambretti A. M. Neugschwandtner A. Sorniotti E. Kirda W. Robertson and A. Kurmus. 2018. Let\u2019s not speculate: Discovering and analyzing speculative execution attacks. IBM Research Report RZ 3933 19\u201337. Accessed July 18 2023. https:\/\/domino.research.ibm.com\/library\/cyberdig.nsf\/papers\/D66E56756964D8998525835200494B74."},{"key":"e_1_3_3_22_1","doi-asserted-by":"crossref","unstructured":"M\u00fcller T. A. Dewald and F. C. Freiling. 2010. AESSE: A cold-boot resistant implementation of AES. In ACM Proceedings of EUROSEC \u201910 Paris France 42\u20137.","DOI":"10.1145\/1752046.1752053"},{"key":"e_1_3_3_23_1","unstructured":"M\u00fcller T. F. C. Freiling and A. Dewald. 2011. TRESOR runs encryption securely outside RAM. In Proceedings of USENIX Security \u201911 San Francisco USA 251\u201366."},{"key":"e_1_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2019.i1.302-329"},{"key":"e_1_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2016.i2.99-124"},{"key":"e_1_3_3_26_1","doi-asserted-by":"crossref","unstructured":"Sekar G. 2015. Side channel cryptanalysis of Streebog. In Proceedings of SSR 2015 LNCS Tokyo Japan Vol. 9497 154\u201362.","DOI":"10.1007\/978-3-319-27152-1_8"},{"key":"e_1_3_3_27_1","doi-asserted-by":"crossref","unstructured":"Smyshlyaev S. E. Alekseev I. Oshkin V. Popov S. Leontiev V. Podobaev and D. Belyavsky. 2016. Guidelines on the cryptographic algorithms to accompany the usage of standards GOST R 34.10-2012 and GOST R 34.11-2012. RFC 7836. Accessed July 18 2023. https:\/\/tools.ietf.org\/html\/rfc7836.","DOI":"10.17487\/RFC7836"},{"key":"e_1_3_3_28_1","doi-asserted-by":"crossref","unstructured":"Vasiliadis G. E. Athanasopoulos M. Polychronakis and S. Ioannidis. 2014. PixelVault: Using GPUs for securing cryptographic operations. In ACM Proceedings of CCS 2014 Denver USA 1131\u201342.","DOI":"10.1145\/2660267.2660316"},{"key":"e_1_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-016-0721-3"}],"container-title":["Cryptologia"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01611194.2024.2328548","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T05:28:51Z","timestamp":1740029331000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01611194.2024.2328548"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,14]]},"references-count":28,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,3,4]]}},"alternative-id":["10.1080\/01611194.2024.2328548"],"URL":"https:\/\/doi.org\/10.1080\/01611194.2024.2328548","relation":{},"ISSN":["0161-1194","1558-1586"],"issn-type":[{"type":"print","value":"0161-1194"},{"type":"electronic","value":"1558-1586"}],"subject":[],"published":{"date-parts":[[2024,4,14]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucry20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucry20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2024-04-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}