{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:07:40Z","timestamp":1750306060341,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,15]],"date-time":"2017-05-15T00:00:00Z","timestamp":1494806400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,5,15]]},"DOI":"10.1145\/3075564.3091965","type":"proceedings-article","created":{"date-parts":[[2017,6,7]],"date-time":"2017-06-07T12:47:29Z","timestamp":1496839649000},"page":"402-408","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Using Tweaks To Design Fault Resistant Ciphers (Full Version)"],"prefix":"10.1145","author":[{"given":"Sikhar","family":"Patranabis","sequence":"first","affiliation":[{"name":"IIT Kharagpur, Kharagpur, India"}]},{"given":"Debapriya Basu","family":"Roy","sequence":"additional","affiliation":[{"name":"IIT Kharagpur, Kharagpur, India"}]},{"given":"Debdeep","family":"Mukhopadhyay","sequence":"additional","affiliation":[{"name":"IIT Kharagpur, Kharagpur, India"}]}],"member":"320","published-online":{"date-parts":[[2017,5,15]]},"reference":[{"volume-title":"Information Security and Cryptology","author":"Ali Sk Subidh","key":"e_1_3_2_1_1_1","unstructured":"Sk Subidh Ali and Debdeep Mukhopadhyay . 2013. Differential Fault Analysis of Twofish . In Information Security and Cryptology . Springer , 10--28. Sk Subidh Ali and Debdeep Mukhopadhyay. 2013. Differential Fault Analysis of Twofish. In Information Security and Cryptology. Springer, 10--28."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.08.0207.0188"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1190590"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43826-8_4"},{"key":"e_1_3_2_1_5_1","volume-title":"Mercy: A fast large block cipher for disk sector encryption. In Fast Software Encryption","author":"Crowley Paul","year":"2001","unstructured":"Paul Crowley . 2001 . Mercy: A fast large block cipher for disk sector encryption. In Fast Software Encryption . Springer , 49--63. Paul Crowley. 2001. Mercy: A fast large block cipher for disk sector encryption. In Fast Software Encryption. Springer, 49--63."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2014.15"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11506447_4"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2013.2263037"},{"key":"e_1_3_2_1_10_1","volume-title":"Security analysis of concurrent error detection against differential fault analysis. Journal of Cryptographic Engineering","author":"Guo Xiaofei","year":"2014","unstructured":"Xiaofei Guo , Debdeep Mukhopadhyay , Chenglu Jin , and Ramesh Karri . 2014. Security analysis of concurrent error detection against differential fault analysis. Journal of Cryptographic Engineering ( 2014 ), 1--17. Xiaofei Guo, Debdeep Mukhopadhyay, Chenglu Jin, and Ramesh Karri. 2014. Security analysis of concurrent error detection against differential fault analysis. Journal of Cryptographic Engineering (2014), 1--17."},{"key":"e_1_3_2_1_11_1","volume-title":"DRECON: DPA Resistant Encryption by Construction. In Progress in Cryptology--AFRICACRYPT","author":"Hajra Suvadeep","year":"2014","unstructured":"Suvadeep Hajra , Chester Rebeiro , Shivam Bhasin , Gaurav Bajaj , Sahil Sharma , Sylvain Guilley , and Debdeep Mukhopadhyay . 2014 . DRECON: DPA Resistant Encryption by Construction. In Progress in Cryptology--AFRICACRYPT 2014. Springer , 420--439. Suvadeep Hajra, Chester Rebeiro, Shivam Bhasin, Gaurav Bajaj, Sahil Sharma, Sylvain Guilley, and Debdeep Mukhopadhyay. 2014. DRECON: DPA Resistant Encryption by Construction. In Progress in Cryptology--AFRICACRYPT 2014. Springer, 420--439."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1516702.1516704"},{"key":"e_1_3_2_1_14_1","first-page":"388","article-title":"Making AES stronger: AES with key dependent S-box","volume":"8","author":"Krishnamurthy GN","year":"2008","unstructured":"GN Krishnamurthy and V Ramaswamy . 2008 . Making AES stronger: AES with key dependent S-box . IJCSNS International Journal of Computer Science and Network Security 8 , 9 (2008), 388 -- 398 . GN Krishnamurthy and V Ramaswamy. 2008. Making AES stronger: AES with key dependent S-box. IJCSNS International Journal of Computer Science and Network Security 8, 9 (2008), 388--398.","journal-title":"IJCSNS International Journal of Computer Science and Network Security"},{"volume-title":"An introduction to the theory of functional equations and inequalities: Cauchy's equation and Jensen's inequality","author":"Kuczma Marek","key":"e_1_3_2_1_15_1","unstructured":"Marek Kuczma . 2009. An introduction to the theory of functional equations and inequalities: Cauchy's equation and Jensen's inequality . Springer Science & Business Media . Marek Kuczma. 2009. An introduction to the theory of functional equations and inequalities: Cauchy's equation and Jensen's inequality. Springer Science & Business Media."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.149"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/11889700_15"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1502781.1502784"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/11502760_28"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21476-4_13"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLSID.2016.58"},{"key":"e_1_3_2_1_22_1","volume-title":"Twofish: A 128-bit block cipher. NIST AES Proposal 15","author":"Schneier Bruce","year":"1998","unstructured":"Bruce Schneier , John Kelsey , Doug Whiting , David Wagner , Chris Hall , and Niels Ferguson . 1998 . Twofish: A 128-bit block cipher. NIST AES Proposal 15 (1998). Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, and Niels Ferguson. 1998. Twofish: A 128-bit block cipher. NIST AES Proposal 15 (1998)."},{"key":"e_1_3_2_1_23_1","unstructured":"R. Schroeppel. 1998. The Hasty Pudding Cipher. (1998).  R. Schroeppel. 1998. The Hasty Pudding Cipher. (1998)."},{"key":"e_1_3_2_1_24_1","volume-title":"Data encryption standard. Federal Information Processing Standards Publication","author":"Standard Data Encryption","year":"1999","unstructured":"Data Encryption Standard . 1999. Data encryption standard. Federal Information Processing Standards Publication ( 1999 ). Data Encryption Standard. 1999. Data encryption standard. Federal Information Processing Standards Publication (1999)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2004.04.023"},{"volume-title":"Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication","author":"Tunstall Michael","key":"e_1_3_2_1_26_1","unstructured":"Michael Tunstall , Debdeep Mukhopadhyay , and Subidh Ali . 2011. Differential fault analysis of the advanced encryption standard using a single fault . In Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication . Springer , 224--233. Michael Tunstall, Debdeep Mukhopadhyay, and Subidh Ali. 2011. Differential fault analysis of the advanced encryption standard using a single fault. In Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication. Springer, 224--233."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_6"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34961-4_44"}],"event":{"name":"CF '17: Computing Frontiers Conference","sponsor":["SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing"],"location":"Siena Italy","acronym":"CF '17"},"container-title":["Proceedings of the Computing Frontiers Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3075564.3091965","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3075564.3091965","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:42Z","timestamp":1750215822000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3075564.3091965"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,15]]},"references-count":26,"alternative-id":["10.1145\/3075564.3091965","10.1145\/3075564"],"URL":"https:\/\/doi.org\/10.1145\/3075564.3091965","relation":{},"subject":[],"published":{"date-parts":[[2017,5,15]]},"assertion":[{"value":"2017-05-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}