{"id":"https://openalex.org/W1498067603","doi":"https://doi.org/10.1007/978-3-642-29101-2_22","title":"Fault Analysis of the KATAN Family of Block Ciphers","display_name":"Fault Analysis of the KATAN Family of Block Ciphers","publication_year":2012,"publication_date":"2012-01-01","ids":{"openalex":"https://openalex.org/W1498067603","doi":"https://doi.org/10.1007/978-3-642-29101-2_22","mag":"1498067603"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-29101-2_22","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-29101-2_22","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068948550","display_name":"Shekh Faisal Abdul\u2010Latip","orcid":"https://orcid.org/0000-0003-3280-2422"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]},{"id":"https://openalex.org/I32589535","display_name":"Technical University of Malaysia Malacca","ror":"https://ror.org/01xb6rs26","country_code":"MY","type":"education","lineage":["https://openalex.org/I32589535"]}],"countries":["AU","MY"],"is_corresponding":true,"raw_author_name":"Shekh Faisal Abdul-Latip","raw_affiliation_strings":["Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Australia","Information Security and Digital Forensics Lab (INSFORLAB), Faculty of Information and Communication Technology, Universiti Teknikal Malaysia, Melaka, Malaysia"],"affiliations":[{"raw_affiliation_string":"Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"Information Security and Digital Forensics Lab (INSFORLAB), Faculty of Information and Communication Technology, Universiti Teknikal Malaysia, Melaka, Malaysia","institution_ids":["https://openalex.org/I32589535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054365851","display_name":"Mohammad Reza Reyhanitabar","orcid":null},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Mohammad Reza Reyhanitabar","raw_affiliation_strings":["Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054741725","display_name":"Willy Susilo","orcid":"https://orcid.org/0000-0002-1562-5105"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Willy Susilo","raw_affiliation_strings":["Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073611240","display_name":"Jennifer Seberry","orcid":"https://orcid.org/0000-0002-9558-4293"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jennifer Seberry","raw_affiliation_strings":["Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5068948550"],"corresponding_institution_ids":["https://openalex.org/I204824540","https://openalex.org/I32589535"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":1.9031,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.8705036,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"319","last_page":"336"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.670435905456543},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.6449757814407349},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.4827003479003906},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4694965183734894},{"id":"https://openalex.org/keywords/cube","display_name":"Cube (algebra)","score":0.4418531656265259},{"id":"https://openalex.org/keywords/fault","display_name":"Fault (geology)","score":0.4324266314506531},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.41784343123435974},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.26658543944358826},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.25841447710990906},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2564455568790436},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10990053415298462},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.10335555672645569}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.670435905456543},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.6449757814407349},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.4827003479003906},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4694965183734894},{"id":"https://openalex.org/C53051483","wikidata":"https://www.wikidata.org/wiki/Q861555","display_name":"Cube (algebra)","level":2,"score":0.4418531656265259},{"id":"https://openalex.org/C175551986","wikidata":"https://www.wikidata.org/wiki/Q47089","display_name":"Fault (geology)","level":2,"score":0.4324266314506531},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.41784343123435974},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.26658543944358826},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.25841447710990906},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2564455568790436},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10990053415298462},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.10335555672645569},{"id":"https://openalex.org/C165205528","wikidata":"https://www.wikidata.org/wiki/Q83371","display_name":"Seismology","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-642-29101-2_22","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-29101-2_22","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7099999785423279}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W37385681","https://openalex.org/W1489792672","https://openalex.org/W1498067603","https://openalex.org/W1558983268","https://openalex.org/W1572847050","https://openalex.org/W1607874478","https://openalex.org/W1829732909","https://openalex.org/W2033361557","https://openalex.org/W2039024443","https://openalex.org/W2108329338","https://openalex.org/W2155441237","https://openalex.org/W2160494425","https://openalex.org/W2168767876","https://openalex.org/W2170489924","https://openalex.org/W2395034892","https://openalex.org/W2401625751","https://openalex.org/W2403571297","https://openalex.org/W2613745815","https://openalex.org/W2950137809","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W4283690284","https://openalex.org/W3180808905","https://openalex.org/W2405444689","https://openalex.org/W268440552","https://openalex.org/W2940348078","https://openalex.org/W3036649287","https://openalex.org/W597131776","https://openalex.org/W2899720274","https://openalex.org/W3006067695","https://openalex.org/W4231947729"],"abstract_inverted_index":null,"counts_by_year":[{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
