{"id":"https://openalex.org/W4292018363","doi":"https://doi.org/10.1007/s13389-022-00290-1","title":"Fault analysis of the PRINCE family of lightweight ciphers","display_name":"Fault analysis of the PRINCE family of lightweight ciphers","publication_year":2022,"publication_date":"2022-08-16","ids":{"openalex":"https://openalex.org/W4292018363","doi":"https://doi.org/10.1007/s13389-022-00290-1"},"language":"en","primary_location":{"id":"doi:10.1007/s13389-022-00290-1","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s13389-022-00290-1","pdf_url":null,"source":{"id":"https://openalex.org/S2764800400","display_name":"Journal of Cryptographic Engineering","issn_l":"2190-8508","issn":["2190-8508","2190-8516"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cryptographic Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101966455","display_name":"Anup Kumar Kundu","orcid":"https://orcid.org/0000-0003-0305-7347"},"institutions":[{"id":"https://openalex.org/I6498739","display_name":"Indian Statistical Institute","ror":"https://ror.org/00q2w1j53","country_code":"IN","type":"education","lineage":["https://openalex.org/I6498739"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Anup Kumar Kundu","raw_affiliation_strings":["Department of Cryptology and Security, Indian Statistical Institute, Kolkata, West Bengal, India"],"affiliations":[{"raw_affiliation_string":"Department of Cryptology and Security, Indian Statistical Institute, Kolkata, West Bengal, India","institution_ids":["https://openalex.org/I6498739"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069066434","display_name":"Aikata Aikata","orcid":null},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]},{"id":"https://openalex.org/I4210121466","display_name":"Indian Institute of Technology Bhilai","ror":"https://ror.org/02sscsx71","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210121466"]}],"countries":["AT","IN"],"is_corresponding":false,"raw_author_name":"Aikata","raw_affiliation_strings":["The Institute of Applied Information Processing and Communications (IAIK), Graz University of Technology, Styria, Austria","de.ci.phe.red Lab, Department of Electrical Engineering and Computer Science, Indian Institute of Technology Bhilai, Raipur, Chhattisgarh, India"],"affiliations":[{"raw_affiliation_string":"The Institute of Applied Information Processing and Communications (IAIK), Graz University of Technology, Styria, Austria","institution_ids":["https://openalex.org/I4092182"]},{"raw_affiliation_string":"de.ci.phe.red Lab, Department of Electrical Engineering and Computer Science, Indian Institute of Technology Bhilai, Raipur, Chhattisgarh, India","institution_ids":["https://openalex.org/I4210121466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066371936","display_name":"Banashri Karmakar","orcid":"https://orcid.org/0000-0002-6610-2187"},"institutions":[{"id":"https://openalex.org/I4210121466","display_name":"Indian Institute of Technology Bhilai","ror":"https://ror.org/02sscsx71","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210121466"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Banashri Karmakar","raw_affiliation_strings":["de.ci.phe.red Lab, Department of Electrical Engineering and Computer Science, Indian Institute of Technology Bhilai, Raipur, Chhattisgarh, India"],"affiliations":[{"raw_affiliation_string":"de.ci.phe.red Lab, Department of Electrical Engineering and Computer Science, Indian Institute of Technology Bhilai, Raipur, Chhattisgarh, India","institution_ids":["https://openalex.org/I4210121466"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108024318","display_name":"Dhiman Saha","orcid":"https://orcid.org/0000-0002-4668-073X"},"institutions":[{"id":"https://openalex.org/I4210121466","display_name":"Indian Institute of Technology Bhilai","ror":"https://ror.org/02sscsx71","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210121466"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Dhiman Saha","raw_affiliation_strings":["de.ci.phe.red Lab, Department of Electrical Engineering and Computer Science, Indian Institute of Technology Bhilai, Raipur, Chhattisgarh, India"],"affiliations":[{"raw_affiliation_string":"de.ci.phe.red Lab, Department of Electrical Engineering and Computer Science, Indian Institute of Technology Bhilai, Raipur, Chhattisgarh, India","institution_ids":["https://openalex.org/I4210121466"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101966455"],"corresponding_institution_ids":["https://openalex.org/I6498739"],"apc_list":{"value":2390,"currency":"EUR","value_usd":2990},"apc_paid":null,"fwci":0.4137,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.67901196,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"12","issue":"4","first_page":"475","last_page":"494"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6722812652587891},{"id":"https://openalex.org/keywords/fault-model","display_name":"Fault model","score":0.5980769991874695},{"id":"https://openalex.org/keywords/fault","display_name":"Fault (geology)","score":0.561809778213501},{"id":"https://openalex.org/keywords/fault-injection","display_name":"Fault injection","score":0.5180625915527344},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.469009131193161},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42109912633895874},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3683917224407196},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.1593051254749298},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.14869362115859985},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11358821392059326},{"id":"https://openalex.org/keywords/seismology","display_name":"Seismology","score":0.08698928356170654},{"id":"https://openalex.org/keywords/geology","display_name":"Geology","score":0.08667707443237305}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6722812652587891},{"id":"https://openalex.org/C167391956","wikidata":"https://www.wikidata.org/wiki/Q1401211","display_name":"Fault model","level":3,"score":0.5980769991874695},{"id":"https://openalex.org/C175551986","wikidata":"https://www.wikidata.org/wiki/Q47089","display_name":"Fault (geology)","level":2,"score":0.561809778213501},{"id":"https://openalex.org/C2775928411","wikidata":"https://www.wikidata.org/wiki/Q2041312","display_name":"Fault injection","level":3,"score":0.5180625915527344},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.469009131193161},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42109912633895874},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3683917224407196},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.1593051254749298},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.14869362115859985},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11358821392059326},{"id":"https://openalex.org/C165205528","wikidata":"https://www.wikidata.org/wiki/Q83371","display_name":"Seismology","level":1,"score":0.08698928356170654},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.08667707443237305},{"id":"https://openalex.org/C134146338","wikidata":"https://www.wikidata.org/wiki/Q1815901","display_name":"Electronic circuit","level":2,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s13389-022-00290-1","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s13389-022-00290-1","pdf_url":null,"source":{"id":"https://openalex.org/S2764800400","display_name":"Journal of Cryptographic Engineering","issn_l":"2190-8508","issn":["2190-8508","2190-8516"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cryptographic Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W132386699","https://openalex.org/W183217503","https://openalex.org/W392155942","https://openalex.org/W1572300106","https://openalex.org/W1588462372","https://openalex.org/W1599175145","https://openalex.org/W1607876066","https://openalex.org/W1829732909","https://openalex.org/W1893322863","https://openalex.org/W1894646615","https://openalex.org/W1971372748","https://openalex.org/W2066425771","https://openalex.org/W2109265351","https://openalex.org/W2110162979","https://openalex.org/W2170489924","https://openalex.org/W2208284559","https://openalex.org/W2280109954","https://openalex.org/W2469463297","https://openalex.org/W2472740573","https://openalex.org/W2512792755","https://openalex.org/W2552664347","https://openalex.org/W2612733213","https://openalex.org/W2751981393","https://openalex.org/W2886903924","https://openalex.org/W2912272895","https://openalex.org/W3011642719","https://openalex.org/W3094953523","https://openalex.org/W3095501038","https://openalex.org/W3204481226","https://openalex.org/W4301756919"],"related_works":["https://openalex.org/W2068422856","https://openalex.org/W2607474334","https://openalex.org/W2122349997","https://openalex.org/W3210428198","https://openalex.org/W2185394135","https://openalex.org/W2082366402","https://openalex.org/W188714996","https://openalex.org/W2062132293","https://openalex.org/W2062644051","https://openalex.org/W3047024706"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
