{"id":"https://openalex.org/W3106758879","doi":"https://doi.org/10.1080/23799927.2020.1854863","title":"A fault attack on KCipher-2","display_name":"A fault attack on KCipher-2","publication_year":2020,"publication_date":"2020-11-24","ids":{"openalex":"https://openalex.org/W3106758879","doi":"https://doi.org/10.1080/23799927.2020.1854863","mag":"3106758879"},"language":"en","primary_location":{"id":"doi:10.1080/23799927.2020.1854863","is_oa":false,"landing_page_url":"https://doi.org/10.1080/23799927.2020.1854863","pdf_url":null,"source":{"id":"https://openalex.org/S4210234901","display_name":"International Journal of Computer Mathematics Computer Systems Theory","issn_l":"2379-9927","issn":["2379-9927","2379-9935"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Computer Mathematics: Computer Systems Theory","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078195190","display_name":"Julian Danner","orcid":"https://orcid.org/0009-0003-5090-0138"},"institutions":[{"id":"https://openalex.org/I186354981","display_name":"University of Passau","ror":"https://ror.org/05ydjnb78","country_code":"DE","type":"education","lineage":["https://openalex.org/I186354981"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"J. Danner","raw_affiliation_strings":["Faculty of Informatics and Mathematics, University of Passau, Passau, Germany"],"affiliations":[{"raw_affiliation_string":"Faculty of Informatics and Mathematics, University of Passau, Passau, Germany","institution_ids":["https://openalex.org/I186354981"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016153733","display_name":"Martin Kreuzer","orcid":"https://orcid.org/0000-0002-4732-2627"},"institutions":[{"id":"https://openalex.org/I186354981","display_name":"University of Passau","ror":"https://ror.org/05ydjnb78","country_code":"DE","type":"education","lineage":["https://openalex.org/I186354981"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"M. Kreuzer","raw_affiliation_strings":["Faculty of Informatics and Mathematics, University of Passau, Passau, Germany"],"affiliations":[{"raw_affiliation_string":"Faculty of Informatics and Mathematics, University of Passau, Passau, Germany","institution_ids":["https://openalex.org/I186354981"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5016153733"],"corresponding_institution_ids":["https://openalex.org/I186354981"],"apc_list":null,"apc_paid":null,"fwci":0.2651,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.64416505,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"6","issue":"4","first_page":"291","last_page":"312"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9828000068664551,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.8114819526672363},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6402066946029663},{"id":"https://openalex.org/keywords/stream-cipher-attack","display_name":"Stream cipher attack","score":0.5338766574859619},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.5332021117210388},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.49370989203453064},{"id":"https://openalex.org/keywords/fault","display_name":"Fault (geology)","score":0.4400455355644226},{"id":"https://openalex.org/keywords/sequence","display_name":"Sequence (biology)","score":0.41939643025398254},{"id":"https://openalex.org/keywords/polynomial","display_name":"Polynomial","score":0.4127638339996338},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.41056355834007263},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4045775234699249},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3566772937774658},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3110889196395874},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2577475905418396},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24192360043525696},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.14828070998191833}],"concepts":[{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.8114819526672363},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6402066946029663},{"id":"https://openalex.org/C96675983","wikidata":"https://www.wikidata.org/wiki/Q7622661","display_name":"Stream cipher attack","level":4,"score":0.5338766574859619},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.5332021117210388},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.49370989203453064},{"id":"https://openalex.org/C175551986","wikidata":"https://www.wikidata.org/wiki/Q47089","display_name":"Fault (geology)","level":2,"score":0.4400455355644226},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.41939643025398254},{"id":"https://openalex.org/C90119067","wikidata":"https://www.wikidata.org/wiki/Q43260","display_name":"Polynomial","level":2,"score":0.4127638339996338},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.41056355834007263},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4045775234699249},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3566772937774658},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3110889196395874},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2577475905418396},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24192360043525696},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.14828070998191833},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C165205528","wikidata":"https://www.wikidata.org/wiki/Q83371","display_name":"Seismology","level":1,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1080/23799927.2020.1854863","is_oa":false,"landing_page_url":"https://doi.org/10.1080/23799927.2020.1854863","pdf_url":null,"source":{"id":"https://openalex.org/S4210234901","display_name":"International Journal of Computer Mathematics Computer Systems Theory","issn_l":"2379-9927","issn":["2379-9927","2379-9935"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Computer Mathematics: Computer Systems Theory","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4134004993","display_name":null,"funder_award_id":"KR 1907/6-2","funder_id":"https://openalex.org/F4320320879","funder_display_name":"Deutsche Forschungsgemeinschaft"}],"funders":[{"id":"https://openalex.org/F4320320879","display_name":"Deutsche Forschungsgemeinschaft","ror":"https://ror.org/018mejw64"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W95027592","https://openalex.org/W154022573","https://openalex.org/W1484565507","https://openalex.org/W1496253867","https://openalex.org/W1537730723","https://openalex.org/W1605798759","https://openalex.org/W1635040638","https://openalex.org/W1778915605","https://openalex.org/W1987179059","https://openalex.org/W2011992362","https://openalex.org/W2071596701","https://openalex.org/W2085992264","https://openalex.org/W2090298111","https://openalex.org/W2105733530","https://openalex.org/W2168767876","https://openalex.org/W2172632525","https://openalex.org/W2253548355","https://openalex.org/W2732165109","https://openalex.org/W3135067613","https://openalex.org/W4289127653","https://openalex.org/W4298289021"],"related_works":["https://openalex.org/W2950447949","https://openalex.org/W2391794278","https://openalex.org/W2720693022","https://openalex.org/W571790067","https://openalex.org/W2186471913","https://openalex.org/W2391648142","https://openalex.org/W1526592358","https://openalex.org/W2296485668","https://openalex.org/W1604791554","https://openalex.org/W2249286906"],"abstract_inverted_index":{"For":[0,32],"the":[1,6,18,22,33,52,59,67,77,80,84,100,105],"stream":[2],"cipher":[3,23],"KCipher-2":[4],"of":[5,55,61,71,79,83],"Japanese":[7],"e-Government":[8],"Recommended":[9],"Ciphers":[10],"List,":[11],"we":[12,44,65],"present":[13],"fault":[14,72,93],"attacks":[15],"requiring":[16],"only":[17,90],"possibility":[19],"to":[20,25],"reset":[21],"and":[24,58,69,95,103],"inject":[26],"byte":[27],"faults":[28],"into":[29,41],"certain":[30,62],"registers.":[31],"polynomial":[34,101],"systems":[35,102],"resulting":[36],"from":[37],"an":[38],"injection":[39,73],"sequence":[40],"one":[42],"register,":[43],"develop":[45],"a":[46],"dedicated":[47],"algebraic":[48],"solving":[49,99],"technique.":[50],"Using":[51],"Marking":[53],"Algorithm":[54],"Horn":[56],"Logic":[57],"computation":[60],"Gr\u00f6bner":[63],"bases,":[64],"optimize":[66],"number":[68],"locations":[70],"sequences":[74],"which":[75],"allow":[76],"recovery":[78],"full":[81],"state":[82],"cipher.":[85],"The":[86],"optimal":[87],"attack":[88],"requires":[89],"about":[91],"21":[92],"injections":[94],"100":[96],"seconds":[97],"for":[98],"finding":[104],"internal":[106],"state.":[107]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
