{"id":"https://openalex.org/W3173439069","doi":"https://doi.org/10.1109/access.2021.3092314","title":"Table Redundancy Method for Protecting Against Fault Attacks","display_name":"Table Redundancy Method for Protecting Against Fault Attacks","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3173439069","doi":"https://doi.org/10.1109/access.2021.3092314","mag":"3173439069"},"language":"en","primary_location":{"id":"doi:10.1109/access.2021.3092314","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3092314","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09465147.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09465147.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083938393","display_name":"Seungkwang Lee","orcid":"https://orcid.org/0000-0001-9534-9624"},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]},{"id":"https://openalex.org/I157485424","display_name":"Korea Advanced Institute of Science and Technology","ror":"https://ror.org/05apxxy63","country_code":"KR","type":"education","lineage":["https://openalex.org/I157485424"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Seungkwang Lee","raw_affiliation_strings":["School of Computing, Korea Advanced Institute of Science and Technology (KAIST), Daejeon, South Korea","Cryptographic Engineering Research Section, Electronics and Telecommunications Research Institute (ETRI), Daejeon, South Korea"],"affiliations":[{"raw_affiliation_string":"School of Computing, Korea Advanced Institute of Science and Technology (KAIST), Daejeon, South Korea","institution_ids":["https://openalex.org/I157485424"]},{"raw_affiliation_string":"Cryptographic Engineering Research Section, Electronics and Telecommunications Research Institute (ETRI), Daejeon, South Korea","institution_ids":["https://openalex.org/I142401562"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073972669","display_name":"Nam-Su Jho","orcid":"https://orcid.org/0000-0003-1721-5350"},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Nam-Su Jho","raw_affiliation_strings":["Cryptographic Engineering Research Section, Electronics and Telecommunications Research Institute (ETRI), Daejeon, South Korea"],"affiliations":[{"raw_affiliation_string":"Cryptographic Engineering Research Section, Electronics and Telecommunications Research Institute (ETRI), Daejeon, South Korea","institution_ids":["https://openalex.org/I142401562"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101610666","display_name":"Myungchul Kim","orcid":"https://orcid.org/0000-0001-8077-0053"},"institutions":[{"id":"https://openalex.org/I157485424","display_name":"Korea Advanced Institute of Science and Technology","ror":"https://ror.org/05apxxy63","country_code":"KR","type":"education","lineage":["https://openalex.org/I157485424"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Myungchul Kim","raw_affiliation_strings":["School of Computing, Korea Advanced Institute of Science and Technology (KAIST), Daejeon, South Korea"],"affiliations":[{"raw_affiliation_string":"School of Computing, Korea Advanced Institute of Science and Technology (KAIST), Daejeon, South Korea","institution_ids":["https://openalex.org/I157485424"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5083938393"],"corresponding_institution_ids":["https://openalex.org/I142401562","https://openalex.org/I157485424"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.6998,"has_fulltext":true,"cited_by_count":9,"citation_normalized_percentile":{"value":0.75975774,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"9","issue":null,"first_page":"92214","last_page":"92223"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8076792359352112},{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.7215893864631653},{"id":"https://openalex.org/keywords/byte","display_name":"Byte","score":0.6233969926834106},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.5670216083526611},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.520405650138855},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.47757580876350403},{"id":"https://openalex.org/keywords/table","display_name":"Table (database)","score":0.47589027881622314},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4699338376522064},{"id":"https://openalex.org/keywords/stateful-firewall","display_name":"Stateful firewall","score":0.423379123210907},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.37683653831481934},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.35676109790802},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.33060795068740845},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.29019901156425476},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.19197788834571838},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.18137061595916748},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.153997540473938},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1366540789604187}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8076792359352112},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.7215893864631653},{"id":"https://openalex.org/C43364308","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Byte","level":2,"score":0.6233969926834106},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.5670216083526611},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.520405650138855},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.47757580876350403},{"id":"https://openalex.org/C45235069","wikidata":"https://www.wikidata.org/wiki/Q278425","display_name":"Table (database)","level":2,"score":0.47589027881622314},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4699338376522064},{"id":"https://openalex.org/C22927095","wikidata":"https://www.wikidata.org/wiki/Q1784206","display_name":"Stateful firewall","level":3,"score":0.423379123210907},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.37683653831481934},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.35676109790802},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.33060795068740845},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.29019901156425476},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.19197788834571838},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.18137061595916748},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.153997540473938},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1366540789604187},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2021.3092314","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3092314","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09465147.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:9c5d6b1dda9e487a8962462ba7b94835","is_oa":true,"landing_page_url":"https://doaj.org/article/9c5d6b1dda9e487a8962462ba7b94835","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 9, Pp 92214-92223 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2021.3092314","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3092314","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09465147.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.6600000262260437,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G2896300088","display_name":null,"funder_award_id":"20ZR1300","funder_id":"https://openalex.org/F4320322093","funder_display_name":"Electronics and Telecommunications Research Institute"},{"id":"https://openalex.org/G3014564782","display_name":null,"funder_award_id":"2021R1A2C1004993","funder_id":"https://openalex.org/F4320322120","funder_display_name":"National Research Foundation of Korea"},{"id":"https://openalex.org/G3071639259","display_name":null,"funder_award_id":"2021R1","funder_id":"https://openalex.org/F4320322120","funder_display_name":"National Research Foundation of Korea"},{"id":"https://openalex.org/G7685055460","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320328359","funder_display_name":"Ministry of Science and ICT, South Korea"}],"funders":[{"id":"https://openalex.org/F4320320671","display_name":"National Research Foundation","ror":"https://ror.org/05s0g1g46"},{"id":"https://openalex.org/F4320322093","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10"},{"id":"https://openalex.org/F4320322120","display_name":"National Research Foundation of Korea","ror":"https://ror.org/013aysd81"},{"id":"https://openalex.org/F4320328359","display_name":"Ministry of Science and ICT, South Korea","ror":"https://ror.org/01wpjm123"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3173439069.pdf","grobid_xml":"https://content.openalex.org/works/W3173439069.grobid-xml"},"referenced_works_count":48,"referenced_works":["https://openalex.org/W89002490","https://openalex.org/W1493213353","https://openalex.org/W1505973206","https://openalex.org/W1524438853","https://openalex.org/W1537875328","https://openalex.org/W1572375309","https://openalex.org/W1779923173","https://openalex.org/W1800919869","https://openalex.org/W1829732909","https://openalex.org/W1846793529","https://openalex.org/W1938099525","https://openalex.org/W2028720781","https://openalex.org/W2058413145","https://openalex.org/W2062272401","https://openalex.org/W2066425771","https://openalex.org/W2071722828","https://openalex.org/W2092053813","https://openalex.org/W2110941647","https://openalex.org/W2112284176","https://openalex.org/W2112571059","https://openalex.org/W2132533351","https://openalex.org/W2144952508","https://openalex.org/W2151136913","https://openalex.org/W2154909745","https://openalex.org/W2170489924","https://openalex.org/W2293024421","https://openalex.org/W2295549364","https://openalex.org/W2889402643","https://openalex.org/W2897622948","https://openalex.org/W2898641991","https://openalex.org/W2919040637","https://openalex.org/W2954479288","https://openalex.org/W3011815211","https://openalex.org/W3019676640","https://openalex.org/W3024909990","https://openalex.org/W3030356974","https://openalex.org/W3145635186","https://openalex.org/W4230984038","https://openalex.org/W4236403289","https://openalex.org/W4243016930","https://openalex.org/W4251236654","https://openalex.org/W4251708180","https://openalex.org/W4285719527","https://openalex.org/W6630318109","https://openalex.org/W6638737612","https://openalex.org/W6640536031","https://openalex.org/W6682554491","https://openalex.org/W6778195073"],"related_works":["https://openalex.org/W2583381754","https://openalex.org/W2144255176","https://openalex.org/W2222333653","https://openalex.org/W109977192","https://openalex.org/W1970797462","https://openalex.org/W2019740326","https://openalex.org/W2047113772","https://openalex.org/W2566747981","https://openalex.org/W4312120139","https://openalex.org/W2809541058"],"abstract_inverted_index":{"Fault":[0],"attacks":[1],"(FA)":[2],"intentionally":[3],"inject":[4],"some":[5,93],"fault":[6,182],"into":[7],"the":[8,26,85,89,105,127,157,171,186],"encryption":[9],"process":[10],"for":[11,29,179],"analyzing":[12],"a":[13,61,143,167,194],"secret":[14],"key":[15],"based":[16],"on":[17],"faulty":[18,22,53,133,144],"intermediate":[19,54],"values":[20],"or":[21,47],"ciphertexts.":[23],"One":[24],"of":[25,52,78,91,159,188,197],"easy":[27],"ways":[28],"software-based":[30,63],"countermeasures":[31],"is":[32,116,146],"to":[33,75,100,148,152,156],"use":[34,158],"time":[35],"redundancy.":[36,112],"However,":[37],"existing":[38],"methods":[39],"can":[40],"be":[41],"broken":[42],"by":[43,48,110],"skipping":[44],"comparison":[45],"operations":[46],"using":[49],"non-uniform":[50],"distributions":[51],"values.":[55,134],"In":[56,135],"this":[57,137],"paper,":[58],"we":[59],"propose":[60],"secure":[62],"redundancy,":[64,68],"aptly":[65],"named":[66],"table":[67,86,111],"applying":[69],"different":[70,118],"linear":[71,161],"and":[72,88,176,192],"nonlinear":[73],"transformations":[74,119],"redundant":[76,121,128],"computations":[77,122,141],"table-based":[79],"block":[80],"cipher":[81],"structures.":[82],"To":[83],"reduce":[84],"size":[87],"number":[90],"lookups,":[92],"outer":[94],"tables":[95,107],"that":[96,117],"are":[97,102,108,123,130],"not":[98],"subjected":[99],"FA":[101,191],"shared,":[103],"while":[104],"inner":[106],"protected":[109],"The":[113],"basic":[114],"idea":[115],"protecting":[120],"correctly":[124],"decoded":[125],"if":[126],"outcomes":[129],"combined":[131],"without":[132],"addition,":[136],"recombination":[138],"provides":[139],"infective":[140],"because":[142],"byte":[145],"likely":[147],"propagate":[149],"its":[150],"error":[151],"adjacent":[153],"bytes":[154],"due":[155],"32-bit":[160],"transformations.":[162],"Our":[163],"method":[164],"also":[165],"presents":[166],"stateful":[168],"feature":[169],"in":[170],"connection":[172],"with":[173],"detected":[174],"faults":[175],"subsequent":[177],"plaintexts":[178],"preventing":[180],"iterative":[181],"injection.":[183],"We":[184],"demonstrate":[185],"protection":[187],"AES-128":[189],"against":[190],"show":[193],"negligible":[195],"advantage":[196],"FA.":[198]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2021-07-05T00:00:00"}
