{"id":"https://openalex.org/W3117527407","doi":"https://doi.org/10.1109/host45689.2020.9300267","title":"DESIV: Differential Fault Analysis of SIV-Rijndael256 with a Single Fault","display_name":"DESIV: Differential Fault Analysis of SIV-Rijndael256 with a Single Fault","publication_year":2020,"publication_date":"2020-12-07","ids":{"openalex":"https://openalex.org/W3117527407","doi":"https://doi.org/10.1109/host45689.2020.9300267","mag":"3117527407"},"language":"en","primary_location":{"id":"doi:10.1109/host45689.2020.9300267","is_oa":false,"landing_page_url":"https://doi.org/10.1109/host45689.2020.9300267","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069066434","display_name":"Aikata Aikata","orcid":"https://orcid.org/0000-0003-0934-2982"},"institutions":[{"id":"https://openalex.org/I4210121466","display_name":"Indian Institute of Technology Bhilai","ror":"https://ror.org/02sscsx71","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210121466"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Aikata","raw_affiliation_strings":["Department of Electrical Engineering and Computer Science, de.ci.phe.red LAB, Indian Institute of Technology Bhilai"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Computer Science, de.ci.phe.red LAB, Indian Institute of Technology Bhilai","institution_ids":["https://openalex.org/I4210121466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066371936","display_name":"Banashri Karmakar","orcid":"https://orcid.org/0000-0002-6610-2187"},"institutions":[{"id":"https://openalex.org/I4210121466","display_name":"Indian Institute of Technology Bhilai","ror":"https://ror.org/02sscsx71","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210121466"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Banashri Karmakar","raw_affiliation_strings":["Department of Electrical Engineering and Computer Science, de.ci.phe.red LAB, Indian Institute of Technology Bhilai"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Computer Science, de.ci.phe.red LAB, Indian Institute of Technology Bhilai","institution_ids":["https://openalex.org/I4210121466"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068524908","display_name":"Dhiman Saha","orcid":"https://orcid.org/0000-0001-5162-9683"},"institutions":[{"id":"https://openalex.org/I4210121466","display_name":"Indian Institute of Technology Bhilai","ror":"https://ror.org/02sscsx71","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210121466"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Dhiman Saha","raw_affiliation_strings":["Department of Electrical Engineering and Computer Science, de.ci.phe.red LAB, Indian Institute of Technology Bhilai"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Computer Science, de.ci.phe.red LAB, Indian Institute of Technology Bhilai","institution_ids":["https://openalex.org/I4210121466"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5069066434"],"corresponding_institution_ids":["https://openalex.org/I4210121466"],"apc_list":null,"apc_paid":null,"fwci":0.2651,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.65099274,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"2017","issue":null,"first_page":"241","last_page":"251"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.735764741897583},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6814514994621277},{"id":"https://openalex.org/keywords/key-schedule","display_name":"Key schedule","score":0.5719650983810425},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5368320345878601},{"id":"https://openalex.org/keywords/fault","display_name":"Fault (geology)","score":0.46924638748168945},{"id":"https://openalex.org/keywords/byte","display_name":"Byte","score":0.45133548974990845},{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.41960081458091736},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3943333029747009},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.38479477167129517},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34075939655303955},{"id":"https://openalex.org/keywords/differential-cryptanalysis","display_name":"Differential cryptanalysis","score":0.242340087890625},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.09253942966461182}],"concepts":[{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.735764741897583},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6814514994621277},{"id":"https://openalex.org/C112145980","wikidata":"https://www.wikidata.org/wiki/Q2569509","display_name":"Key schedule","level":5,"score":0.5719650983810425},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5368320345878601},{"id":"https://openalex.org/C175551986","wikidata":"https://www.wikidata.org/wiki/Q47089","display_name":"Fault (geology)","level":2,"score":0.46924638748168945},{"id":"https://openalex.org/C43364308","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Byte","level":2,"score":0.45133548974990845},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.41960081458091736},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3943333029747009},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.38479477167129517},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34075939655303955},{"id":"https://openalex.org/C36123800","wikidata":"https://www.wikidata.org/wiki/Q1224471","display_name":"Differential cryptanalysis","level":4,"score":0.242340087890625},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.09253942966461182},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C165205528","wikidata":"https://www.wikidata.org/wiki/Q83371","display_name":"Seismology","level":1,"score":0.0},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/host45689.2020.9300267","is_oa":false,"landing_page_url":"https://doi.org/10.1109/host45689.2020.9300267","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5899999737739563}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W76791259","https://openalex.org/W174421785","https://openalex.org/W1524438853","https://openalex.org/W1537875328","https://openalex.org/W1556212265","https://openalex.org/W1599175145","https://openalex.org/W1607874478","https://openalex.org/W1779923173","https://openalex.org/W1829732909","https://openalex.org/W1855109561","https://openalex.org/W1894646615","https://openalex.org/W2034196335","https://openalex.org/W2066425771","https://openalex.org/W2068120960","https://openalex.org/W2104281932","https://openalex.org/W2110162979","https://openalex.org/W2110941647","https://openalex.org/W2125765133","https://openalex.org/W2141124495","https://openalex.org/W2170489924","https://openalex.org/W2185342914","https://openalex.org/W2404448171","https://openalex.org/W2502665144","https://openalex.org/W2504919933","https://openalex.org/W2579400469","https://openalex.org/W2606231755","https://openalex.org/W2621380316","https://openalex.org/W2741840250","https://openalex.org/W2757403014","https://openalex.org/W4251810237","https://openalex.org/W4285719527","https://openalex.org/W6675478375","https://openalex.org/W6713880235","https://openalex.org/W6738472258"],"related_works":["https://openalex.org/W2610633131","https://openalex.org/W4318899699","https://openalex.org/W2058945216","https://openalex.org/W3049224195","https://openalex.org/W2949320056","https://openalex.org/W2036520688","https://openalex.org/W1489350638","https://openalex.org/W1566979565","https://openalex.org/W2610780560","https://openalex.org/W2385517711"],"abstract_inverted_index":{"This":[0],"work":[1,43],"analyzes":[2],"the":[3,47,57,64,82,85,93,102,120,124,127,144,149,153,158,166,174,181,190],"strength":[4],"of":[5,16,63,84,90,95,129,176,186],"NIST":[6,191],"Lightweight":[7],"Cryptography":[8],"(LWC)":[9],"Round":[10],"1":[11],"Candidate":[12],"SIV-Rijndael256":[13,25,91],"in":[14,41,49,79,119,136,189],"light":[15],"Differential":[17],"Fault":[18],"Attacks":[19],"(DFA).":[20],"It":[21],"is":[22,98,180],"observed":[23],"that":[24,74],"presents":[26],"an":[27,170],"interesting":[28],"case":[29],"for":[30,126],"DFA":[31,50,73,96],"due":[32],"to":[33,44,46,70,100,109,141,148,155],"its":[34],"large":[35],"state-size":[36],"which":[37,132],"has":[38],"been":[39,134],"capitalized":[40],"this":[42,179],"contribute":[45],"state-of-the-art":[48],"on":[51],"AES-like":[52],"ciphers.":[53],"We":[54],"first":[55,182],"study":[56],"differential":[58,183],"properties":[59,83],"over":[60],"three":[61],"rounds":[62],"cipher":[65],"and":[66,97],"then":[67],"use":[68,94],"it":[69],"mount":[71],"a":[72,76,114,139,162],"uses":[75],"classical":[77],"strategy":[78],"conjunction":[80],"with":[81],"key-schedule.":[86],"The":[87],"nonce-misuse":[88],"property":[89],"facilitates":[92],"exploited":[99],"reduce":[101],"key-space":[103],"from":[104],"2":[105],"<sup":[106],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[107],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">128</sup>":[108],"just":[110,161],"one":[111],"using":[112,160],"only":[113],"single":[115,163],"random":[116],"byte":[117],"fault":[118,164,184],"internal":[121],"state.":[122],"Moreover,":[123],"support":[125],"release":[128],"unverified":[130],"plaintexts":[131],"have":[133],"shown":[135],"literature":[137],"as":[138],"vulnerability":[140],"DFA,":[142],"makes":[143,165],"decryption":[145],"also":[146],"vulnerable":[147],"same":[150],"attack.":[151],"Finally,":[152],"ability":[154],"uniquely":[156],"retrieve":[157],"key":[159],"attack,":[167],"reported":[168],"here,":[169],"optimal":[171],"DFA.":[172],"To":[173],"best":[175],"our":[177],"knowledge,":[178],"analysis":[185],"any":[187],"candidate":[188],"LWC":[192],"competition.":[193]},"counts_by_year":[{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
