{"id":"https://openalex.org/W4413155237","doi":"https://doi.org/10.1109/jiot.2025.3598444","title":"Statistical Fault Attacks on ASCON Using Improved Square Euclidean Imbalance","display_name":"Statistical Fault Attacks on ASCON Using Improved Square Euclidean Imbalance","publication_year":2025,"publication_date":"2025-08-13","ids":{"openalex":"https://openalex.org/W4413155237","doi":"https://doi.org/10.1109/jiot.2025.3598444"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2025.3598444","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3598444","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091767796","display_name":"Guosheng Xu","orcid":"https://orcid.org/0000-0002-3310-926X"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]},{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Guosheng Xu","raw_affiliation_strings":["School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, China","School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, China","institution_ids":["https://openalex.org/I204983213"]},{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Zihan Wang","orcid":"https://orcid.org/0009-0001-2073-7785"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zihan Wang","raw_affiliation_strings":["School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yuque Zhang","orcid":"https://orcid.org/0009-0007-0662-2678"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuque Zhang","raw_affiliation_strings":["School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100385875","display_name":"Chenyu Wang","orcid":"https://orcid.org/0000-0002-6527-2897"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chenyu Wang","raw_affiliation_strings":["School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083089425","display_name":"Guiling Xu","orcid":"https://orcid.org/0000-0001-5995-6398"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]},{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guoai Xu","raw_affiliation_strings":["School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, China","School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, China","institution_ids":["https://openalex.org/I204983213"]},{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5091767796"],"corresponding_institution_ids":["https://openalex.org/I139759216","https://openalex.org/I204983213"],"apc_list":null,"apc_paid":null,"fwci":1.2417,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.81161465,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"12","issue":"20","first_page":"43621","last_page":"43629"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10780","display_name":"Reliability and Maintenance Optimization","score":0.9686999917030334,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10780","display_name":"Reliability and Maintenance Optimization","score":0.9686999917030334,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.96670001745224,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11032","display_name":"VLSI and Analog Circuit Testing","score":0.9544000029563904,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6831185817718506},{"id":"https://openalex.org/keywords/euclidean-distance","display_name":"Euclidean distance","score":0.5789868831634521},{"id":"https://openalex.org/keywords/square","display_name":"Square (algebra)","score":0.5462685227394104},{"id":"https://openalex.org/keywords/statistical-analysis","display_name":"Statistical analysis","score":0.46579301357269287},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4243299961090088},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.22837036848068237},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.21009713411331177},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.19971421360969543}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6831185817718506},{"id":"https://openalex.org/C120174047","wikidata":"https://www.wikidata.org/wiki/Q847073","display_name":"Euclidean distance","level":2,"score":0.5789868831634521},{"id":"https://openalex.org/C135692309","wikidata":"https://www.wikidata.org/wiki/Q111124","display_name":"Square (algebra)","level":2,"score":0.5462685227394104},{"id":"https://openalex.org/C2986587452","wikidata":"https://www.wikidata.org/wiki/Q938438","display_name":"Statistical analysis","level":2,"score":0.46579301357269287},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4243299961090088},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.22837036848068237},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.21009713411331177},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.19971421360969543},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3598444","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3598444","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","score":0.5899999737739563,"display_name":"Climate action"}],"awards":[{"id":"https://openalex.org/G1896941178","display_name":null,"funder_award_id":"2023RC69","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G5111637319","display_name":null,"funder_award_id":"4252009","funder_id":"https://openalex.org/F4320334977","funder_display_name":"Beijing Municipal Natural Science Foundation"},{"id":"https://openalex.org/G7515678565","display_name":null,"funder_award_id":"CJGJZD20240729113700002","funder_id":"https://openalex.org/F4320329836","funder_display_name":"Chuzhou Science and Technology Program"}],"funders":[{"id":"https://openalex.org/F4320329836","display_name":"Chuzhou Science and Technology Program","ror":null},{"id":"https://openalex.org/F4320334977","display_name":"Beijing Municipal Natural Science Foundation","ror":null},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1483831648","https://openalex.org/W1493755219","https://openalex.org/W1829732909","https://openalex.org/W2071722828","https://openalex.org/W2085992264","https://openalex.org/W2170489924","https://openalex.org/W2884109160","https://openalex.org/W2952371452","https://openalex.org/W3088704016","https://openalex.org/W3176114260","https://openalex.org/W4251236654","https://openalex.org/W4283691678","https://openalex.org/W4285119820","https://openalex.org/W4405252230"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2051487156","https://openalex.org/W2073681303","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109"],"abstract_inverted_index":{"In":[0,113],"current":[1],"environment":[2],"of":[3,9,31,41,73,115,158,214,227],"frequent":[4],"information":[5],"exchange":[6],"between":[7],"Internet":[8],"Things":[10],"(IoT)":[11],"devices,":[12,26],"traditional":[13],"cryptographic":[14,33,43,78],"algorithms":[15],"often":[16],"fail":[17],"to":[18,61,154,242],"effectively":[19],"play":[20],"a":[21,101,120,147,211],"role":[22],"in":[23,63],"resource-limited":[24],"electronic":[25],"which":[27,229],"highlights":[28],"the":[29,38,49,64,67,156,161,216,224],"importance":[30],"lightweight":[32,42],"algorithms.":[34],"NIST":[35],"has":[36,47],"completed":[37],"standardization":[39],"process":[40],"algorithms,":[44],"and":[45,178,200,236,238],"ASCON":[46,71],"become":[48],"ultimate":[50],"winner.":[51],"It":[52],"is":[53,72,84,107,152,164,187],"foreseeable":[54],"that":[55,219],"its":[56],"application":[57],"demand":[58],"will":[59],"continue":[60],"grow":[62],"future,":[65],"so":[66],"security":[68],"analysis":[69,80],"for":[70,96,110,126,233],"significant":[74],"value.":[75],"Among":[76],"various":[77],"algorithm":[79],"methods,":[81],"fault":[82,93,123,150,170,175,181],"attack":[83,94,124,171,176,182],"an":[85],"efficient":[86,122],"choice.":[87],"Currently,":[88],"there":[89],"are":[90,138],"also":[91],"some":[92],"methods":[95],"ASCON,":[97,127,215],"but":[98],"they":[99],"share":[100],"common":[102],"issue:":[103],"their":[104],"time":[105,185,225],"complexity":[106,157,186,226],"too":[108],"high":[109],"practical":[111],"application.":[112],"view":[114],"this,":[116],"this":[117],"article":[118],"proposes":[119],"more":[121,240],"method":[125],"including":[128],"several":[129,133],"key":[130,163],"points:":[131],"First,":[132],"new":[134],"statistical":[135,168,173,179],"scoring":[136],"function":[137],"constructed":[139],"based":[140],"on":[141,210],"square":[142],"euclidean":[143],"imbalance":[144],"(SEI).":[145],"Second,":[146],"single":[148],"S-box":[149],"model":[151],"proposed":[153],"reduce":[155],"injection.":[159],"Lastly,":[160],"complete":[162],"recovered":[165],"by":[166],"combining":[167],"ineffective":[169],"(SIFA),":[172],"effective":[174],"(SEFA),":[177],"hybrid":[180],"(SHFA).":[183],"The":[184],"<inline-formula":[188,194,201],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[189,195,202],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">":[190,196,203],"<tex-math":[191,197,204],"notation=\"LaTeX\">$2^{16.57}$":[192],"</tex-math></inline-formula>,":[193,199,206],"notation=\"LaTeX\">$2^{14.91}$":[198],"notation=\"LaTeX\">$2^{14.52}$":[205],"respectively.":[207],"Experimental":[208],"results":[209,217],"Python":[212],"implementation":[213],"show":[218],"our":[220],"scheme":[221],"significantly":[222],"reduces":[223],"attacks,":[228],"can":[230],"provide":[231],"warnings":[232],"cryptography":[234],"design":[235],"applications,":[237],"pay":[239],"attention":[241],"avoiding":[243],"such":[244],"risks.":[245]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
