{"id":"https://openalex.org/W2007852429","doi":"https://doi.org/10.1109/tcsii.2013.2268379","title":"Fault Rate Analysis: Breaking Masked AES Hardware Implementations Efficiently","display_name":"Fault Rate Analysis: Breaking Masked AES Hardware Implementations Efficiently","publication_year":2013,"publication_date":"2013-07-16","ids":{"openalex":"https://openalex.org/W2007852429","doi":"https://doi.org/10.1109/tcsii.2013.2268379","mag":"2007852429"},"language":"en","primary_location":{"id":"doi:10.1109/tcsii.2013.2268379","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsii.2013.2268379","pdf_url":null,"source":{"id":"https://openalex.org/S93916849","display_name":"IEEE Transactions on Circuits & Systems II Express Briefs","issn_l":"1549-7747","issn":["1549-7747","1558-3791"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Circuits and Systems II: Express Briefs","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100419957","display_name":"An Wang","orcid":"https://orcid.org/0000-0001-8806-0902"},"institutions":[{"id":"https://openalex.org/I4210119392","display_name":"Institute of Microelectronics","ror":"https://ror.org/02s6gs133","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210119392"]},{"id":"https://openalex.org/I4210137766","display_name":"Institute for Advanced Study","ror":"https://ror.org/03xg85719","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210137766"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN","DE"],"is_corresponding":true,"raw_author_name":"An Wang","raw_affiliation_strings":["Institute for Advanced Study and the Institute of Microelectronics, Tsinghua University, Beijing, China","Cryptanalyse","Institute for Advanced Study [Tsinghua]"],"affiliations":[{"raw_affiliation_string":"Institute for Advanced Study and the Institute of Microelectronics, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089","https://openalex.org/I4210119392"]},{"raw_affiliation_string":"Cryptanalyse","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"Institute for Advanced Study [Tsinghua]","institution_ids":["https://openalex.org/I4210137766"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100652421","display_name":"Man Chen","orcid":"https://orcid.org/0009-0006-4599-7328"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Man Chen","raw_affiliation_strings":["Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China","Shandong University"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China","institution_ids":["https://openalex.org/I4210132990","https://openalex.org/I154099455"]},{"raw_affiliation_string":"Shandong University","institution_ids":["https://openalex.org/I154099455"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081721333","display_name":"Zongyue Wang","orcid":"https://orcid.org/0000-0003-2409-7065"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zongyue Wang","raw_affiliation_strings":["Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China","Shandong University"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China","institution_ids":["https://openalex.org/I4210132990","https://openalex.org/I154099455"]},{"raw_affiliation_string":"Shandong University","institution_ids":["https://openalex.org/I154099455"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100447919","display_name":"Xiaoyun Wang","orcid":"https://orcid.org/0000-0002-7846-269X"},"institutions":[{"id":"https://openalex.org/I4210137766","display_name":"Institute for Advanced Study","ror":"https://ror.org/03xg85719","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210137766"]},{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN","DE"],"is_corresponding":false,"raw_author_name":"Xiaoyun Wang","raw_affiliation_strings":["Institute for Advanced Study, Tsinghua University, Beijing, China","Institute for Advanced Study [Tsinghua]","Cryptanalyse"],"affiliations":[{"raw_affiliation_string":"Institute for Advanced Study, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Institute for Advanced Study [Tsinghua]","institution_ids":["https://openalex.org/I4210137766"]},{"raw_affiliation_string":"Cryptanalyse","institution_ids":["https://openalex.org/I4210132990"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100419957"],"corresponding_institution_ids":["https://openalex.org/I4210119392","https://openalex.org/I4210132990","https://openalex.org/I4210137766","https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":3.9814,"has_fulltext":false,"cited_by_count":26,"citation_normalized_percentile":{"value":0.93600358,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"60","issue":"8","first_page":"517","last_page":"521"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.727019190788269},{"id":"https://openalex.org/keywords/aes-implementations","display_name":"AES implementations","score":0.6819806098937988},{"id":"https://openalex.org/keywords/byte","display_name":"Byte","score":0.6428635120391846},{"id":"https://openalex.org/keywords/glitch","display_name":"Glitch","score":0.62480628490448},{"id":"https://openalex.org/keywords/advanced-encryption-standard","display_name":"Advanced Encryption Standard","score":0.6049822568893433},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.5160174369812012},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.49347078800201416},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4575177729129791},{"id":"https://openalex.org/keywords/critical-path-method","display_name":"Critical path method","score":0.4541179835796356},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.44616666436195374},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.43142324686050415},{"id":"https://openalex.org/keywords/s-box","display_name":"S-box","score":0.42825746536254883},{"id":"https://openalex.org/keywords/collision","display_name":"Collision","score":0.41453105211257935},{"id":"https://openalex.org/keywords/masking","display_name":"Masking (illustration)","score":0.410089373588562},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.22741857171058655},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.17569202184677124},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.17470046877861023},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14961424469947815},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11568513512611389},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.0830434262752533}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.727019190788269},{"id":"https://openalex.org/C46331935","wikidata":"https://www.wikidata.org/wiki/Q4651362","display_name":"AES implementations","level":4,"score":0.6819806098937988},{"id":"https://openalex.org/C43364308","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Byte","level":2,"score":0.6428635120391846},{"id":"https://openalex.org/C191287063","wikidata":"https://www.wikidata.org/wiki/Q543281","display_name":"Glitch","level":3,"score":0.62480628490448},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.6049822568893433},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.5160174369812012},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.49347078800201416},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4575177729129791},{"id":"https://openalex.org/C115874739","wikidata":"https://www.wikidata.org/wiki/Q825377","display_name":"Critical path method","level":2,"score":0.4541179835796356},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.44616666436195374},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.43142324686050415},{"id":"https://openalex.org/C45737032","wikidata":"https://www.wikidata.org/wiki/Q748364","display_name":"S-box","level":4,"score":0.42825746536254883},{"id":"https://openalex.org/C121704057","wikidata":"https://www.wikidata.org/wiki/Q352070","display_name":"Collision","level":2,"score":0.41453105211257935},{"id":"https://openalex.org/C2777402240","wikidata":"https://www.wikidata.org/wiki/Q6783436","display_name":"Masking (illustration)","level":2,"score":0.410089373588562},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.22741857171058655},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.17569202184677124},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.17470046877861023},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14961424469947815},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11568513512611389},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0830434262752533},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tcsii.2013.2268379","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsii.2013.2268379","pdf_url":null,"source":{"id":"https://openalex.org/S93916849","display_name":"IEEE Transactions on Circuits & Systems II Express Briefs","issn_l":"1549-7747","issn":["1549-7747","1558-3791"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Circuits and Systems II: Express Briefs","raw_type":"journal-article"},{"id":"pmh:oai:HAL:hal-00922227v1","is_oa":false,"landing_page_url":"https://inria.hal.science/hal-00922227","pdf_url":null,"source":{"id":"https://openalex.org/S4406922466","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Transactions on Circuits and Systems Part 2 Analog and Digital Signal Processing, 2013, 60 (8), pp.517-521. &#x27E8;10.1109/TCSII.2013.2268379&#x27E9;","raw_type":"Journal articles"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W155292398","https://openalex.org/W191675466","https://openalex.org/W1483831648","https://openalex.org/W1498044825","https://openalex.org/W1515827409","https://openalex.org/W1532559214","https://openalex.org/W1562542037","https://openalex.org/W1613874182","https://openalex.org/W1839956289","https://openalex.org/W1945555650","https://openalex.org/W2028904175","https://openalex.org/W2062455052","https://openalex.org/W2117758617","https://openalex.org/W2153458792","https://openalex.org/W2170478686","https://openalex.org/W2170489924","https://openalex.org/W2914572864","https://openalex.org/W6606227525","https://openalex.org/W6607771394","https://openalex.org/W6628778570","https://openalex.org/W6629838552","https://openalex.org/W6630967683","https://openalex.org/W6631832762","https://openalex.org/W6633579635","https://openalex.org/W6636388380","https://openalex.org/W6638973939","https://openalex.org/W6685043173","https://openalex.org/W6685157903"],"related_works":["https://openalex.org/W3208859339","https://openalex.org/W4253256042","https://openalex.org/W2059218952","https://openalex.org/W4399487526","https://openalex.org/W2166313671","https://openalex.org/W3121248233","https://openalex.org/W1973614941","https://openalex.org/W2145838615","https://openalex.org/W2398445454","https://openalex.org/W2910283520"],"abstract_inverted_index":{"In":[0,15],"2011,":[1,149],"Li":[2],"presented":[3],"clockwise":[4,23],"collision":[5,24],"analysis":[6,29],"on":[7,31,135,141],"nonprotected":[8],"Advanced":[9],"Encryption":[10],"Standard":[11],"(AES)":[12],"hardware":[13],"implementation.":[14],"this":[16,105],"brief,":[17],"we":[18,35],"first":[19],"propose":[20],"a":[21,112,127],"new":[22],"attack,":[25],"called":[26],"fault":[27],"rate":[28],"(FRA),":[30],"masked":[32],"AES.":[33],"Then,":[34],"analyze":[36],"the":[37,43,54,57,61,64,68,78,92,95,99,114,122,139],"critical":[38,96],"and":[39,45,60,144,148,159],"noncritical":[40],"paths":[41],"of":[42,98,156,161],"S-box":[44,101],"find":[46],"that,":[47],"for":[48],"its":[49],"three":[50,133],"input":[51,55,58],"bytes,":[52],"namely,":[53],"value,":[56],"mask,":[59,63],"output":[62,69,115],"path":[65,97,107],"relating":[66,76],"to":[67,77,121,126],"mask":[70,116],"is":[71,108],"much":[72],"shorter":[73],"than":[74],"those":[75],"other":[79],"two":[80],"inputs.":[81],"Therefore,":[82],"some":[83],"sophisticated":[84],"glitch":[85],"cycles":[86],"can":[87],"be":[88],"chosen":[89],"such":[90],"that":[91],"values":[93],"in":[94],"whole":[100],"are":[102],"destroyed":[103],"but":[104],"short":[106],"not":[109,118],"affected.":[110],"As":[111],"result,":[113],"does":[117],"offer":[119],"protection":[120],"S-box,":[123],"which":[124],"leads":[125],"more":[128],"efficient":[129],"attack.":[130],"Compared":[131],"with":[132],"attacks":[134],"masking":[136],"countermeasures":[137],"at":[138],"Workshop":[140],"Cryptographic":[142],"Hardware":[143],"Embedded":[145],"Systems":[146],"2010":[147],"our":[150],"method":[151],"only":[152],"costs":[153],"about":[154],"8%":[155],"their":[157,162],"time":[158],"4%":[160],"storage":[163],"space.":[164]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":5},{"year":2015,"cited_by_count":3}],"updated_date":"2026-03-13T16:22:10.518609","created_date":"2025-10-10T00:00:00"}
