{"id":"https://openalex.org/W2269057670","doi":"https://doi.org/10.1109/tetc.2015.2434103","title":"Can Algorithm Diversity in Stream Cipher Implementation Thwart (Natural and) Malicious Faults?","display_name":"Can Algorithm Diversity in Stream Cipher Implementation Thwart (Natural and) Malicious Faults?","publication_year":2015,"publication_date":"2015-05-20","ids":{"openalex":"https://openalex.org/W2269057670","doi":"https://doi.org/10.1109/tetc.2015.2434103","mag":"2269057670"},"language":"en","primary_location":{"id":"doi:10.1109/tetc.2015.2434103","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tetc.2015.2434103","pdf_url":null,"source":{"id":"https://openalex.org/S2496326734","display_name":"IEEE Transactions on Emerging Topics in Computing","issn_l":"2168-6750","issn":["2168-6750","2376-4562"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Emerging Topics in Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046702904","display_name":"Xiaofei Guo","orcid":"https://orcid.org/0000-0003-1646-8823"},"institutions":[{"id":"https://openalex.org/I1343180700","display_name":"Intel (United States)","ror":"https://ror.org/01ek73717","country_code":"US","type":"company","lineage":["https://openalex.org/I1343180700"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Xiaofei Guo","raw_affiliation_strings":["Security Center of Excellence, Intel Corporation, Hillsboro, OR, USA"],"affiliations":[{"raw_affiliation_string":"Security Center of Excellence, Intel Corporation, Hillsboro, OR, USA","institution_ids":["https://openalex.org/I1343180700"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5104730760","display_name":"Chenglu Jin","orcid":null},"institutions":[{"id":"https://openalex.org/I140172145","display_name":"University of Connecticut","ror":"https://ror.org/02der9h97","country_code":"US","type":"education","lineage":["https://openalex.org/I140172145"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chenglu Jin","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Connecticut, Storrs, CT, USA","Department of Electrical and Computer Engineering, University of Connecticut, CT, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Connecticut, Storrs, CT, USA","institution_ids":["https://openalex.org/I140172145"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Connecticut, CT, USA","institution_ids":["https://openalex.org/I140172145"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101710506","display_name":"Chi Zhang","orcid":"https://orcid.org/0009-0002-7365-5158"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chi Zhang","raw_affiliation_strings":["Department of Computer Science, Carnegie Mellon University, Pittsburgh, PA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Carnegie Mellon University, Pittsburgh, PA, USA","institution_ids":["https://openalex.org/I74973139"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083454001","display_name":"Athanasios Papadimitriou","orcid":"https://orcid.org/0000-0002-4127-7554"},"institutions":[{"id":"https://openalex.org/I4210145979","display_name":"Laboratoire de Conception et d'Int\u00e9gration des Syst\u00e8mes","ror":"https://ror.org/04eg25g76","country_code":"FR","type":"facility","lineage":["https://openalex.org/I106785703","https://openalex.org/I4210145979","https://openalex.org/I899635006","https://openalex.org/I899635006"]},{"id":"https://openalex.org/I899635006","display_name":"Universit\u00e9 Grenoble Alpes","ror":"https://ror.org/02rx3b187","country_code":"FR","type":"education","lineage":["https://openalex.org/I899635006"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Athanasios Papadimitriou","raw_affiliation_strings":["LCIS, University of Grenoble Alpes, Valence, France"],"affiliations":[{"raw_affiliation_string":"LCIS, University of Grenoble Alpes, Valence, France","institution_ids":["https://openalex.org/I4210145979","https://openalex.org/I899635006"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060495895","display_name":"David H\u00e9ly","orcid":"https://orcid.org/0000-0003-3249-7667"},"institutions":[{"id":"https://openalex.org/I106785703","display_name":"Institut polytechnique de Grenoble","ror":"https://ror.org/05sbt2524","country_code":"FR","type":"education","lineage":["https://openalex.org/I106785703","https://openalex.org/I899635006"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"David H\u00e9ly","raw_affiliation_strings":["LCIS Laboratory, Grenoble Institute of Technology, Grenoble, France"],"affiliations":[{"raw_affiliation_string":"LCIS Laboratory, Grenoble Institute of Technology, Grenoble, France","institution_ids":["https://openalex.org/I106785703"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059648257","display_name":"Ramesh Karri","orcid":"https://orcid.org/0000-0001-7989-5617"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ramesh Karri","raw_affiliation_strings":["Department of Electrical and Computer Engineering, New York University School of Engineering, Brooklyn, NY, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, New York University School of Engineering, Brooklyn, NY, USA","institution_ids":["https://openalex.org/I57206974"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5046702904"],"corresponding_institution_ids":["https://openalex.org/I1343180700"],"apc_list":null,"apc_paid":null,"fwci":0.4441,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.77955,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"4","issue":"3","first_page":"363","last_page":"373"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8072422742843628},{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.6457853317260742},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5340425372123718},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5145534873008728},{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.47694912552833557},{"id":"https://openalex.org/keywords/fault-tolerance","display_name":"Fault tolerance","score":0.455355167388916},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.45242229104042053},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.36527711153030396},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.2860173285007477},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2707597613334656},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.22588488459587097},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.22581934928894043},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.145843505859375}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8072422742843628},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.6457853317260742},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5340425372123718},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5145534873008728},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.47694912552833557},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.455355167388916},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.45242229104042053},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.36527711153030396},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2860173285007477},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2707597613334656},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.22588488459587097},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.22581934928894043},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.145843505859375}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tetc.2015.2434103","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tetc.2015.2434103","pdf_url":null,"source":{"id":"https://openalex.org/S2496326734","display_name":"IEEE Transactions on Emerging Topics in Computing","issn_l":"2168-6750","issn":["2168-6750","2376-4562"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Emerging Topics in Computing","raw_type":"journal-article"},{"id":"pmh:oai:HAL:hal-01205402v1","is_oa":false,"landing_page_url":"https://hal.science/hal-01205402","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Transactions on Emerging Topics in Computing, 2015, &#x27E8;10.1109/TETC.2015.2434103&#x27E9;","raw_type":"Journal articles"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6963516764","display_name":null,"funder_award_id":"0831349","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320307102","display_name":"Intel Corporation","ror":"https://ror.org/01ek73717"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W6399285","https://openalex.org/W94002110","https://openalex.org/W359206926","https://openalex.org/W641446768","https://openalex.org/W1483831648","https://openalex.org/W1561363170","https://openalex.org/W1821002386","https://openalex.org/W1975427173","https://openalex.org/W1984785602","https://openalex.org/W2010612500","https://openalex.org/W2012979154","https://openalex.org/W2013826204","https://openalex.org/W2027283517","https://openalex.org/W2041396597","https://openalex.org/W2049624985","https://openalex.org/W2054806199","https://openalex.org/W2058219874","https://openalex.org/W2062455052","https://openalex.org/W2063207167","https://openalex.org/W2065428437","https://openalex.org/W2072402822","https://openalex.org/W2076602574","https://openalex.org/W2078476898","https://openalex.org/W2079792016","https://openalex.org/W2085992264","https://openalex.org/W2113688179","https://openalex.org/W2128546931","https://openalex.org/W2141060521","https://openalex.org/W2144137738","https://openalex.org/W2149767240","https://openalex.org/W2154980653","https://openalex.org/W2161550346","https://openalex.org/W4230748503","https://openalex.org/W6628778570","https://openalex.org/W6638517669","https://openalex.org/W6644043060","https://openalex.org/W6663247020"],"related_works":["https://openalex.org/W2102525122","https://openalex.org/W2153096481","https://openalex.org/W2148616436","https://openalex.org/W4306316843","https://openalex.org/W2036953450","https://openalex.org/W2130594209","https://openalex.org/W2527822502","https://openalex.org/W4245282135","https://openalex.org/W2170004886","https://openalex.org/W4300955944"],"abstract_inverted_index":{"Hardware":[0,58],"implementations":[1],"of":[2,102],"stream":[3,47],"and":[4,31,43,55,89,160],"other":[5],"ciphers":[6],"are":[7,83],"vulnerable":[8,79],"to":[9,40,80,127,148],"natural":[10,30,42],"faults.":[11,33],"Moreover,":[12],"attackers":[13],"can":[14],"launch":[15],"fault":[16,69,114],"attacks":[17],"on":[18],"these":[19],"implementations.":[20],"Concurrent":[21],"error":[22],"detection":[23],"is":[24,65,78,125,140],"used":[25],"as":[26,95,109],"a":[27,153],"countermeasure":[28],"against":[29,68],"malicious":[32,44],"We":[34,49],"propose":[35],"an":[36,99],"algorithm":[37],"diversity":[38],"(AD)":[39],"detect":[41,98],"faults":[45,81],"in":[46,85,133],"ciphers.":[48],"compare":[50],"AD":[51,132,143],"with":[52,118],"hardware,":[53],"time,":[54],"information":[56],"redundancies.":[57],"redundancy":[59,72,92,106],"has":[60,73],"100%":[61],"hardware":[62,75,120,138,161],"overhead,":[63,76,159],"but":[64,77],"not":[66],"secure":[67],"attacks.":[70],"Time":[71],"lower":[74,129],"that":[82],"injected":[84],"both":[86],"the":[87,137],"computation":[88],"recomputation.":[90],"Information":[91,105],"techniques,":[93,107],"such":[94,108],"parity,":[96],"cannot":[97],"even":[100],"number":[101],"faulty":[103],"bits.":[104],"robust":[110,123],"code,":[111],"have":[112,128],"higher":[113,119,145],"miss":[115],"rate":[116],"(FMR)":[117],"overhead.":[121,162],"If":[122],"code":[124],"configured":[126],"FMR":[130],"than":[131],"certain":[134],"attacker":[135],"model,":[136],"overhead":[139],"excessively":[141],"high.":[142],"provides":[144],"security":[146],"compared":[147],"existing":[149],"techniques.":[150],"It":[151],"enables":[152],"cost-effective":[154],"tradeoff":[155],"between":[156],"security,":[157],"performance":[158]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2026-02-19T06:27:42.648592","created_date":"2016-06-24T00:00:00"}
