{"id":"https://openalex.org/W2067235573","doi":"https://doi.org/10.1109/tifs.2014.2374072","title":"Fault Attacks on STRNGs: Impact of Glitches, Temperature, and Underpowering on Randomness","display_name":"Fault Attacks on STRNGs: Impact of Glitches, Temperature, and Underpowering on Randomness","publication_year":2014,"publication_date":"2014-11-24","ids":{"openalex":"https://openalex.org/W2067235573","doi":"https://doi.org/10.1109/tifs.2014.2374072","mag":"2067235573"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2014.2374072","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2014.2374072","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088736485","display_name":"Honorio Mart\u00edn","orcid":"https://orcid.org/0000-0002-8720-406X"},"institutions":[{"id":"https://openalex.org/I50357001","display_name":"Universidad Carlos III de Madrid","ror":"https://ror.org/03ths8210","country_code":"ES","type":"education","lineage":["https://openalex.org/I50357001"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Honorio Martin","raw_affiliation_strings":["University Carlos III de Madrid, Madrid, Spain","Univ. Carlos III de Madrid, Madrid, Spain#TAB#"],"affiliations":[{"raw_affiliation_string":"University Carlos III de Madrid, Madrid, Spain","institution_ids":["https://openalex.org/I50357001"]},{"raw_affiliation_string":"Univ. Carlos III de Madrid, Madrid, Spain#TAB#","institution_ids":["https://openalex.org/I50357001"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039266038","display_name":"Thomas Korak","orcid":null},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Thomas Korak","raw_affiliation_strings":["Institute for Applied Information Processing and Communications, Graz University of Technology, Graz, Austria","Institute for Applied Information Processing and Communications, Graz University of Technology, Graz, Austria#TAB#"],"affiliations":[{"raw_affiliation_string":"Institute for Applied Information Processing and Communications, Graz University of Technology, Graz, Austria","institution_ids":["https://openalex.org/I4092182"]},{"raw_affiliation_string":"Institute for Applied Information Processing and Communications, Graz University of Technology, Graz, Austria#TAB#","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081150570","display_name":"Enrique San Mill\u00e1n","orcid":"https://orcid.org/0000-0001-9465-9276"},"institutions":[{"id":"https://openalex.org/I50357001","display_name":"Universidad Carlos III de Madrid","ror":"https://ror.org/03ths8210","country_code":"ES","type":"education","lineage":["https://openalex.org/I50357001"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Enrique San Millan","raw_affiliation_strings":["University Carlos III de Madrid, Madrid, Spain","Univ. Carlos III de Madrid, Madrid, Spain#TAB#"],"affiliations":[{"raw_affiliation_string":"University Carlos III de Madrid, Madrid, Spain","institution_ids":["https://openalex.org/I50357001"]},{"raw_affiliation_string":"Univ. Carlos III de Madrid, Madrid, Spain#TAB#","institution_ids":["https://openalex.org/I50357001"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032974710","display_name":"Michael Hutter","orcid":"https://orcid.org/0009-0006-0138-5151"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Michael Hutter","raw_affiliation_strings":["Cryptography Research, Inc., San Francisco, CA, USA",", Cryptography Research, Inc., San Francisco, CA, USA"],"affiliations":[{"raw_affiliation_string":"Cryptography Research, Inc., San Francisco, CA, USA","institution_ids":[]},{"raw_affiliation_string":", Cryptography Research, Inc., San Francisco, CA, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5088736485"],"corresponding_institution_ids":["https://openalex.org/I50357001"],"apc_list":null,"apc_paid":null,"fwci":2.5204,"has_fulltext":false,"cited_by_count":49,"citation_normalized_percentile":{"value":0.89557582,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"10","issue":"2","first_page":"266","last_page":"277"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8098201751708984},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6766428351402283},{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.6397678852081299},{"id":"https://openalex.org/keywords/random-number-generation","display_name":"Random number generation","score":0.5922790765762329},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48202645778656006},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.45012474060058594},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.4235316216945648},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.4207269549369812},{"id":"https://openalex.org/keywords/ephemeral-key","display_name":"Ephemeral key","score":0.4127102196216583}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8098201751708984},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6766428351402283},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.6397678852081299},{"id":"https://openalex.org/C201866948","wikidata":"https://www.wikidata.org/wiki/Q228206","display_name":"Random number generation","level":2,"score":0.5922790765762329},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48202645778656006},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.45012474060058594},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.4235316216945648},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.4207269549369812},{"id":"https://openalex.org/C76947770","wikidata":"https://www.wikidata.org/wiki/Q4533181","display_name":"Ephemeral key","level":2,"score":0.4127102196216583}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2014.2374072","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2014.2374072","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7599999904632568,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W170084955","https://openalex.org/W200116028","https://openalex.org/W609264487","https://openalex.org/W1517403092","https://openalex.org/W1537450689","https://openalex.org/W1564309918","https://openalex.org/W1565273324","https://openalex.org/W1588877666","https://openalex.org/W1600075072","https://openalex.org/W1607006990","https://openalex.org/W1712912884","https://openalex.org/W1868304350","https://openalex.org/W1980645273","https://openalex.org/W2023823680","https://openalex.org/W2049051873","https://openalex.org/W2073766244","https://openalex.org/W2094021188","https://openalex.org/W2113322447","https://openalex.org/W2119723794","https://openalex.org/W2120646029","https://openalex.org/W2154909745","https://openalex.org/W2167352984","https://openalex.org/W2183849663","https://openalex.org/W2696718061","https://openalex.org/W2914572864","https://openalex.org/W3029245066","https://openalex.org/W3140517496","https://openalex.org/W4231905827","https://openalex.org/W4243494487","https://openalex.org/W6606892769","https://openalex.org/W6632106617","https://openalex.org/W6633818482","https://openalex.org/W6635070356","https://openalex.org/W6637800919","https://openalex.org/W6639316159","https://openalex.org/W6678235480","https://openalex.org/W6682554491","https://openalex.org/W6686055275","https://openalex.org/W6759495720","https://openalex.org/W6825343983"],"related_works":["https://openalex.org/W5280335","https://openalex.org/W4384807855","https://openalex.org/W2164725015","https://openalex.org/W4323926098","https://openalex.org/W2022533428","https://openalex.org/W182679101","https://openalex.org/W2013165531","https://openalex.org/W2425598453","https://openalex.org/W2782264121","https://openalex.org/W4244949874"],"abstract_inverted_index":{"True":[0],"random":[1,18],"number":[2],"generators":[3],"(TRNGs)":[4],"are":[5,14,29],"the":[6,51,63,67,114,132,139,145,152],"basic":[7],"building":[8,71],"blocks":[9,72],"of":[10,43,53,69,118,134,147],"cryptographic":[11,54],"implementations.":[12],"They":[13],"used":[15,31],"to":[16,24,37,49,65,130,137],"generate":[17,25],"numbers":[19],"required":[20],"for":[21],"security":[22,52],"protocols,":[23],"ephemeral":[26],"keys,":[27],"and":[28,75,105,112,120],"often":[30],"in":[32,62,108,116],"hiding":[33],"or":[34],"masking":[35],"countermeasures":[36],"thwart":[38],"implementation":[39,111],"attacks.":[40,77,122,143],"The":[41],"protection":[42],"TRNGs":[44],"is":[45,151],"an":[46,109],"important":[47],"issue":[48],"guarantee":[50],"systems":[55],"but":[56],"less":[57],"attention":[58],"has":[59],"been":[60],"made":[61],"past":[64],"evaluate":[66],"susceptibility":[68,133],"these":[70,135],"against":[73,141],"passive":[74],"active":[76,83],"In":[78],"this":[79,150],"paper,":[80],"we":[81,124],"present":[82],"fault":[84,142,159],"attacks":[85,136,160],"on":[86,128,161],"a":[87,126],"recently":[88],"proposed":[89],"specific":[90],"TRNG":[91],"architecture":[92],"presented":[93],"by":[94],"Cherkaoui":[95],"et":[96],"al.":[97],"at":[98],"CHES":[99],"2013.":[100],"We":[101],"successfully":[102],"injected":[103],"power":[104],"clock":[106],"glitches":[107],"FPGA":[110],"elaborated":[113],"design":[115],"respect":[117],"thermo":[119],"underpowering":[121],"Furthermore,":[123],"propose":[125],"method":[127],"how":[129],"reduce":[131],"increase":[138],"resistance":[140],"To":[144],"best":[146],"our":[148],"knowledge,":[149],"first":[153],"work":[154],"that":[155],"evaluates":[156],"practical":[157],"clock-glitch-based":[158],"self-timed":[162],"ring-based":[163],"TRNGs.":[164]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":2}],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-10-10T00:00:00"}
