{"id":"https://openalex.org/W2983229499","doi":"https://doi.org/10.1109/tifs.2019.2952262","title":"A Framework to Counter Statistical Ineffective Fault Analysis of Block Ciphers Using Domain Transformation and Error Correction","display_name":"A Framework to Counter Statistical Ineffective Fault Analysis of Block Ciphers Using Domain Transformation and Error Correction","publication_year":2019,"publication_date":"2019-11-07","ids":{"openalex":"https://openalex.org/W2983229499","doi":"https://doi.org/10.1109/tifs.2019.2952262","mag":"2983229499"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2019.2952262","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2019.2952262","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101432394","display_name":"Sayandeep Saha","orcid":"https://orcid.org/0000-0002-5535-1102"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Sayandeep Saha","raw_affiliation_strings":["Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur (IIT Kharagpur), Kharagpur, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur (IIT Kharagpur), Kharagpur, India","institution_ids":["https://openalex.org/I145894827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060395435","display_name":"Dirmanto Jap","orcid":"https://orcid.org/0000-0002-3149-9401"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Dirmanto Jap","raw_affiliation_strings":["Temasek Laboratories, Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"Temasek Laboratories, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102710760","display_name":"Debapriya Basu Roy","orcid":"https://orcid.org/0000-0003-4664-5237"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Debapriya Basu Roy","raw_affiliation_strings":["Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur (IIT Kharagpur), Kharagpur, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur (IIT Kharagpur), Kharagpur, India","institution_ids":["https://openalex.org/I145894827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022995945","display_name":"Avik Chakraborty","orcid":"https://orcid.org/0000-0001-5140-3836"},"institutions":[{"id":"https://openalex.org/I2251713219","display_name":"NTT (Japan)","ror":"https://ror.org/00berct97","country_code":"JP","type":"company","lineage":["https://openalex.org/I2251713219"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Avik Chakraborty","raw_affiliation_strings":["NTT Secure Platform Laboratories, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"NTT Secure Platform Laboratories, Tokyo, Japan","institution_ids":["https://openalex.org/I2251713219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081720773","display_name":"Shivam Bhasin","orcid":"https://orcid.org/0000-0002-6903-5127"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Shivam Bhasin","raw_affiliation_strings":["Temasek Laboratories, Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"Temasek Laboratories, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078971402","display_name":"Debdeep Mukhopadhyay","orcid":"https://orcid.org/0000-0002-6499-8346"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Debdeep Mukhopadhyay","raw_affiliation_strings":["Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur (IIT Kharagpur), Kharagpur, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur (IIT Kharagpur), Kharagpur, India","institution_ids":["https://openalex.org/I145894827"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101432394"],"corresponding_institution_ids":["https://openalex.org/I145894827"],"apc_list":null,"apc_paid":null,"fwci":4.3677,"has_fulltext":false,"cited_by_count":54,"citation_normalized_percentile":{"value":0.95575663,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"15","issue":null,"first_page":"1905","last_page":"1919"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8216636180877686},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.7450261116027832},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.49558985233306885},{"id":"https://openalex.org/keywords/fault-injection","display_name":"Fault injection","score":0.4682881236076355},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.45778974890708923},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4505482316017151},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.44600051641464233},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.43422043323516846},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.4253951907157898},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.41595980525016785},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3243010342121124},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.272970974445343},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.27029454708099365},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2627001404762268},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.260328471660614},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12002944946289062},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.08266618847846985}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8216636180877686},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.7450261116027832},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.49558985233306885},{"id":"https://openalex.org/C2775928411","wikidata":"https://www.wikidata.org/wiki/Q2041312","display_name":"Fault injection","level":3,"score":0.4682881236076355},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.45778974890708923},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4505482316017151},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.44600051641464233},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.43422043323516846},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.4253951907157898},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.41595980525016785},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3243010342121124},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.272970974445343},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.27029454708099365},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2627001404762268},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.260328471660614},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12002944946289062},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.08266618847846985},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2019.2952262","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2019.2952262","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7799999713897705,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W83781150","https://openalex.org/W1211073914","https://openalex.org/W1493213353","https://openalex.org/W1515595447","https://openalex.org/W1537875328","https://openalex.org/W1829732909","https://openalex.org/W1873852107","https://openalex.org/W1894646615","https://openalex.org/W1964723977","https://openalex.org/W2012919814","https://openalex.org/W2049624985","https://openalex.org/W2058413145","https://openalex.org/W2062272401","https://openalex.org/W2071722828","https://openalex.org/W2112571059","https://openalex.org/W2128197017","https://openalex.org/W2132533351","https://openalex.org/W2139750209","https://openalex.org/W2141420453","https://openalex.org/W2150878966","https://openalex.org/W2170489924","https://openalex.org/W2243712200","https://openalex.org/W2277945859","https://openalex.org/W2293024421","https://openalex.org/W2294330969","https://openalex.org/W2586046457","https://openalex.org/W2772465982","https://openalex.org/W2794563896","https://openalex.org/W2805111206","https://openalex.org/W2889402643","https://openalex.org/W2897622948","https://openalex.org/W2903644337","https://openalex.org/W2916805872","https://openalex.org/W2952371452","https://openalex.org/W2954479288","https://openalex.org/W2954632784","https://openalex.org/W3019676640","https://openalex.org/W4230984038","https://openalex.org/W4243016930","https://openalex.org/W4251236654","https://openalex.org/W6603343484","https://openalex.org/W6632100021","https://openalex.org/W6639565960","https://openalex.org/W6641304879","https://openalex.org/W6749622526","https://openalex.org/W6759651536","https://openalex.org/W6765025077","https://openalex.org/W6765394529"],"related_works":["https://openalex.org/W2004522261","https://openalex.org/W1533979697","https://openalex.org/W4386242069","https://openalex.org/W141793162","https://openalex.org/W2376652919","https://openalex.org/W2117623867","https://openalex.org/W4224241849","https://openalex.org/W2676406993","https://openalex.org/W2949316140","https://openalex.org/W2038076063"],"abstract_inverted_index":{"Right":[0],"from":[1],"its":[2],"introduction,":[3],"fault":[4,38,60,79],"attacks":[5,39],"(FA)":[6],"have":[7],"been":[8,70,108,218],"established":[9],"to":[10,18,72,99],"be":[11,133],"one":[12],"of":[13,37,47,64,76,95,115,153,210,232],"the":[14,54,65,77,116,150,171,186,195,223,233],"most":[15],"practical":[16],"threats":[17],"both":[19,237],"public":[20],"key":[21,24],"and":[22,220,239],"symmetric":[23],"based":[25],"cryptosystems.":[26],"Statistical":[27],"Ineffective":[28],"Fault":[29],"Analysis":[30],"(SIFA)":[31],"is":[32,50,98,164],"a":[33,59,101,111,154,158,174,203,228],"recently":[34],"proposed":[35,219],"class":[36],"introduced":[40],"at":[41,149,157,190],"CHES":[42],"2018.":[43],"The":[44,93,128],"fascinating":[45],"feature":[46],"this":[48,96,199,211],"attack":[49,80],"that":[51,110,143],"it":[52],"exploits":[53],"correct":[55],"ciphertexts":[56],"obtained":[57],"during":[58],"injection":[61],"campaign,":[62],"instead":[63],"faulty":[66],"ciphertexts.":[67],"SIFA":[68,126,167,184,246],"has":[69,107,217],"shown":[71],"bypass":[73],"almost":[74],"all":[75,170],"existing":[78],"countermeasures":[81],"even":[82],"when":[83],"they":[84],"are":[85,147,177,188],"combined":[86,119],"with":[87,120],"masking":[88,137,163,180],"schemes":[89],"for":[90,104,166,173,222],"side-channel":[91],"resistance.":[92],"goal":[94],"work":[97],"propose":[100],"countermeasure":[102,234],"framework":[103],"SIFA.":[105],"It":[106],"observed":[109],"randomized":[112],"domain":[113,129],"transformation":[114,130],"intermediate":[117],"computation":[118],"bit-level":[121,204],"error":[122],"correction":[123],"can":[124,132],"prevent":[125,183],"attacks.":[127],"(Transform)":[131],"realized":[134,221],"by":[135],"standard":[136],"schemes.":[138],"In":[139],"fact,":[140],"we":[141,201],"prove":[142],"if":[144,185],"biased":[145],"faults":[146,187],"injected":[148,189],"state":[151],"register":[152],"block":[155,224],"cipher":[156,225],"certain":[159,191],"target":[160],"round,":[161],"then":[162],"sufficient":[165],"protection,":[168],"until":[169],"shares":[172],"specific":[175,192],"bit":[176],"corrupted.":[178],"However,":[179],"alone":[181],"cannot":[182],"locations":[193],"inside":[194],"S-Boxes.":[196],"To":[197],"address":[198],"issue,":[200],"incorporate":[202],"error-correction":[205],"mechanism":[206],"(Encode).":[207],"An":[208],"instantiation":[209],"Transform-and-Encode":[212],"(TaE)":[213],"framework,":[214],"called":[215],"AntiSIFA,":[216],"PRESENT":[226],"as":[227,248,250],"proof-of-concept.":[229],"Practical":[230],"evaluation":[231],"implementation":[235],"in":[236],"hardware":[238],"software":[240],"ensures":[241],"our":[242],"theoretical":[243],"claims":[244],"regarding":[245],"security,":[247],"well":[249],"protection":[251],"against":[252],"Side-Channel-Attacks":[253],"(SCA).":[254]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":12},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":13},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":8}],"updated_date":"2026-04-03T22:45:19.894376","created_date":"2025-10-10T00:00:00"}
