{"id":"https://openalex.org/W2956316105","doi":"https://doi.org/10.1145/3321705.3329810","title":"SoK","display_name":"SoK","publication_year":2019,"publication_date":"2019-07-02","ids":{"openalex":"https://openalex.org/W2956316105","doi":"https://doi.org/10.1145/3321705.3329810","mag":"2956316105"},"language":"en","primary_location":{"id":"doi:10.1145/3321705.3329810","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3321705.3329810","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065705744","display_name":"Mustafa Khairallah","orcid":"https://orcid.org/0000-0002-2144-4829"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Mustafa Khairallah","raw_affiliation_strings":["NTU, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"NTU, Singapore, Singapore","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069420868","display_name":"Xiaolu Hou","orcid":"https://orcid.org/0000-0002-4512-6921"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xiaolu Hou","raw_affiliation_strings":["Acronis, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Acronis, Singapore, Singapore","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078667203","display_name":"Zakaria Najm","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zakaria Najm","raw_affiliation_strings":["NTU and TU Delft, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"NTU and TU Delft, Singapore, Singapore","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052953682","display_name":"Jakub Breier","orcid":"https://orcid.org/0000-0002-7844-5267"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jakub Breier","raw_affiliation_strings":["NTU, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"NTU, Singapore, Singapore","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081720773","display_name":"Shivam Bhasin","orcid":"https://orcid.org/0000-0002-6903-5127"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shivam Bhasin","raw_affiliation_strings":["NTU, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"NTU, Singapore, Singapore","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012053340","display_name":"Thomas Peyrin","orcid":"https://orcid.org/0000-0002-2690-9197"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Thomas Peyrin","raw_affiliation_strings":["NTU, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"NTU, Singapore, Singapore","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5065705744"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.4201,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.70470825,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"403","last_page":"414"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9883999824523926,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9855999946594238,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4840599596500397}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4840599596500397}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3321705.3329810","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3321705.3329810","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W18028457","https://openalex.org/W748243377","https://openalex.org/W1211073914","https://openalex.org/W1524438853","https://openalex.org/W1533392870","https://openalex.org/W1537875328","https://openalex.org/W1556212265","https://openalex.org/W1894646615","https://openalex.org/W1958084802","https://openalex.org/W2004715563","https://openalex.org/W2008905509","https://openalex.org/W2066465211","https://openalex.org/W2108857396","https://openalex.org/W2110162979","https://openalex.org/W2110530251","https://openalex.org/W2110941647","https://openalex.org/W2115141985","https://openalex.org/W2139750209","https://openalex.org/W2150878966","https://openalex.org/W2150892302","https://openalex.org/W2170489924","https://openalex.org/W2277945859","https://openalex.org/W2280109954","https://openalex.org/W2290360510","https://openalex.org/W2461125394","https://openalex.org/W2488343031","https://openalex.org/W2504919933","https://openalex.org/W2556196092","https://openalex.org/W2573893443","https://openalex.org/W2575547374","https://openalex.org/W2602892162","https://openalex.org/W2740038400","https://openalex.org/W2746746438","https://openalex.org/W2758952349","https://openalex.org/W2772465982","https://openalex.org/W2794613733","https://openalex.org/W2798600174","https://openalex.org/W2808639052","https://openalex.org/W2903580515","https://openalex.org/W2923275078","https://openalex.org/W2923466348","https://openalex.org/W2967757647","https://openalex.org/W3030356974","https://openalex.org/W3135067613","https://openalex.org/W4243211329","https://openalex.org/W4256301847"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W2350741829","https://openalex.org/W2530322880","https://openalex.org/W1596801655"],"abstract_inverted_index":{"Recently,":[0],"the":[1,27,30,62,96,130,133,136,149,164,173,180,222,243,246,254,302],"NIST":[2,303],"launched":[3],"a":[4,10,113,169,177,211,225,233,259],"competition":[5],"for":[6,50,99,158,241,245],"lightweight":[7],"cryptography":[8],"and":[9,20,267,288],"large":[11],"number":[12,227,262],"of":[13,124,132,135,151,228,263,265,298],"ciphers":[14,64,86,150],"are":[15,32],"expected":[16],"to":[17,34,58,68,195,214,252],"be":[18,35,69,186],"studied":[19],"analyzed":[21,36],"under":[22],"this":[23,103,109,152],"competition.":[24],"Apart":[25],"from":[26,54],"classical":[28],"security,":[29],"candidates":[31,300],"desired":[33],"against":[37,71,204],"physical":[38,47],"attacks.":[39],"Differential":[40],"Fault":[41],"Analysis":[42],"(DFA)":[43],"is":[44,192,201],"an":[45,197],"invasive":[46],"attack":[48,76,116],"method":[49,117],"recovering":[51],"key":[52,181,223,257],"information":[53],"cipher":[55,89,199],"implementations.":[56],"Up":[57],"date,":[59],"almost":[60],"all":[61,148],"block":[63,126,276],"have":[65],"been":[66],"shown":[67],"vulnerable":[70],"DFA,":[72,205],"while":[73],"following":[74],"similar":[75],"patterns.":[77],"However,":[78],"so":[79],"far":[80],"researchers":[81],"mostly":[82],"focused":[83],"on":[84,139,147,274],"particular":[85],"rather":[87],"than":[88],"families,":[90],"resulting":[91],"in":[92,172,301],"works":[93],"that":[94,145,157,190,200,219],"reuse":[95],"same":[97],"idea":[98],"different":[100],"ciphers.":[101,127],"In":[102],"article,":[104],"we":[105,209],"aim":[106],"at":[107],"bridging":[108],"gap,":[110],"by":[111,142],"providing":[112],"generic":[114],"DFA":[115,296],"targeting":[118],"Substitution-Permutation":[119],"Network":[120],"(SPN)":[121],"based":[122],"families":[123],"symmetric":[125],"We":[128,155,230,270],"provide":[129],"overview":[131],"state-of-the-art":[134],"fault":[137,165,217,247],"attacks":[138],"SPNs,":[140],"followed":[141],"generalized":[143],"conditions":[144],"hold":[146],"design":[153,196],"family.":[154],"show":[156],"any":[159],"SPN,":[160],"as":[161,163],"long":[162],"mask":[166],"injected":[167],"before":[168],"non-linear":[170],"layer":[171],"last":[174,255],"round":[175,256],"follows":[176],"non-uniform":[178],"distribution,":[179],"search":[182],"space":[183],"can":[184,220],"always":[185],"reduced.":[187],"This":[188],"shows":[189],"it":[191],"not":[193],"possible":[194],"SPN-based":[198],"completely":[202],"secure":[203],"without":[206],"randomization.":[207],"Furthermore,":[208],"propose":[210],"novel":[212],"approach":[213],"find":[215],"good":[216],"masks":[218],"leak":[221],"with":[224,258],"small":[226,261],"instances.":[229],"then":[231],"developed":[232,291],"tool,":[234],"called":[235],"Joint":[236],"Difference":[237],"Distribution":[238],"Table":[239],"(JDDT)":[240],"pre-computing":[242],"solutions":[244],"equations,":[248],"which":[249],"allows":[250],"us":[251],"recover":[253],"very":[260],"pairs":[264],"faulty":[266],"non-faulty":[268],"ciphertexts.":[269],"evaluate":[271],"our":[272],"methodology":[273],"various":[275],"ciphers,":[277],"including":[278],"PRESENT-80,":[279],"PRESENT-128,":[280],"GIFT-64,":[281],"GIFT-128,":[282],"AES-128,":[283],"LED-64,":[284],"LED-128,":[285],"Skinny,":[286],"Pride":[287],"Prince.":[289],"The":[290],"technique":[292],"would":[293],"allow":[294],"automated":[295],"analysis":[297],"several":[299],"competitio":[304]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2019-07-23T00:00:00"}
