{"id":"https://openalex.org/W3094953523","doi":"https://doi.org/10.1145/3411504.3421218","title":"PRINCE under Differential Fault Attack","display_name":"PRINCE under Differential Fault Attack","publication_year":2020,"publication_date":"2020-11-05","ids":{"openalex":"https://openalex.org/W3094953523","doi":"https://doi.org/10.1145/3411504.3421218","mag":"3094953523"},"language":"en","primary_location":{"id":"doi:10.1145/3411504.3421218","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3411504.3421218","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069066434","display_name":"Aikata Aikata","orcid":"https://orcid.org/0000-0003-0934-2982"},"institutions":[{"id":"https://openalex.org/I4210121466","display_name":"Indian Institute of Technology Bhilai","ror":"https://ror.org/02sscsx71","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210121466"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Aikata","raw_affiliation_strings":["Indian Institute of Technology Bhilai, Raipur, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Bhilai, Raipur, India","institution_ids":["https://openalex.org/I4210121466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066371936","display_name":"Banashri Karmakar","orcid":"https://orcid.org/0000-0002-6610-2187"},"institutions":[{"id":"https://openalex.org/I4210121466","display_name":"Indian Institute of Technology Bhilai","ror":"https://ror.org/02sscsx71","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210121466"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Banashri Karmakar","raw_affiliation_strings":["Indian Institute of Technology Bhilai, Raipur, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Bhilai, Raipur, India","institution_ids":["https://openalex.org/I4210121466"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108024318","display_name":"Dhiman Saha","orcid":"https://orcid.org/0000-0002-4668-073X"},"institutions":[{"id":"https://openalex.org/I4210121466","display_name":"Indian Institute of Technology Bhilai","ror":"https://ror.org/02sscsx71","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210121466"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Dhiman Saha","raw_affiliation_strings":["Indian Institute of Technology Bhilai, Raipur, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Bhilai, Raipur, India","institution_ids":["https://openalex.org/I4210121466"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5069066434"],"corresponding_institution_ids":["https://openalex.org/I4210121466"],"apc_list":null,"apc_paid":null,"fwci":0.1326,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.55588945,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"81","last_page":"91"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9768999814987183,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.8129456639289856},{"id":"https://openalex.org/keywords/differential","display_name":"Differential (mechanical device)","score":0.6464052796363831},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6401785612106323},{"id":"https://openalex.org/keywords/fault","display_name":"Fault (geology)","score":0.611644983291626},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.5497897863388062},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.432937890291214},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4213041663169861},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3517586886882782},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.30106478929519653},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.269110769033432},{"id":"https://openalex.org/keywords/geology","display_name":"Geology","score":0.1736765205860138},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.17064884305000305},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.14881882071495056},{"id":"https://openalex.org/keywords/seismology","display_name":"Seismology","score":0.12510210275650024}],"concepts":[{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.8129456639289856},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.6464052796363831},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6401785612106323},{"id":"https://openalex.org/C175551986","wikidata":"https://www.wikidata.org/wiki/Q47089","display_name":"Fault (geology)","level":2,"score":0.611644983291626},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.5497897863388062},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.432937890291214},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4213041663169861},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3517586886882782},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.30106478929519653},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.269110769033432},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.1736765205860138},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.17064884305000305},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.14881882071495056},{"id":"https://openalex.org/C165205528","wikidata":"https://www.wikidata.org/wiki/Q83371","display_name":"Seismology","level":1,"score":0.12510210275650024},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3411504.3421218","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3411504.3421218","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/11","score":0.46000000834465027,"display_name":"Sustainable cities and communities"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W132386699","https://openalex.org/W1588462372","https://openalex.org/W1834056812","https://openalex.org/W1893322863","https://openalex.org/W1971372748","https://openalex.org/W2020867825","https://openalex.org/W2066425771","https://openalex.org/W2098290609","https://openalex.org/W2130073314","https://openalex.org/W2170489924","https://openalex.org/W2208284559","https://openalex.org/W2400976025","https://openalex.org/W2406650649","https://openalex.org/W2472740573","https://openalex.org/W2572396573","https://openalex.org/W2604141962","https://openalex.org/W2741625516","https://openalex.org/W2949824104","https://openalex.org/W2950922290","https://openalex.org/W6605397189","https://openalex.org/W6764399795"],"related_works":["https://openalex.org/W1638546798","https://openalex.org/W4390979909","https://openalex.org/W2777135250","https://openalex.org/W4389575897","https://openalex.org/W2117179505","https://openalex.org/W1524307340","https://openalex.org/W3080116368","https://openalex.org/W2150878966","https://openalex.org/W140343426","https://openalex.org/W1980393268"],"abstract_inverted_index":{"Fault":[0],"analysis":[1,25],"is":[2],"one":[3,142],"of":[4,16,41,92,124,143,147,169],"the":[5,13,28,51,63,82,107,118,127,130,138,144,153,162],"most":[6],"studied":[7],"physical":[8],"attacks":[9,26,76,188],"primarily":[10],"due":[11],"to":[12,47,69,137,152,183],"inherent":[14],"ease":[15],"implementation.":[17],"This":[18],"work":[19,34,55,149,178],"investigates":[20],"integral":[21,39,72,85],"and":[22,73,94,103,150],"differential":[23,74,110],"fault":[24,75,86,111],"on":[27,62,77,155,158,189],"well-known":[29],"lightweight":[30],"block-cipher":[31],"PRINCE.":[32,190],"The":[33,54,84],"begins":[35],"by":[36],"identifying":[37],"new":[38,58],"properties":[40,66],"PRINCE":[42,78,159,170],"which":[43,179],"are":[44,67],"not":[45],"restricted":[46],"be":[48,133,181],"symmetric":[49],"around":[50],"middle":[52,139],"rounds.":[53],"also":[56,173],"identifies":[57],"slow":[59,108],"diffusion":[60,109],"trails":[61],"cipher.":[64],"Both":[65],"exploited":[68],"mount":[70],"practical":[71],"that":[79,129],"uniquely":[80],"recover":[81],"key.":[83],"attack":[87,112],"has":[88,172],"a":[89,122,165],"time":[90],"complexity":[91,123],"236":[93],"220":[95],"with":[96,114,121],"15":[97],"nibble":[98],"faults":[99,131],"in":[100,117,161,176],"round":[101,120],"8.5":[102],"9.5":[104],"respectively":[105],"while":[106],"works":[113],"4":[115],"bit-faults":[116],"10th":[119],"222.":[125],"Finally,":[126],"fact":[128],"can":[132,180],"injected":[134],"very":[135],"close":[136],"rounds":[140],"forms":[141],"interesting":[145],"aspects":[146],"this":[148,177],"adds":[151],"state-of-the-art":[154],"contemporary":[156],"results":[157],"available":[160],"literature.":[163],"Moreover,":[164],"3-D":[166],"visualization":[167],"model":[168],"state":[171],"been":[174],"proposed":[175],"used":[182],"extend":[184],"or":[185],"improve":[186],"existing":[187]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
