{"id":"https://openalex.org/W2761923002","doi":"https://doi.org/10.1155/2017/3834685","title":"Fault Attack on the Authenticated Cipher ACORN v2","display_name":"Fault Attack on the Authenticated Cipher ACORN v2","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2761923002","doi":"https://doi.org/10.1155/2017/3834685","mag":"2761923002"},"language":"en","primary_location":{"id":"doi:10.1155/2017/3834685","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2017/3834685","pdf_url":"http://downloads.hindawi.com/journals/scn/2017/3834685.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"http://downloads.hindawi.com/journals/scn/2017/3834685.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Xiaojuan Zhang","orcid":"https://orcid.org/0000-0002-5603-2349"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaojuan Zhang","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101439689","display_name":"Xiutao Feng","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiutao Feng","raw_affiliation_strings":["Key Laboratory of Mathematics Mechanization, Academy of Mathematics and System Science, Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Mathematics Mechanization, Academy of Mathematics and System Science, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I19820366"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008820992","display_name":"Dongdai Lin","orcid":"https://orcid.org/0000-0002-3951-7889"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongdai Lin","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":1.0393,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.83569707,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":"2017","issue":null,"first_page":"1","last_page":"16"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9866999983787537,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9801999926567078,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7489773035049438},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.7437574863433838},{"id":"https://openalex.org/keywords/keystream","display_name":"Keystream","score":0.5462332963943481},{"id":"https://openalex.org/keywords/fault","display_name":"Fault (geology)","score":0.49054592847824097},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.324199914932251},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.243445485830307},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.23412486910820007},{"id":"https://openalex.org/keywords/geology","display_name":"Geology","score":0.16368797421455383}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7489773035049438},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.7437574863433838},{"id":"https://openalex.org/C2776132008","wikidata":"https://www.wikidata.org/wiki/Q1509893","display_name":"Keystream","level":4,"score":0.5462332963943481},{"id":"https://openalex.org/C175551986","wikidata":"https://www.wikidata.org/wiki/Q47089","display_name":"Fault (geology)","level":2,"score":0.49054592847824097},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.324199914932251},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.243445485830307},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.23412486910820007},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.16368797421455383},{"id":"https://openalex.org/C165205528","wikidata":"https://www.wikidata.org/wiki/Q83371","display_name":"Seismology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2017/3834685","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2017/3834685","pdf_url":"http://downloads.hindawi.com/journals/scn/2017/3834685.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:ed77fb398ca44695a4df029611087291","is_oa":true,"landing_page_url":"https://doaj.org/article/ed77fb398ca44695a4df029611087291","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2017 (2017)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2017/3834685","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2017/3834685","pdf_url":"http://downloads.hindawi.com/journals/scn/2017/3834685.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3975985793","display_name":null,"funder_award_id":"XDA06010701","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4305889120","display_name":null,"funder_award_id":"61572491","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5997635272","display_name":null,"funder_award_id":"61572491","funder_id":"https://openalex.org/F4320321133","funder_display_name":"Chinese Academy of Sciences"},{"id":"https://openalex.org/G6258415954","display_name":null,"funder_award_id":"Chinese","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6314305349","display_name":null,"funder_award_id":"XDA06010701","funder_id":"https://openalex.org/F4320321133","funder_display_name":"Chinese Academy of Sciences"},{"id":"https://openalex.org/G6335640023","display_name":null,"funder_award_id":"61379139","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6376634536","display_name":null,"funder_award_id":"61379139","funder_id":"https://openalex.org/F4320321133","funder_display_name":"Chinese Academy of Sciences"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321133","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2761923002.pdf","grobid_xml":"https://content.openalex.org/works/W2761923002.grobid-xml"},"referenced_works_count":10,"referenced_works":["https://openalex.org/W6399285","https://openalex.org/W181763016","https://openalex.org/W338310075","https://openalex.org/W1611613623","https://openalex.org/W2018058491","https://openalex.org/W2126787366","https://openalex.org/W2155441237","https://openalex.org/W2168767876","https://openalex.org/W2170489924","https://openalex.org/W2523387121"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2400911942","https://openalex.org/W2211781628","https://openalex.org/W2348944122","https://openalex.org/W2086567862","https://openalex.org/W2073919152","https://openalex.org/W2070565817","https://openalex.org/W2614608824"],"abstract_inverted_index":{"Fault":[0],"attack":[1,29,37,142,185],"is":[2,38,143,159,176],"an":[3,48],"efficient":[4],"cryptanalysis":[5],"method":[6],"against":[7],"cipher":[8],"implementations":[9],"and":[10,54,61,135,172],"has":[11],"attracted":[12],"a":[13,27,71],"lot":[14],"of":[15,43,51,106,116,140,162,180,193],"attention":[16],"in":[17],"recent":[18],"public":[19],"cryptographic":[20],"literatures.":[21],"In":[22],"this":[23],"work":[24],"we":[25,68,123],"introduce":[26],"fault":[28,45,59,73,84,107,163],"on":[30],"the":[31,41,65,83,104,114,120,129,160,177,190],"CAESAR":[32],"candidate":[33],"ACORN":[34,52],"v2.":[35],"Our":[36,184],"done":[39],"under":[40],"assumption":[42],"random":[44],"injection":[46],"into":[47,189],"initial":[49],"state":[50],"v2":[53],"contains":[55],"two":[56,125],"main":[57],"steps:":[58],"locating":[60,74,108],"equation":[62],"solving.":[63],"At":[64],"first":[66,69,121],"step,":[67,122,131],"present":[70],"fundamental":[72],"method,":[75],"which":[76,100],"uses":[77],"99-bit":[78],"output":[79],"keystream":[80],"to":[81,109],"determine":[82],"injected":[85],"location":[86],"with":[87],"probability":[88,105],"<mml:math":[89,147,156,167,173],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[90,148,157,168,174],"id=\"M1\"><mml:mn":[91],"mathvariant=\"normal\">97.08</mml:mn><mml:mi":[92],"mathvariant=\"normal\">%</mml:mi></mml:math>.":[93],"And":[94],"then":[95],"several":[96],"improvements":[97],"are":[98],"provided,":[99],"can":[101],"further":[102],"increase":[103],"almost":[110],"1.":[111],"As":[112],"for":[113],"system":[115],"equations":[117],"retrieved":[118],"at":[119,128,153],"give":[124],"solving":[126,181],"methods":[127],"second":[130],"that":[132,166],"is,":[133],"linearization":[134],"guess-and-determine.":[136],"The":[137],"time":[138,178],"complexity":[139,179],"our":[141],"not":[144],"larger":[145],"than":[146],"id=\"M2\"><mml:mi>c</mml:mi><mml:mo>\u00b7</mml:mo><mml:msup><mml:mrow><mml:mn":[149],"mathvariant=\"normal\">2</mml:mn></mml:mrow><mml:mrow><mml:mn":[150],"mathvariant=\"normal\">179.19</mml:mn><mml:mo>-</mml:mo><mml:mn":[151],"mathvariant=\"normal\">1.76</mml:mn><mml:mi>N</mml:mi></mml:mrow></mml:msup></mml:math>":[152],"worst,":[154],"where":[155],"id=\"M3\"><mml:mrow><mml:mi>N</mml:mi></mml:mrow></mml:math>":[158],"number":[161],"injections":[164],"such":[165,194],"id=\"M4\"><mml:mn":[169],"mathvariant=\"normal\">31</mml:mn><mml:mo>\u2264</mml:mo><mml:mi>N</mml:mi><mml:mo>\u2264</mml:mo><mml:mn":[170],"mathvariant=\"normal\">88</mml:mn></mml:math>":[171],"id=\"M5\"><mml:mrow><mml:mi>c</mml:mi></mml:mrow></mml:math>":[175],"linear":[182],"equations.":[183],"provides":[186],"some":[187],"insights":[188],"diffusion":[191],"ability":[192],"compact":[195],"stream":[196],"ciphers.":[197]},"counts_by_year":[{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":2}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
