{"id":"https://openalex.org/W4389395051","doi":"https://doi.org/10.46586/tches.v2024.i1.229-263","title":"StaTI: Protecting against Fault Attacks Using Stable Threshold Implementations","display_name":"StaTI: Protecting against Fault Attacks Using Stable Threshold Implementations","publication_year":2023,"publication_date":"2023-12-04","ids":{"openalex":"https://openalex.org/W4389395051","doi":"https://doi.org/10.46586/tches.v2024.i1.229-263"},"language":"en","primary_location":{"id":"doi:10.46586/tches.v2024.i1.229-263","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2024.i1.229-263","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/11252/10794","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://tches.iacr.org/index.php/TCHES/article/download/11252/10794","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020954518","display_name":"Siemen Dhooghe","orcid":"https://orcid.org/0000-0003-0591-7355"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":true,"raw_author_name":"Siemen Dhooghe","raw_affiliation_strings":["COSIC, ESAT, KU Leuven, Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"COSIC, ESAT, KU Leuven, Leuven, Belgium","institution_ids":["https://openalex.org/I99464096"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102588584","display_name":"Artemii Ovchinnikov","orcid":null},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Artemii Ovchinnikov","raw_affiliation_strings":["COSIC, ESAT, KU Leuven, Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"COSIC, ESAT, KU Leuven, Leuven, Belgium","institution_ids":["https://openalex.org/I99464096"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003617244","display_name":"Dilara Toprakhisar","orcid":"https://orcid.org/0000-0003-4551-6775"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Dilara Toprakhisar","raw_affiliation_strings":["COSIC, ESAT, KU Leuven, Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"COSIC, ESAT, KU Leuven, Leuven, Belgium","institution_ids":["https://openalex.org/I99464096"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5020954518"],"corresponding_institution_ids":["https://openalex.org/I99464096"],"apc_list":null,"apc_paid":null,"fwci":0.3457,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.67513716,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":"2024","issue":"1","first_page":"229","last_page":"263"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7639564871788025},{"id":"https://openalex.org/keywords/encoding","display_name":"Encoding (memory)","score":0.6137623190879822},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.5880287885665894},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5695461630821228},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5546916723251343},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.5252004265785217},{"id":"https://openalex.org/keywords/fault","display_name":"Fault (geology)","score":0.47739166021347046},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.4633048176765442},{"id":"https://openalex.org/keywords/fault-injection","display_name":"Fault injection","score":0.4311668872833252},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.429210901260376},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.4152058959007263},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.41270536184310913},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.365072637796402},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3531290292739868},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3516862988471985},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23179319500923157},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.1421939730644226},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.1358748972415924},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10918673872947693},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.07943156361579895}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7639564871788025},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.6137623190879822},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.5880287885665894},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5695461630821228},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5546916723251343},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.5252004265785217},{"id":"https://openalex.org/C175551986","wikidata":"https://www.wikidata.org/wiki/Q47089","display_name":"Fault (geology)","level":2,"score":0.47739166021347046},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.4633048176765442},{"id":"https://openalex.org/C2775928411","wikidata":"https://www.wikidata.org/wiki/Q2041312","display_name":"Fault injection","level":3,"score":0.4311668872833252},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.429210901260376},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.4152058959007263},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.41270536184310913},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.365072637796402},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3531290292739868},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3516862988471985},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23179319500923157},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.1421939730644226},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.1358748972415924},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10918673872947693},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.07943156361579895},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C165205528","wikidata":"https://www.wikidata.org/wiki/Q83371","display_name":"Seismology","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.46586/tches.v2024.i1.229-263","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2024.i1.229-263","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/11252/10794","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},{"id":"pmh:oai:lirias2repo.kuleuven.be:20.500.12942/745247","is_oa":true,"landing_page_url":"https://lirias.kuleuven.be/handle/20.500.12942/745247","pdf_url":"https://lirias.kuleuven.be/retrieve/0e511735-f947-4132-ab45-19fadcf2e59d","source":{"id":"https://openalex.org/S4306401954","display_name":"Lirias (KU Leuven)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I99464096","host_organization_name":"KU Leuven","host_organization_lineage":["https://openalex.org/I99464096"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2024 (1), (229-263)","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:doaj.org/article:29320cb6b27644ab91485c38cd116930","is_oa":true,"landing_page_url":"https://doaj.org/article/29320cb6b27644ab91485c38cd116930","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 1 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.46586/tches.v2024.i1.229-263","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2024.i1.229-263","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/11252/10794","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.6000000238418579,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G4435414571","display_name":null,"funder_award_id":"VR20192203","funder_id":"https://openalex.org/F4320327336","funder_display_name":"Vlaamse regering"}],"funders":[{"id":"https://openalex.org/F4320327336","display_name":"Vlaamse regering","ror":null}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4389395051.pdf"},"referenced_works_count":59,"referenced_works":["https://openalex.org/W131640530","https://openalex.org/W1511843316","https://openalex.org/W1514993642","https://openalex.org/W1537808739","https://openalex.org/W1567394420","https://openalex.org/W1583816927","https://openalex.org/W1592625985","https://openalex.org/W1599175145","https://openalex.org/W1613874182","https://openalex.org/W1663689473","https://openalex.org/W1873852107","https://openalex.org/W1897761346","https://openalex.org/W1999233841","https://openalex.org/W2039845393","https://openalex.org/W2071722828","https://openalex.org/W2154738435","https://openalex.org/W2170489924","https://openalex.org/W2219812381","https://openalex.org/W2293947265","https://openalex.org/W2399950949","https://openalex.org/W2494396870","https://openalex.org/W2504919933","https://openalex.org/W2593775473","https://openalex.org/W2751043011","https://openalex.org/W2751659465","https://openalex.org/W2758799253","https://openalex.org/W2795118714","https://openalex.org/W2795163976","https://openalex.org/W2805111206","https://openalex.org/W2889402643","https://openalex.org/W2893501152","https://openalex.org/W2902207657","https://openalex.org/W2951483588","https://openalex.org/W2954479288","https://openalex.org/W2954632784","https://openalex.org/W2955034376","https://openalex.org/W2978168681","https://openalex.org/W2986296566","https://openalex.org/W2991032855","https://openalex.org/W2991573376","https://openalex.org/W3011642719","https://openalex.org/W3019676640","https://openalex.org/W3046858861","https://openalex.org/W3092373052","https://openalex.org/W3114165286","https://openalex.org/W3114536378","https://openalex.org/W3157683630","https://openalex.org/W3172211066","https://openalex.org/W3178477151","https://openalex.org/W3189973470","https://openalex.org/W3215812753","https://openalex.org/W3216383071","https://openalex.org/W4234649684","https://openalex.org/W4243016930","https://openalex.org/W4245264419","https://openalex.org/W4251236654","https://openalex.org/W4285119820","https://openalex.org/W4312906348","https://openalex.org/W4388857067"],"related_works":["https://openalex.org/W2378749186","https://openalex.org/W2364088131","https://openalex.org/W2362741838","https://openalex.org/W622044715","https://openalex.org/W2121017442","https://openalex.org/W1790664656","https://openalex.org/W83665960","https://openalex.org/W2035197528","https://openalex.org/W3006344745","https://openalex.org/W2025540346"],"abstract_inverted_index":{"Fault":[0,15],"attacks":[1],"impose":[2],"a":[3,66,72,100,106,113,117,126,183,193,224],"serious":[4],"threat":[5],"against":[6,93,116],"the":[7,19,22,26,32,50,53,59,88,131,136,145,214],"practical":[8],"implementations":[9,79,89,157],"of":[10,31,52,61,90,130,144,158,164,186],"cryptographic":[11,91],"algorithms.":[12],"Statistical":[13],"Ineffective":[14],"Attacks":[16],"(SIFA),":[17],"exploiting":[18],"dependency":[20],"between":[21],"secret":[23],"data":[24],"and":[25,80,96,147,160,172,229],"fault":[27,73,97,123],"propagation":[28],"overcame":[29],"many":[30],"known":[33],"countermeasures.":[34],"Later,":[35],"several":[36],"countermeasures":[37],"have":[38],"been":[39],"proposed":[40,85],"to":[41,111,154,181,192,202,222],"tackle":[42],"this":[43,68],"attack":[44,102],"using":[45],"error":[46,62,128],"detection":[47],"methods.":[48],"However,":[49],"efficiency":[51],"countermeasures,":[54],"in":[55,99,204],"part":[56],"governed":[57],"by":[58],"number":[60],"checks,":[63],"still":[64],"remains":[65],"challenge.In":[67],"work,":[69],"we":[70,140,151,176,219],"propose":[71,177],"countermeasure,":[74],"StaTI,":[75],"based":[76],"on":[77,227,231],"threshold":[78,114,156,184],"linear":[81],"encoding":[82,179,200],"techniques.":[83],"The":[84],"countermeasure":[86],"protects":[87],"algorithms":[92],"both":[94],"side-channel":[95],"adversaries":[98],"non-combined":[101],"setting.":[103],"We":[104,196],"present":[105,152],"new":[107],"composable":[108],"notion,":[109,138],"stability,":[110],"protect":[112],"implementation":[115,185],"formal":[118],"gate/register-faulting":[119],"adversary.":[120],"Stability":[121],"ensures":[122],"propagation,":[124],"making":[125],"single":[127],"check":[129],"output":[132],"suffice.":[133],"To":[134],"illustrate":[135],"stability":[137],"first,":[139],"provide":[141,161,198],"stable":[142,162,194],"encodings":[143,163],"XOR":[146],"AND":[148],"gates.":[149],"Then,":[150],"techniques":[153,180],"encode":[155],"S-boxes,":[159],"some":[165],"quadratic":[166],"S-boxes":[167],"together":[168,211],"with":[169],"their":[170],"security":[171],"performance":[173],"evaluation.":[174],"Additionally,":[175],"general":[178],"transform":[182],"any":[187],"function":[188],"(e.g.,":[189],"non-injective":[190],"functions)":[191],"one.":[195],"then":[197],"an":[199],"technique":[201],"use":[203],"symmetric":[205],"primitives":[206],"which":[207],"encodes":[208],"state":[209,216],"elements":[210],"significantly":[212],"reducing":[213],"encoded":[215],"size.":[217],"Finally,":[218],"used":[220],"StaTI":[221],"implement":[223],"secure":[225],"Keccak":[226],"FPGA":[228],"report":[230],"its":[232],"efficiency.":[233]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
