Results 1 to 10 of about 406,684 (268)

Differential fault attack on FeW

open access: yesTongxin xuebao, 2020
In order to evaluate the security of the lightweight block cipher FeW,a differential fault attack method was proposed and discussed using a single byte random fault model.In this method,a single byte random fault was introduced on the right side of the ...
Min XIE, Jiaqi LI, Feng TIAN
doaj   +3 more sources

VLSI implementation of AES algorithm against differential power attack and differential fault attack

open access: yesTongxin xuebao, 2010
A VLSI implementation of AES algorithm against both differential power attack and differential fault attack was proposed. The main countermeasures employed in this hardware design are masking technique and two-dimensional parity-based concurrent error ...
HAN Jun, ZENG Xiao-yang, ZHAO Jia
doaj   +3 more sources

New Cryptanalysis of ZUC-256 Initialization Using Modular Differences

open access: yesIACR Transactions on Symmetric Cryptology, 2022
ZUC-256 is a stream cipher designed for 5G applications by the ZUC team. Together with AES-256 and SNOW-V, it is currently being under evaluation for standardized algorithms in 5G mobile telecommunications by Security Algorithms Group of Experts (SAGE).
Fukang Liu   +5 more
doaj   +1 more source

Differential fault attack on LiCi cipher

open access: yes网络与信息安全学报, 2021
LiCi lightweight block cipher is a new algorithm proposed in 2017.With advantages of small structure and low energy consumption, LiCi is more suitable for resource-constrained environments such as the internet of things (IoT).In the design document of ...
Weijian CHEN, Haoxiang LUO
doaj   +3 more sources

A Robust and Hybrid Cryptosystem for Identity Authentication

open access: yesInformation, 2021
With the progressive development of a wide range of applications, interconnect things and internet of things (IoT) became an imperative required trend by industries and academicians. IoT became a base infrastructure for remote access or control depending
Ali Takieldeen   +4 more
doaj   +1 more source

An Image Encryption Scheme Utilizing Harper's Map [PDF]

open access: yesActa Electrotechnica et Informatica, 2018
his paper deals with an image encryption scheme, which could be used for improving security of steganographic algorithms. Higher level of security is reached by masking information contained in secret data by their encryption. Therefore in the worst case,
Jakub Oravec   +2 more
doaj   +1 more source

Two Improved Multiple‐Differential Collision Attacks [PDF]

open access: yesMathematical Problems in Engineering, 2014
In CHES 2008, Bogdanov proposed multiple‐differential collision attacks which could be applied to the power analysis attacks on practical cryptographic systems. However, due to the effect of countermeasures on FPGA, there are some difficulties during the collision detection, such as local high noise and the lack of sampling points.
An Wang   +5 more
openaire   +2 more sources

An Effective Simulation Analysis of Transient Electromagnetic Multiple Faults

open access: yesSensors, 2020
Embedded encryption devices and smart sensors are vulnerable to physical attacks. Due to the continuous shrinking of chip size, laser injection, particle radiation and electromagnetic transient injection are possible methods that introduce transient ...
Liang Dong   +5 more
doaj   +1 more source

Differential Fault Attack on GIFT [PDF]

open access: yesChinese Journal of Electronics, 2021
GIFT, a lightweight block cipher proposed at CHES2017, has been widely cryptanalyzed this years. This paper studies the differential diffusion characteristics of round function of GIFT at first, and proposes a random nibble-based differential fault attack.
XIE Min, TIAN Feng, LI Jiaqi
openaire   +1 more source

Related-key Impossible Differential Attack of QARMA Algorithm [PDF]

open access: yesJisuanji gongcheng, 2019
QARMA algorithm is a lightweight and adjustable block cipher algorithm with Substitution Permutation Network(SPN) structure.The ability of QARMA algorithm to resist the related-key impossible differential attack is studied.According to the ...
ZHANG Pei,ZHANG Wenying
doaj   +1 more source

Home - About - Disclaimer - Privacy