Results 1 to 10 of about 406,684 (268)
Differential fault attack on FeW
In order to evaluate the security of the lightweight block cipher FeW,a differential fault attack method was proposed and discussed using a single byte random fault model.In this method,a single byte random fault was introduced on the right side of the ...
Min XIE, Jiaqi LI, Feng TIAN
doaj +3 more sources
VLSI implementation of AES algorithm against differential power attack and differential fault attack
A VLSI implementation of AES algorithm against both differential power attack and differential fault attack was proposed. The main countermeasures employed in this hardware design are masking technique and two-dimensional parity-based concurrent error ...
HAN Jun, ZENG Xiao-yang, ZHAO Jia
doaj +3 more sources
New Cryptanalysis of ZUC-256 Initialization Using Modular Differences
ZUC-256 is a stream cipher designed for 5G applications by the ZUC team. Together with AES-256 and SNOW-V, it is currently being under evaluation for standardized algorithms in 5G mobile telecommunications by Security Algorithms Group of Experts (SAGE).
Fukang Liu +5 more
doaj +1 more source
Differential fault attack on LiCi cipher
LiCi lightweight block cipher is a new algorithm proposed in 2017.With advantages of small structure and low energy consumption, LiCi is more suitable for resource-constrained environments such as the internet of things (IoT).In the design document of ...
Weijian CHEN, Haoxiang LUO
doaj +3 more sources
A Robust and Hybrid Cryptosystem for Identity Authentication
With the progressive development of a wide range of applications, interconnect things and internet of things (IoT) became an imperative required trend by industries and academicians. IoT became a base infrastructure for remote access or control depending
Ali Takieldeen +4 more
doaj +1 more source
An Image Encryption Scheme Utilizing Harper's Map [PDF]
his paper deals with an image encryption scheme, which could be used for improving security of steganographic algorithms. Higher level of security is reached by masking information contained in secret data by their encryption. Therefore in the worst case,
Jakub Oravec +2 more
doaj +1 more source
Two Improved Multiple‐Differential Collision Attacks [PDF]
In CHES 2008, Bogdanov proposed multiple‐differential collision attacks which could be applied to the power analysis attacks on practical cryptographic systems. However, due to the effect of countermeasures on FPGA, there are some difficulties during the collision detection, such as local high noise and the lack of sampling points.
An Wang +5 more
openaire +2 more sources
An Effective Simulation Analysis of Transient Electromagnetic Multiple Faults
Embedded encryption devices and smart sensors are vulnerable to physical attacks. Due to the continuous shrinking of chip size, laser injection, particle radiation and electromagnetic transient injection are possible methods that introduce transient ...
Liang Dong +5 more
doaj +1 more source
Differential Fault Attack on GIFT [PDF]
GIFT, a lightweight block cipher proposed at CHES2017, has been widely cryptanalyzed this years. This paper studies the differential diffusion characteristics of round function of GIFT at first, and proposes a random nibble-based differential fault attack.
XIE Min, TIAN Feng, LI Jiaqi
openaire +1 more source
Related-key Impossible Differential Attack of QARMA Algorithm [PDF]
QARMA algorithm is a lightweight and adjustable block cipher algorithm with Substitution Permutation Network(SPN) structure.The ability of QARMA algorithm to resist the related-key impossible differential attack is studied.According to the ...
ZHANG Pei,ZHANG Wenying
doaj +1 more source

