Results 241 to 250 of about 406,684 (268)
Some of the next articles are maybe not open access.

Differential attacks: using alternative operations

Designs, Codes and Cryptography, 2018
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Civino, Roberto   +2 more
openaire   +6 more sources

PRINCE under Differential Fault Attack

Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security, 2020
Fault analysis is one of the most studied physical attacks primarily due to the inherent ease of implementation. This work investigates integral and differential fault analysis attacks on the well-known lightweight block-cipher PRINCE. The work begins by identifying new integral properties of PRINCE which are not restricted to be symmetric around the ...
null Aikata   +2 more
openaire   +1 more source

Differential Fault Attack on SIMECK

Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, 2016
In 2013, researchers from the National Security Agency of the USA (NSA) proposed two lightweight block ciphers SIMON and SPECK [3]. While SIMON is tuned for optimal performance in hardware, SPECK is tuned for optimal performance in software. At CHES 2015, Yang et al. [6] combined the "good" design components from both SIMON and SPECK and proposed a new
Venu Nalla   +2 more
openaire   +1 more source

New Impossible Differential Attacks on AES

2008
In this paper we apply impossible differential attacks to reduced round AES. Using various techniques, including the early abort approach and key schedule considerations, we significantly improve previously known attacks due to Bahrak-Aref and Phan. The improvement of these attacks leads to better impossible differential attacks on 7-round AES-128 and ...
Lu, J.   +3 more
openaire   +2 more sources

Differential attack on mini-AES

AIP Conference Proceedings, 2012
This paper presents the results of differential attack on Mini-AES algorithm. The differential trails are constructed using all combinations of propagation ratio without repetition. To give practical results, we implement the key extraction for differential characteristics which have the highest and lowest probability as a comparison.
Asadini Dwi Ajeng Gemellia   +1 more
openaire   +1 more source

Differential Attacks on Deterministic Signatures

2018
Deterministic signature schemes are becoming more popular, as illustrated by the deterministic variant of ECDSA and the popular EdDSA scheme, since eliminating the need for high-quality randomness might have some advantages in certain use-cases. In this paper we outline a range of differential fault attacks and a differential power analysis attack ...
Christopher Ambrose   +5 more
openaire   +1 more source

Differential Fault Attacks on Lightweight Cipher LBlock

Fundamenta Informaticae, 2018
Lightweight block cipher is usually used in “Internet of Thing” to protect confidentiality as well as to authentication. LBlock is a lightweight block cipher designed for tiny computing devices, such as RFID tags and sensor network nodes. The cipher algorithm iterates a Feistel structure with SP type round function by 32 rounds.
Wei, Yuechuan   +2 more
openaire   +2 more sources

Differential Fault Attacks on KLEIN

2019
This paper proposes two Differential Fault Attacks on the lightweight block cipher KLEIN. Variant one targets the intermediate state of the cipher. Using at least five faulty ciphertexts, the attacker is able to determine the last round key. The second variant, which works only on KLEIN-64, injects a byte-fault in the key schedule and requires at least
Michael Gruber, Bodo Selmke
openaire   +1 more source

Differential attack on nonlinear combined sequences

Frontiers of Electrical and Electronic Engineering in China, 2007
By using the coding properties and statistic properties of the plaintext, the differential properties of the key stream sequences generated by a nonlinear combined generator were analyzed. Then a differential attack algorithm on the nonlinear combined sequences was proposed.
Chao Li, Wenling Wang, Pengsong Hu
openaire   +1 more source

Transient ischemic attacks

Postgraduate Medicine, 1981
Several options exist for treating transient ischemic attacks (TIAs), although none can eliminate the risk of cerebral infarction. For carotid TIA, carotid endarterectomy is the preferred therapy in patients with an angiographically demonstrated sclerotic lesion, whereas extracranial-intracranial bypass may be beneficial in patients with carotid artery
openaire   +2 more sources

Home - About - Disclaimer - Privacy