Results 241 to 250 of about 184,630 (295)
Some of the next articles are maybe not open access.

Differential Fault Intensity Analysis

2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2014
Recent research has demonstrated that there is no sharp distinction between passive attacks based on side-channel leakage and active attacks based on fault injection. Fault behavior can be processed as side-channel information, offering all the benefits of Differential Power Analysis including noise averaging and hypothesis testing by correlation. This
Nahid Farhady Ghalaty   +3 more
openaire   +1 more source

Differential Fault Analysis of Sosemanuk

2012 Eighth International Conference on Computational Intelligence and Security, 2011
Sosemanuk is a software-based stream cipher which supports a variable key length of either 128 or 256 bits and 128-bit initial values. It has passed all three stages of the ECRYPT stream cipher project and is a member of the eSTREAM software portfolio. In this paper, we present a fault analysis attack on Sosemanuk.
Yaser Esmaeili Salehani   +2 more
openaire   +2 more sources

Differential Fault Analysis of NORX

Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security, 2020
In recent literature, there has been a particular interest in studying nonce-based Authenticated Encryption (AE) schemes in the light of fault-based attacks as they seem to present automatic protection against Differential Fault Attacks (DFA). In this work, we present the first DFA on nonce-based CAESAR scheme NORX (applicable to all the versions v1 ...
Amit Jana, Dhiman Saha, Goutam Paul
openaire   +1 more source

Incremental Fault Analysis: Relaxing the Fault Model of Differential Fault Attacks

IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2020
This article presents a new fault analysis technique against cryptographic devices called the incremental fault analysis (IFA), which can be adapted into fault attacks using more traditional differential fault analysis (DFA) techniques in order to increase their feasibility under more practical fault injection conditions.
Trevor E. Pogue, Nicola Nicolici
openaire   +1 more source

Differential fault analysis on Camellia

Journal of Systems and Software, 2010
Camellia is a 128-bit block cipher published by NTT and Mitsubishi in 2000. On the basis of the byte-oriented model and the differential analysis principle, we propose a differential fault attack on the Camellia algorithm. Mathematical analysis and simulating experiments show that our attack can recover its 128-bit, 192-bit or 256-bit secret key by ...
Wei Li   +4 more
openaire   +1 more source

Differential Fault Analysis on CLEFIA

2007
CLEFIA is a new 128-bit block cipher proposed by SONY corporation recently. The fundamental structure of CLEFIA is a generalized Feistel structure consisting of 4 data lines. In this paper, the strength of CLEFIA against the differential fault attack is explored. Our attack adopts the byte-oriented model of random faults.
Hua Chen, Wenling Wu, Dengguo Feng
openaire   +1 more source

Differential Fault Analysis of LEX

2010
LEX is a stream cipher based on the round transformation of the AES block cipher, and it was selected for the final phase evaluation of the eSTREAM project. LEX is 2.5 times faster than AES both in software and in hardware. In this paper, we present a differential fault attack on LEX.
Jianyong Huang   +2 more
openaire   +1 more source

Differential Fault Analysis on Midori

2016
Midori is an energy-efficient lightweight block cipher published by Banik et al. in ASIACRYPT 2015, which consists of two variants with block sizes of 64-bit and 128-bit, respectively. In this paper, a new method is proposed to exploit cell-oriented fault propagation patterns in recognizing appropriate faulty ciphertexts and fault positions, which ...
Wei Cheng, Yongbin Zhou, Laurent Sauvage
openaire   +1 more source

Differential Fault Analysis for Block Ciphers

Proceedings of the 7th International Conference on Security of Information and Networks, 2014
Differential Fault Analysis (DFA) exploits the differences between a correct and a faulty output of a cipher implementation to derive the secret parameters. All the current DFA techniques are tailored to the cipher being attacked and do not provide a general framework.
AGOSTA, GIOVANNI   +3 more
openaire   +2 more sources

Evolutionary ciphers against differential power analysis and differential fault analysis

Science China Information Sciences, 2012
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Tang, Ming   +6 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy