Results 241 to 250 of about 184,630 (295)
Some of the next articles are maybe not open access.
Differential Fault Intensity Analysis
2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2014Recent research has demonstrated that there is no sharp distinction between passive attacks based on side-channel leakage and active attacks based on fault injection. Fault behavior can be processed as side-channel information, offering all the benefits of Differential Power Analysis including noise averaging and hypothesis testing by correlation. This
Nahid Farhady Ghalaty +3 more
openaire +1 more source
Differential Fault Analysis of Sosemanuk
2012 Eighth International Conference on Computational Intelligence and Security, 2011Sosemanuk is a software-based stream cipher which supports a variable key length of either 128 or 256 bits and 128-bit initial values. It has passed all three stages of the ECRYPT stream cipher project and is a member of the eSTREAM software portfolio. In this paper, we present a fault analysis attack on Sosemanuk.
Yaser Esmaeili Salehani +2 more
openaire +2 more sources
Differential Fault Analysis of NORX
Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security, 2020In recent literature, there has been a particular interest in studying nonce-based Authenticated Encryption (AE) schemes in the light of fault-based attacks as they seem to present automatic protection against Differential Fault Attacks (DFA). In this work, we present the first DFA on nonce-based CAESAR scheme NORX (applicable to all the versions v1 ...
Amit Jana, Dhiman Saha, Goutam Paul
openaire +1 more source
Incremental Fault Analysis: Relaxing the Fault Model of Differential Fault Attacks
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2020This article presents a new fault analysis technique against cryptographic devices called the incremental fault analysis (IFA), which can be adapted into fault attacks using more traditional differential fault analysis (DFA) techniques in order to increase their feasibility under more practical fault injection conditions.
Trevor E. Pogue, Nicola Nicolici
openaire +1 more source
Differential fault analysis on Camellia
Journal of Systems and Software, 2010Camellia is a 128-bit block cipher published by NTT and Mitsubishi in 2000. On the basis of the byte-oriented model and the differential analysis principle, we propose a differential fault attack on the Camellia algorithm. Mathematical analysis and simulating experiments show that our attack can recover its 128-bit, 192-bit or 256-bit secret key by ...
Wei Li +4 more
openaire +1 more source
Differential Fault Analysis on CLEFIA
2007CLEFIA is a new 128-bit block cipher proposed by SONY corporation recently. The fundamental structure of CLEFIA is a generalized Feistel structure consisting of 4 data lines. In this paper, the strength of CLEFIA against the differential fault attack is explored. Our attack adopts the byte-oriented model of random faults.
Hua Chen, Wenling Wu, Dengguo Feng
openaire +1 more source
Differential Fault Analysis of LEX
2010LEX is a stream cipher based on the round transformation of the AES block cipher, and it was selected for the final phase evaluation of the eSTREAM project. LEX is 2.5 times faster than AES both in software and in hardware. In this paper, we present a differential fault attack on LEX.
Jianyong Huang +2 more
openaire +1 more source
Differential Fault Analysis on Midori
2016Midori is an energy-efficient lightweight block cipher published by Banik et al. in ASIACRYPT 2015, which consists of two variants with block sizes of 64-bit and 128-bit, respectively. In this paper, a new method is proposed to exploit cell-oriented fault propagation patterns in recognizing appropriate faulty ciphertexts and fault positions, which ...
Wei Cheng, Yongbin Zhou, Laurent Sauvage
openaire +1 more source
Differential Fault Analysis for Block Ciphers
Proceedings of the 7th International Conference on Security of Information and Networks, 2014Differential Fault Analysis (DFA) exploits the differences between a correct and a faulty output of a cipher implementation to derive the secret parameters. All the current DFA techniques are tailored to the cipher being attacked and do not provide a general framework.
AGOSTA, GIOVANNI +3 more
openaire +2 more sources
Evolutionary ciphers against differential power analysis and differential fault analysis
Science China Information Sciences, 2012zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Tang, Ming +6 more
openaire +2 more sources

