Results 261 to 270 of about 184,630 (295)
Some of the next articles are maybe not open access.

Differential Fault Analysis of Full LBlock

2012
$\textsf{LBlock}$ is a 64-bit lightweight block cipher which can be implemented in both hardware environments and software platforms. It was designed by Wu and Zhang, and published at ACNS2011. In this paper, we explore the strength of $\textsf{LBlock}$ against the differential fault analysis ( $\textsf{DFA}$ ).
Liang Zhao   +2 more
openaire   +1 more source

Differential Fault Analysis of MICKEY-128 2.0

2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2013
This paper presents a differential fault analysis of the MICKEY-128 2.0 stream cipher, one of the finalist of eStream project. The current attack works on MICKEY-128 2.0 with 320 state register-bits and requires 480 number of random single bit faults to break it.
Sandip Karmakar, Dipanwita Roy Chowdhury
openaire   +1 more source

Differential Fault Analysis of DES

2012
This chapter reviews the techniques an attacker could employ to conduct a Differential Fault Analysis of the Data Encryption Standard (DES). Biham and Shamir proposed the first such attack on a block cipher based on the differential cryptanalysis of DES. This attack was later extended to permit an attack based on faults in the early or middle rounds of
openaire   +1 more source

Differential Fault Analysis on PRESENT Key Schedule

2010 International Conference on Computational Intelligence and Security, 2010
PRESENT is a lightweight block cipher designed by A. Bogdanov et al. in 2007 for extremely constrained environments such as RFID tags and sensor networks, where the AES is not suitable for. In this paper, the strength of PRESENT against the differential fault attack on the key schedule is explored.
Gaoli Wang, Shaohui Wang
openaire   +1 more source

Differential Fault Analysis

2023
Marc Joye, Michael Tunstall
openaire   +1 more source

Classical Countermeasures Against Differential Fault Analysis

2018
In the preceding discussion, we have presented to the readers a variety of fault attacks on a wide range of cryptographic algorithms across hardware and software-based implementations. It is therefore established, by now, that fault attacks are a serious threat to the security of hardware implementations, and consequently, sound countermeasures must be
Sikhar Patranabis, Debdeep Mukhopadhyay
openaire   +1 more source

Differential fault analysis of ARIA in multi-byte fault models

Journal of Systems and Software, 2012
Differential fault analysis exploits faults to find secret information stored in a cryptographic device. It utilizes differential information between correct and faulty ciphertexts. We introduce new techniques to improve the previous differential fault analysis of ARIA. ARIA is a general-purpose involutional SPN (substitution permutation network) block
openaire   +1 more source

Differential Fault Analysis Automation on Assembly Code

2019
Normally, fault attack models are determined by analyzing the cipher algorithm and finding exploitable spots in non-linear and permutation layers. However, due to optimizations and different ways of realizing algorithmic operations, cipher level analysis does not capture enough details to locate the vulnerable parts of software implementations.
Jakub Breier, Xiaolu Hou, Yang Liu
openaire   +1 more source

Improved Differential Fault Analysis on Camellia-128

2016
In this paper we propose improved Differential Fault Analysis (DFA) on the block cipher Camellia with a 128-bit key. Existing DFAs on Camellia-128 require several faults induced at multiple rounds, at least two of which must be induced at or after the 16-th round.
Toru Akishita, Noboru Kunihiro
openaire   +1 more source

Evidence for the utility of quantum computing before fault tolerance

Nature, 2023
Youngseok Kim   +2 more
exaly  

Home - About - Disclaimer - Privacy