Results 11 to 20 of about 2,028 (248)
Algebraic Fault Attack Against SIMECK Cipher Based on Optimized Fault Location [PDF]
This paper proposes a algebraic fault attack method based on optimized fault location against SIMECK cipher.By analyzing encryption diffusion defect of the SIMECK round function and the failure cause,the deterministic propagation characteristics of ...
HUANG Changyang, WANG Tao, WANG Xiaohan, CHEN Qingchao, YIN Shizhuang
doaj +1 more source
A method for fault recognition in the last three rounds of Advanced Encryption Standard
A large number of studies are there for Advanced Encryption Standard (AES) fault attack analysis, but less for fault recognition. This paper presents a recognition method for single‐byte fault which is induced in the last three rounds of AES.
Huilong Jiang +5 more
doaj +1 more source
Differential Fault Attack on LEA [PDF]
LEA is a symmetric block cipher proposed in 2014. It uses ARX design and its main advantage is the possibility of a fast software implementation on common computing platforms.
Jap, Dirmanto, Breier, Jakub
openaire +2 more sources
Experimental evaluation of differential fault attack on lightweight block cipher PIPO
The recent development of Internet of Things (IoT) devices has increased related security issues. Because of the rapid increase in the use of these devices, the possibility of accessing and hijacking cryptographic devices is increasing.
SeongHyuck Lim, Dong‐Guk Han
doaj +1 more source
Improved Differential Fault Attack on LEA by Algebraic Representation of Modular Addition
Recently, as the number of IoT (Internet of Things) devices has increased, the use of lightweight cryptographic algorithms that are suitable for environments with scarce resources has also increased.
Seonghyuck Lim +2 more
doaj +1 more source
Grain-128AEAD is a lightweight authenticated encryption stream cipher and one of the finalists in the National Institute of Standards and Technology (NIST) Lightweight Cryptography (LWC) project. This paper provides an independent third-party analysis of
Iftekhar Salam +5 more
doaj +1 more source
A Differential Fault Attack on MICKEY 2.0 [PDF]
In this paper we present a differential fault attack on the stream cipher MICKEY 2.0 which is in eStream's hardware portfolio. While fault attacks have already been reported against the other two eStream hardware candidates Trivium and Grain, no such analysis is known for MICKEY.
Subhadeep Banik, Subhamoy Maitra
openaire +3 more sources
DFARPA: Differential fault attack resistant physical design automation [PDF]
Differential Fault Analysis (DFA), aided by sophisticated mathematical analysis techniques for ciphers and precise fault injection methodologies, has become a potent threat to cryptographic implementations. In this paper, we propose, to the best of the our knowledge, the first “DFA-aware” physical design automation methodology, that effectively ...
Khairallah, Mustafa +7 more
openaire +2 more sources
Analysis of an Optimal Fault Attack on the LED-64 Lightweight Cryptosystem
This paper presents an optimal method for recovering the secret keys of the light encryption device (LED) by combining the impossible differential fault attack with the algebraic differential fault attack. The proposed optimal method effectively improves
Liang Dong +5 more
doaj +1 more source
With the recent development of the Internet of Things (IoT), related device use is increasing rapidly. As a result, accessing and hijacking the devices is an increasing security threat.
Seonghyuck Lim +2 more
doaj +1 more source

