Results 201 to 210 of about 2,028 (248)
Some of the next articles are maybe not open access.
PRINCE under Differential Fault Attack
Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security, 2020Fault analysis is one of the most studied physical attacks primarily due to the inherent ease of implementation. This work investigates integral and differential fault analysis attacks on the well-known lightweight block-cipher PRINCE. The work begins by identifying new integral properties of PRINCE which are not restricted to be symmetric around the ...
null Aikata +2 more
openaire +1 more source
Differential Fault Attack on SIMECK
Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, 2016In 2013, researchers from the National Security Agency of the USA (NSA) proposed two lightweight block ciphers SIMON and SPECK [3]. While SIMON is tuned for optimal performance in hardware, SPECK is tuned for optimal performance in software. At CHES 2015, Yang et al. [6] combined the "good" design components from both SIMON and SPECK and proposed a new
Venu Nalla +2 more
openaire +1 more source
New Countermeasures Against Differential Fault Attacks
2020 International Conference on Internet of Things and Intelligent Applications (ITIA), 2020As a kind of classical side channel attacks, differential fault attacks (DFA) has some favorable properties, such as the flexible fault injections, lower attack complexity and so on, which usually induces a serious threat to the engineering application of encryption algorithms. At present, how to resist DFA has became an important research topic.
Xiaona Zhang +2 more
openaire +1 more source
Differential Fault Attacks on Lightweight Cipher LBlock
Fundamenta Informaticae, 2018Lightweight block cipher is usually used in “Internet of Thing” to protect confidentiality as well as to authentication. LBlock is a lightweight block cipher designed for tiny computing devices, such as RFID tags and sensor network nodes. The cipher algorithm iterates a Feistel structure with SP type round function by 32 rounds.
Wei, Yuechuan +2 more
openaire +2 more sources
A Differential Fault Attack on Plantlet
IEEE Transactions on Computers, 2017Lightweight stream ciphers have received serious attention in the last few years. The present design paradigm considers very small state (less than twice the key size) and use of the secret key bits during pseudo-random stream generation. One such effort, Sprout, had been proposed two years back and it was broken almost immediately.
Subhamoy Maitra +2 more
openaire +1 more source
Incremental Fault Analysis: Relaxing the Fault Model of Differential Fault Attacks
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2020This article presents a new fault analysis technique against cryptographic devices called the incremental fault analysis (IFA), which can be adapted into fault attacks using more traditional differential fault analysis (DFA) techniques in order to increase their feasibility under more practical fault injection conditions.
Trevor E. Pogue, Nicola Nicolici
openaire +1 more source
Differential Fault Attacks on KLEIN
2019This paper proposes two Differential Fault Attacks on the lightweight block cipher KLEIN. Variant one targets the intermediate state of the cipher. Using at least five faulty ciphertexts, the attacker is able to determine the last round key. The second variant, which works only on KLEIN-64, injects a byte-fault in the key schedule and requires at least
Michael Gruber, Bodo Selmke
openaire +1 more source
Differential Fault Attack on Kreyvium & FLIP
IEEE Transactions on Computers, 2020In this article, we propose key recovery attack on two stream ciphers: Kreyvium and FLIP $_{530}(42,128,360)$ 530 ( 42 , 128 , 360 ) using Differential Fault Attack (DFA) technique. These two ciphers are being used in Fully Homomorphic Encryption (FHE) due to their low error growth during keystream generation. Kreyvium is an NFSR-
Dibyendu Roy +2 more
openaire +1 more source
Differential Fault Attack on ITUbee Block Cipher
ACM Transactions on Embedded Computing Systems, 2016Differential Fault Attack (DFA) is a powerful cryptanalytic technique to retrieve secret keys by exploiting the faulty ciphertexts generated during encryption procedure. This article proposes a novel DFA attack that is effective on ITUbee, a software-oriented block cipher for resource-constrained devices.
Shan Fu +4 more
openaire +1 more source

