Results 201 to 210 of about 2,028 (248)
Some of the next articles are maybe not open access.

PRINCE under Differential Fault Attack

Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security, 2020
Fault analysis is one of the most studied physical attacks primarily due to the inherent ease of implementation. This work investigates integral and differential fault analysis attacks on the well-known lightweight block-cipher PRINCE. The work begins by identifying new integral properties of PRINCE which are not restricted to be symmetric around the ...
null Aikata   +2 more
openaire   +1 more source

Differential Fault Attack on SIMECK

Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, 2016
In 2013, researchers from the National Security Agency of the USA (NSA) proposed two lightweight block ciphers SIMON and SPECK [3]. While SIMON is tuned for optimal performance in hardware, SPECK is tuned for optimal performance in software. At CHES 2015, Yang et al. [6] combined the "good" design components from both SIMON and SPECK and proposed a new
Venu Nalla   +2 more
openaire   +1 more source

New Countermeasures Against Differential Fault Attacks

2020 International Conference on Internet of Things and Intelligent Applications (ITIA), 2020
As a kind of classical side channel attacks, differential fault attacks (DFA) has some favorable properties, such as the flexible fault injections, lower attack complexity and so on, which usually induces a serious threat to the engineering application of encryption algorithms. At present, how to resist DFA has became an important research topic.
Xiaona Zhang   +2 more
openaire   +1 more source

Differential Fault Attacks on Lightweight Cipher LBlock

Fundamenta Informaticae, 2018
Lightweight block cipher is usually used in “Internet of Thing” to protect confidentiality as well as to authentication. LBlock is a lightweight block cipher designed for tiny computing devices, such as RFID tags and sensor network nodes. The cipher algorithm iterates a Feistel structure with SP type round function by 32 rounds.
Wei, Yuechuan   +2 more
openaire   +2 more sources

A Differential Fault Attack on Plantlet

IEEE Transactions on Computers, 2017
Lightweight stream ciphers have received serious attention in the last few years. The present design paradigm considers very small state (less than twice the key size) and use of the secret key bits during pseudo-random stream generation. One such effort, Sprout, had been proposed two years back and it was broken almost immediately.
Subhamoy Maitra   +2 more
openaire   +1 more source

Incremental Fault Analysis: Relaxing the Fault Model of Differential Fault Attacks

IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2020
This article presents a new fault analysis technique against cryptographic devices called the incremental fault analysis (IFA), which can be adapted into fault attacks using more traditional differential fault analysis (DFA) techniques in order to increase their feasibility under more practical fault injection conditions.
Trevor E. Pogue, Nicola Nicolici
openaire   +1 more source

Differential Fault Attacks on KLEIN

2019
This paper proposes two Differential Fault Attacks on the lightweight block cipher KLEIN. Variant one targets the intermediate state of the cipher. Using at least five faulty ciphertexts, the attacker is able to determine the last round key. The second variant, which works only on KLEIN-64, injects a byte-fault in the key schedule and requires at least
Michael Gruber, Bodo Selmke
openaire   +1 more source

Differential Fault Attack on Kreyvium & FLIP

IEEE Transactions on Computers, 2020
In this article, we propose key recovery attack on two stream ciphers: Kreyvium and FLIP $_{530}(42,128,360)$ 530 ( 42 , 128 , 360 ) using Differential Fault Attack (DFA) technique. These two ciphers are being used in Fully Homomorphic Encryption (FHE) due to their low error growth during keystream generation. Kreyvium is an NFSR-
Dibyendu Roy   +2 more
openaire   +1 more source

Differential Fault Attack on ITUbee Block Cipher

ACM Transactions on Embedded Computing Systems, 2016
Differential Fault Attack (DFA) is a powerful cryptanalytic technique to retrieve secret keys by exploiting the faulty ciphertexts generated during encryption procedure. This article proposes a novel DFA attack that is effective on ITUbee, a software-oriented block cipher for resource-constrained devices.
Shan Fu   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy