搜索结果: 1-15 共查到“军队指挥学 Differential fault analysis”相关记录28条 . 查询时间(0.187 秒)
Table Redundancy Method for Protecting against Differential Fault Analysis in the White-box Cryptography
Differential fault analysis white-box cryptography countermeasure
font style='font-size:12px;'>
2019/8/26
Differential Fault Analysis (DFA) intentionally injects some fault into the encryption process and analyzes a secret key from the mathematical relationship between faulty and fault-free ciphertexts. E...
Differential Fault Analysis of NORX
secret-key cryptography DFA
font style='font-size:12px;'>
2019/7/8
In recent literature, there has been a particular interest in studying nonce based AE schemes in the light of fault based attacks as they seem to present an automatic protection against Differential F...
Fully Automated Differential Fault Analysis on Software Implementations of Cryptographic Algorithms
differential fault analysis cryptographic fault attacks automation
font style='font-size:12px;'>
2018/6/5
Emerging technologies with the requirement of small size and portability, such as Internet-of-Things devices, represent a good target for physical attacks, e.g., fault attacks. These attacks often aim...
Differential Fault Analysis of Rectangle-80
RECTANGLE-80 secret-key cryptography
font style='font-size:12px;'>
2018/5/14
We present various differential fault attack schemes for the RECTANGLE-80 and demonstrate how initially we started from a 80-bit fault to a single word fault scheme. This was mainly due to a different...
Differential Fault Analysis of SHA-3 under Relaxed Fault Models
SHA-3 DFA
font style='font-size:12px;'>
2017/9/13
Keccak-based algorithms such as Secure Hash Algorithm-3 (SHA-3) will be widely used in crypto systems, and evaluating their security against different kinds of attacks is vitally important. This paper...
Differential Fault Analysis Automation
Block Cipher Differential Fault Analysis AES
font style='font-size:12px;'>
2017/7/11
Characterization of all possible faults in a cryptosystem exploitable for fault attacks is a problem which is of both theoretical and practical interest for the cryptographic community. The complete k...
Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack
AES differential fault analysis side-channel attacks
font style='font-size:12px;'>
2016/12/8
Differential fault analysis attack is a kind of serious threat to cryptographic devices.
Previous protection schemes for crypto devices are not designed specifically against this kind of
attacks. At...
Differential Fault Analysis of SHA3-224 and SHA3-256
SHA-3 Keccak Fault attacks
font style='font-size:12px;'>
2016/7/20
The security of SHA-3 against different kinds of attacks are of vital importance for crypto systems with SHA-3 as the security engine. In this paper, we look into the differential fault analysis of SH...
EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ
fault analysis authenticated encryption PAEQ
font style='font-size:12px;'>
2016/6/20
This work exploits internal differentials within a cipher in the context of Differential Fault Analysis (DFA). This in turn overcomes the nonce barrier which acts as a natural counter-measure against ...
Differential Fault Analysis of MICKEY Family of Stream Ciphers
MICKEY-128 2.0 MICKEY v1 MICKEY 2.0
font style='font-size:12px;'>
2016/1/23
This paper presents differential fault analysis of the MICKEY family of stream ciphers, one of the winners of eStream project. The current attacks are of the best performance among all the attacks aga...
Differential Fault Analysis on the families of SIMON and SPECK ciphers
Lightweight Block Ciphers SIMON SPECK
font style='font-size:12px;'>
2016/1/23
In 2013, the US National Security Agency proposed two new families of lightweight block ciphers: SIMON and SPECK. Currently, linear and differential cryptanalytic results for SIMON are available in ...
Multi-Bit Differential Fault Analysis of Grain-128 with Very Weak Assumptions
Stream Cipher Differential Fault Attack Multi-Bit Fault
font style='font-size:12px;'>
2016/1/7
Very few differential fault attacks (DFA) were reported on Grain-128 so far. In this
paper we present a generic attack strategy that allows the adversary to challenge the cipher under
different mult...
Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack
Clock glitch detection AES differential fault analysis
font style='font-size:12px;'>
2016/1/6
Clock glitch based Differential Fault Analysis (DFA) attack is a serious threat to cryptographic
devices. Previous error detection schemes for cryptographic devices target improving the
circuit reli...
Probabilistic Signature Based Framework for Differential Fault Analysis of Stream Ciphers
Differential Attack Fault Attack Grain Family
font style='font-size:12px;'>
2015/12/30
Differential Fault Attack (DFA) has received serious attention in cryptographic literature
and very recently such attacks have been mounted against several popular stream ciphers for example
Grain v...
Improved Differential Fault Analysis on ARIA using Small Number of Faults
Differential fault analysis Block cipher ARIA Cryptanalysis
font style='font-size:12px;'>
2013/4/18
In [15], Li et al. firstly proposed a differential fault analysis on ARIA-128. This attack requires average 45 random byte fault injections. In 2012, Park et al. proposed the improve DFA by using 33 r...