Fault Attacks on Stream Cipher Scream
暂无分享,去创建一个
[1] Dipanwita Roy Chowdhury,et al. Fault Analysis of Grain-128 by Targeting NFSR , 2011, AFRICACRYPT.
[2] Debdeep Mukhopadhyay,et al. Differential Fault Analysis of Twofish , 2012, Inscrypt.
[3] Yukiyasu Tsunoo,et al. Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box , 2008, ICICS.
[4] Qing Liu,et al. Fault analysis of Trivium , 2012, Des. Codes Cryptogr..
[5] Amr M. Youssef,et al. Differential Fault Analysis of Rabbit , 2009, Selected Areas in Cryptography.
[6] T. Johansson,et al. A linear distinguishing attack on Scream , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..
[7] Santanu Sarkar,et al. A Differential Fault Attack on the Grain Family of Stream Ciphers , 2012, CHES.
[8] Michal Hojsík,et al. Differential Fault Analysis of Trivium , 2008, FSE.
[9] Aline Gouget,et al. Fault analysis of GRAIN-128 , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.
[10] Yukiyasu Tsunoo,et al. Cryptanalysis of Mir-1: A T-Function-Based Stream Cipher , 2007, IEEE Transactions on Information Theory.
[11] Shai Halevi,et al. Scream: A Software-Efficient Stream Cipher , 2002, FSE.
[12] Cécile Canovas,et al. Fault Analysis of Rabbit: Toward a Secret Key Leakage , 2009, INDOCRYPT.
[13] Subhamoy Maitra,et al. A Differential Fault Attack on MICKEY 2.0 , 2013, CHES.
[14] Shai Halevi,et al. Cryptanalysis of Stream Ciphers with Linear Masking , 2002, CRYPTO.
[15] Adi Shamir,et al. Fault Analysis of Stream Ciphers , 2004, CHES.