Key Recovery from State Information of Sprout: Application to Cryptanalysis and Fault Attack
暂无分享,去创建一个
Santanu Sarkar | Subhamoy Maitra | Anubhab Baksi | Pramit Dey | Anubhab Baksi | S. Maitra | Santanu Sarkar | Pramit Dey
[1] Sergei P. Skorobogatov. Optically Enhanced Position-Locked Power Analysis , 2006, CHES.
[2] Michal Hojsík,et al. Floating Fault Analysis of Trivium , 2008, INDOCRYPT.
[3] Martin Hell,et al. A New Version of Grain-128 with Authentication , 2011 .
[4] Martin Hell,et al. Grain-128a: a new version of Grain-128 with optional authentication , 2011, Int. J. Wirel. Mob. Comput..
[5] Eli Biham,et al. Differential Fault Analysis of Secret Key Cryptosystems , 1997, CRYPTO.
[6] Michal Hojsík,et al. Differential Fault Analysis of Trivium , 2008, FSE.
[7] Martin Hell,et al. A Stream Cipher Proposal: Grain-128 , 2006, 2006 IEEE International Symposium on Information Theory.
[8] Santanu Sarkar,et al. Differential Fault Attack against Grain Family with Very Few Faults and Minimal Assumptions , 2015, IEEE Transactions on Computers.
[9] Eli Biham,et al. Differential Cryptanalysis in Stream Ciphers , 2007, IACR Cryptol. ePrint Arch..
[10] Ross J. Anderson,et al. Optical Fault Induction Attacks , 2002, CHES.
[11] Santanu Sarkar,et al. Improved differential fault attack on MICKEY 2.0 , 2015, Journal of Cryptographic Engineering.
[12] Frederik Armknecht,et al. On Lightweight Stream Ciphers with Shorter Internal States , 2015, FSE.
[13] Martin Hell,et al. Grain: a stream cipher for constrained environments , 2007, Int. J. Wirel. Mob. Comput..
[14] Santanu Sarkar,et al. A Differential Fault Attack on the Grain Family of Stream Ciphers , 2012, CHES.
[15] Richard J. Lipton,et al. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) , 1997, EUROCRYPT.
[16] Subhamoy Maitra,et al. A Differential Fault Attack on MICKEY 2.0 , 2013, CHES.
[17] Qing Liu,et al. Fault analysis of Trivium , 2012, Des. Codes Cryptogr..
[18] Alessandro Barenghi,et al. Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures , 2012, Proceedings of the IEEE.
[19] Adi Shamir,et al. Fault Analysis of Stream Ciphers , 2004, CHES.