Probabilistic signature based generalized framework for differential fault analysis of stream ciphers
暂无分享,去创建一个
Santanu Sarkar | Subhamoy Maitra | Avishek Adhikari | Prakash Dey | A. Adhikari | S. Maitra | Santanu Sarkar | Prakash Dey
[1] Avishek Adhikari,et al. Improved Multi-Bit Differential Fault Analysis of Trivium , 2014, INDOCRYPT.
[2] Martin Hell,et al. A New Version of Grain-128 with Authentication , 2011 .
[3] Martin Hell,et al. Grain-128a: a new version of Grain-128 with optional authentication , 2011, Int. J. Wirel. Mob. Comput..
[4] Subhamoy Maitra,et al. A Differential Fault Attack on MICKEY 2.0 , 2013, CHES.
[5] Michal Hojsík,et al. Differential Fault Analysis of Trivium , 2008, FSE.
[6] Debdeep Mukhopadhyay,et al. Improved practical differential fault analysis of Grain-128 , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[7] Alessandro Barenghi,et al. Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures , 2012, Proceedings of the IEEE.
[8] Debdeep Mukhopadhyay,et al. Multi-Bit Differential Fault Analysis of Grain-128 with Very Weak Assumptions , 2014, IACR Cryptol. ePrint Arch..
[9] Santanu Sarkar,et al. Improved differential fault attack on MICKEY 2.0 , 2015, Journal of Cryptographic Engineering.
[10] Santanu Sarkar,et al. Differential Fault Attack against Grain Family with Very Few Faults and Minimal Assumptions , 2015, IEEE Transactions on Computers.
[11] Martin Hell,et al. A Stream Cipher Proposal: Grain-128 , 2006, 2006 IEEE International Symposium on Information Theory.
[12] Santanu Sarkar,et al. A Differential Fault Attack on the Grain Family under Reasonable Assumptions , 2012, INDOCRYPT.
[13] Martin Hell,et al. Grain: a stream cipher for constrained environments , 2007, Int. J. Wirel. Mob. Comput..
[14] Eli Biham,et al. Differential Cryptanalysis in Stream Ciphers , 2007, IACR Cryptol. ePrint Arch..
[15] Daniel Wichs,et al. Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering Circuits , 2014, IEEE Transactions on Information Theory.
[16] Eli Biham,et al. Differential Fault Analysis of Secret Key Cryptosystems , 1997, CRYPTO.
[17] Christophe De Cannière,et al. Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles , 2006, ISC.
[18] Santanu Sarkar,et al. A Differential Fault Attack on the Grain Family of Stream Ciphers , 2012, CHES.