A Differential Fault Attack on Grain-128a using MACs
暂无分享,去创建一个
[1] Martin Hell,et al. A Stream Cipher Proposal: Grain-128 , 2006, 2006 IEEE International Symposium on Information Theory.
[2] Shahram Khazaei,et al. Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers , 2008, AFRICACRYPT.
[3] Alexander Maximov,et al. Cryptanalysis of Grain , 2006, FSE.
[4] Martin Hell,et al. A New Version of Grain-128 with Authentication , 2011 .
[5] Martin Hell,et al. Grain-128a: a new version of Grain-128 with optional authentication , 2011, Int. J. Wirel. Mob. Comput..
[6] Bart Preneel,et al. Analysis of Grain's Initialization Algorithm , 2008, AFRICACRYPT.
[7] Thomas Johansson,et al. A Framework for Chosen IV Statistical Analysis of Stream Ciphers , 2007, INDOCRYPT.
[8] María Naya-Plasencia,et al. Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems , 2010, ASIACRYPT.
[9] Adi Shamir,et al. Fault Analysis of Stream Ciphers , 2004, CHES.
[10] Shahram Khazaei,et al. Distinguishing Attack on Grain , 2005 .
[11] Ross J. Anderson,et al. Optical Fault Induction Attacks , 2002, CHES.
[12] Santanu Sarkar,et al. A Differential Fault Attack on the Grain Family of Stream Ciphers , 2012, CHES.
[13] Paul Stankovski,et al. Greedy Distinguishers and Nonrandomness Detectors , 2010, INDOCRYPT.
[14] T. E. Bjørstad. Cryptanalysis of Grain using Time / Memory / Data Tradeoffs , 2008 .
[15] Sergei P. Skorobogatov. Optically Enhanced Position-Locked Power Analysis , 2006, CHES.
[16] Adi Shamir,et al. Breaking Grain-128 with Dynamic Cube Attacks , 2011, IACR Cryptol. ePrint Arch..
[17] Seokhie Hong,et al. Related-Key Chosen IV Attacks on Grain-v1 and Grain-128 , 2008, ACISP.
[18] Martin Hell,et al. Grain: a stream cipher for constrained environments , 2007, Int. J. Wirel. Mob. Comput..
[19] Willi Meier,et al. Efficient FPGA Implementations of High-Dimensional Cube Testers on the Stream Cipher Grain-128 , 2009, IACR Cryptol. ePrint Arch..
[20] Xiaoyun Wang,et al. Cryptanalysis of Stream Cipher Grain Family , 2009, IACR Cryptol. ePrint Arch..
[21] Adi Shamir,et al. An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware , 2011, IACR Cryptol. ePrint Arch..
[22] Dipanwita Roy Chowdhury,et al. Fault Analysis of Grain-128 by Targeting NFSR , 2011, AFRICACRYPT.
[23] Aline Gouget,et al. Fault analysis of GRAIN-128 , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.