Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128
暂无分享,去创建一个
[1] Josef Pieprzyk,et al. Random Differential Fault Attacks on the Lightweight Authenticated Encryption Stream Cipher Grain-128AEAD , 2021, IEEE Access.
[2] Ed Dawson,et al. Differential Random Fault Attacks on certain CAESAR Stream Ciphers (Supplementary Material) , 2019, IACR Cryptol. ePrint Arch..
[3] Leonie Ruth Simpson,et al. Random Fault Attacks on a Class of Stream Ciphers , 2019, Secur. Commun. Networks.
[4] Leonie Ruth Simpson,et al. Fault Attacks on the Authenticated Encryption Stream Cipher MORUS , 2018, Cryptogr..
[5] Leonie Ruth Simpson,et al. Fault attacks on Tiaoxin-346 , 2018, ACSW.
[6] Santanu Sarkar,et al. Probabilistic signature based generalized framework for differential fault analysis of stream ciphers , 2016, Cryptography and Communications.
[7] Santanu Sarkar,et al. Differential Fault Analysis on Tiaoxin and AEGIS Family of Ciphers , 2016, SSCC.
[8] Jose M. Alcaraz Calero,et al. Security in Computing and Communications , 2016, Communications in Computer and Information Science.
[9] Santanu Sarkar,et al. Differential Fault Attack against Grain Family with Very Few Faults and Minimal Assumptions , 2015, IEEE Transactions on Computers.
[10] Santanu Sarkar,et al. Improved differential fault attack on MICKEY 2.0 , 2015, Journal of Cryptographic Engineering.
[11] Debdeep Mukhopadhyay,et al. Improved practical differential fault analysis of Grain-128 , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[12] Michael Hutter,et al. The Temperature Side Channel and Heating Fault Attacks , 2013, CARDIS.
[13] Subhamoy Maitra,et al. A Differential Fault Attack on MICKEY 2.0 , 2013, CHES.
[14] Santanu Sarkar,et al. A Differential Fault Attack on the Grain Family under Reasonable Assumptions , 2012, INDOCRYPT.
[15] Santanu Sarkar,et al. A Differential Fault Attack on the Grain Family of Stream Ciphers , 2012, CHES.
[16] Alessandro Barenghi,et al. Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures , 2012, Proceedings of the IEEE.
[17] Guido Bertoni,et al. Duplexing the sponge: single-pass authenticated encryption and other applications , 2011, IACR Cryptol. ePrint Arch..
[18] Jörn-Marc Schmidt,et al. A Practical Fault Attack on Square and Multiply , 2008, 2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography.
[19] Christophe Clavier,et al. Secret External Encodings Do Not Prevent Transient Fault Analysis , 2007, CHES.
[20] Ross J. Anderson,et al. Optical Fault Induction Attacks , 2002, CHES.
[21] Information Security and Cryptology – ICISC 2020: 23rd International Conference, Seoul, South Korea, December 2–4, 2020, Proceedings , 2021, International Conference on Information Security and Cryptology.
[22] Jae Hong Seo. Information Security and Cryptology – ICISC 2019: 22nd International Conference, Seoul, South Korea, December 4–6, 2019, Revised Selected Papers , 2020, ICISC.
[23] Md. Iftekhar Salam,et al. Differential Fault Based Key Recovery Attacks on TRIAD , 2020, ICISC.
[24] Hongjun Wu,et al. TinyJAMBU : A Family of Lightweight Authenticated Encryption Algorithms ( Version 2 ) , 2019 .
[25] Guido Bertoni,et al. Cryptographic Hardware and Embedded Systems - CHES 2013: 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings , 2013, Lecture Notes in Computer Science.
[26] Aurélien Francillon,et al. Smart Card Research and Advanced Applications , 2013, Lecture Notes in Computer Science.
[27] Mridul Nandi,et al. Progress in Cryptology - INDOCRYPT 2012 , 2012, Lecture Notes in Computer Science.
[28] Amit Sahai,et al. Selected Areas in Cryptography , 2011, Lecture Notes in Computer Science.
[29] Ingrid Verbauwhede,et al. Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings , 2007, CHES.
[30] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2002 , 2003, Lecture Notes in Computer Science.