搜索结果: 1-15 共查到“军队指挥学 Differential fault analysis”相关记录28条 . 查询时间(0.14 秒)
Table Redundancy Method for Protecting against Differential Fault Analysis in the White-box Cryptography
Differential fault analysis white-box cryptography countermeasure
2019/8/26
Differential Fault Analysis (DFA) intentionally injects some fault into the encryption process and analyzes a secret key from the mathematical relationship between faulty and fault-free ciphertexts. E...
In recent literature, there has been a particular interest in studying nonce based AE schemes in the light of fault based attacks as they seem to present an automatic protection against Differential F...
Fully Automated Differential Fault Analysis on Software Implementations of Cryptographic Algorithms
differential fault analysis cryptographic fault attacks automation
2018/6/5
Emerging technologies with the requirement of small size and portability, such as Internet-of-Things devices, represent a good target for physical attacks, e.g., fault attacks. These attacks often aim...
We present various differential fault attack schemes for the RECTANGLE-80 and demonstrate how initially we started from a 80-bit fault to a single word fault scheme. This was mainly due to a different...
Keccak-based algorithms such as Secure Hash Algorithm-3 (SHA-3) will be widely used in crypto systems, and evaluating their security against different kinds of attacks is vitally important. This paper...
Characterization of all possible faults in a cryptosystem exploitable for fault attacks is a problem which is of both theoretical and practical interest for the cryptographic community. The complete k...
Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack
AES differential fault analysis side-channel attacks
2016/12/8
Differential fault analysis attack is a kind of serious threat to cryptographic devices.
Previous protection schemes for crypto devices are not designed specifically against this kind of
attacks. At...
The security of SHA-3 against different kinds of attacks are of vital importance for crypto systems with SHA-3 as the security engine. In this paper, we look into the differential fault analysis of SH...
EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ
fault analysis authenticated encryption PAEQ
2016/6/20
This work exploits internal differentials within a cipher in the context of Differential Fault Analysis (DFA). This in turn overcomes the nonce barrier which acts as a natural counter-measure against ...
Differential Fault Analysis of MICKEY Family of Stream Ciphers
MICKEY-128 2.0 MICKEY v1 MICKEY 2.0
2016/1/23
This paper presents differential fault analysis of the MICKEY family of stream ciphers, one of the winners of eStream project. The current attacks are of the best performance among all the attacks aga...
Differential Fault Analysis on the families of SIMON and SPECK ciphers
Lightweight Block Ciphers SIMON SPECK
2016/1/23
In 2013, the US National Security Agency proposed two new families of lightweight block ciphers: SIMON and SPECK. Currently, linear and differential cryptanalytic results for SIMON are available in ...
Multi-Bit Differential Fault Analysis of Grain-128 with Very Weak Assumptions
Stream Cipher Differential Fault Attack Multi-Bit Fault
2016/1/7
Very few differential fault attacks (DFA) were reported on Grain-128 so far. In this
paper we present a generic attack strategy that allows the adversary to challenge the cipher under
different mult...
Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack
Clock glitch detection AES differential fault analysis
2016/1/6
Clock glitch based Differential Fault Analysis (DFA) attack is a serious threat to cryptographic
devices. Previous error detection schemes for cryptographic devices target improving the
circuit reli...
Probabilistic Signature Based Framework for Differential Fault Analysis of Stream Ciphers
Differential Attack Fault Attack Grain Family
2015/12/30
Differential Fault Attack (DFA) has received serious attention in cryptographic literature
and very recently such attacks have been mounted against several popular stream ciphers for example
Grain v...
Improved Differential Fault Analysis on ARIA using Small Number of Faults
Differential fault analysis Block cipher ARIA Cryptanalysis
2013/4/18
In [15], Li et al. firstly proposed a differential fault analysis on ARIA-128. This attack requires average 45 random byte fault injections. In 2012, Park et al. proposed the improve DFA by using 33 r...