搜索结果: 1-10 共查到“Attacks on Block Ciphers”相关记录10条 . 查询时间(0.073 秒)
Breach the Gate: Exploiting Observability for Fault Template Attacks on Block Ciphers
Fault attacks PRESEN
2019/8/19
Fault attacks (FA) are one of the potent practical threats to modern cryptographic implementations. Over the years the FA tech- niques have evolved, gradually moving towards the exploitation of device...
Generalized Related-Key Rectangle Attacks on Block Ciphers with Linear Key Schedule
Key Recovery Rectangle Attack SKINNY
2019/6/19
This paper gives a new generalized key-recovery model of related-key rectangle attacks on block ciphers with linear key schedules. The model is quite optimized and applicable to various block ciphers ...
Transform-and-Encode: A Countermeasure Framework for Statistical Ineffective Fault Attacks on Block Ciphers
Fault Attack Block Cipher Masking
2019/5/23
Right from its introduction by Boneh et al., fault attacks (FA) have been established to be one of the most practical threats to both public key and symmetric key based cryptosystems. Statistical Inef...
A Formal Analysis of Prefetching in Profiled Cache-Timing Attacks on Block Ciphers
Chester Rebeiro Debdeep Mukhopadhyay
2015/12/18
Formally bounding side-channel leakage is important to bridge the gap between the theory and practice in cryptography. However, bounding side-channel leakages is difficult because leakage in a crypto-...
Multi-Stage Fault Attacks on Block Ciphers
lightweight block cipher Multi-Stage Fault Attack
2014/3/5
This paper introduces Multi-Stage Fault Attacks, which allow Differential Fault Analysis of block ciphers having independent subkeys. Besides the specification of an algorithm implementing the techniq...
In this paper we formalize the notion of leakage attacks on iterated
block ciphers, in which the attacker can find (via physical probing,
power measurement, or any other type of side channel) one bi...
On the Data Complexity of Statistical Attacks Against Block Ciphers(full version)
statistical cryptanalysis iterated block cipher data complexity
2009/6/11
Many attacks on iterated block ciphers rely on statistical considerations using
plaintext/ciphertext pairs to distinguish some part of the cipher from a random permutation. We
provide here a simple ...
Combined Differential, Linear and Related-Key Attacks on Block Ciphers and MAC Algorithms
Combined Differential Linear Related-Key Attacks Block Ciphers MAC Algorithms
2009/1/6
Differential and linear attacks are the most widely used cryptanalytic tools to
evaluate the security of symmetric-key cryptography. Since the introduction of
differential and linear attacks in the ...
How Fast can be Algebraic Attacks on Block Ciphers ?
algebraic attacks on block ciphers AES Rijndael Serpent multivariate quadratic equations
2008/11/20
In this paper we give a specification of a new block cipher
that can be called the Courtois Toy Cipher (CTC). It is quite simple,
and yet very much like any other known block cipher. If the paramete...