Differential Fault Attack Resistant Hardware Design Automation

Author(s):  
Mustafa Khairallah ◽  
Jakub Breier ◽  
Shivam Bhasin ◽  
Anupam Chattopadhyay
Author(s):  
Mustafa Khairallah ◽  
Rajat Sadhukhan ◽  
Radhamanjari Samanta ◽  
Jakub Breier ◽  
Shivam Bhasin ◽  
...  

IEEE Access ◽  
2021 ◽  
Vol 9 ◽  
pp. 37697-37706
Author(s):  
Haoxiang Luo ◽  
Weijian Chen ◽  
Xinyue Ming ◽  
Yifan Wu

IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 212794-212802
Author(s):  
Seonghyuck Lim ◽  
Jonghyeok Lee ◽  
Dong-Guk Han

1983 ◽  
Author(s):  
Richard H. Travassos

Author(s):  
Andrea Solazzo ◽  
Emanuele Del Sozzo ◽  
Irene De Rose ◽  
Matteo De Silvestri ◽  
Gianluca C. Durelli ◽  
...  

Author(s):  
Wei Li ◽  
Dawu Gu ◽  
Zhiqiang Liu ◽  
Ya Liu ◽  
Xiaohu Huang

2011 ◽  
Vol 6 (2) ◽  
Author(s):  
Wei Li ◽  
Xiaoling Xia ◽  
Dawu Gu ◽  
Zhiqiang Liu ◽  
Juanru Li ◽  
...  

Author(s):  
Bhagwan Bathe ◽  
Siddhartha Tiwari ◽  
Ravi Anand ◽  
Dibyendu Roy ◽  
Subhamoy Maitra

2013 ◽  
Vol 850-851 ◽  
pp. 529-532
Author(s):  
Feng Liu ◽  
Xuan Liu ◽  
Shuai Meng

In this paper, on the basis of the nibble-based faulty model and the differential analysis principle, we propose a kind of attack on the new low-cost LED block cipher which combine differential fault attack with meet-in-the-middle attack. We inject the nibble faulty at round 29, which is earlier than other papers. More precisely, ciphertext need to be multiplied by a matrix before add the key in order to reduce the effect from key spreading. Finally, the key candidates are recovered by solving the equation set. Hence the secret key bits can be recovered faster than exhaustive search.


Sign in / Sign up

Export Citation Format

Share Document