ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
LFSR Based Stream Ciphers Are Vulnerable to Power Attacks
Lecture Notes in Computer Science - Progress in Cryptology – INDOCRYPT 2007
◽
10.1007/978-3-540-77026-8_30
◽
2007
◽
pp. 384-392
◽
Cited By ~ 19
Author(s):
Sanjay Burman
◽
Debdeep Mukhopadhyay
◽
Kamakoti Veezhinathan
Keyword(s):
Stream Ciphers
◽
Power Attacks
Download Full-text
Related Documents
Cited By
References
Chaotic Keystream Generators for Additive Stream Ciphers
10.21236/ada265824
◽
1993
◽
Author(s):
Jeffrey J. Leader
Keyword(s):
Stream Ciphers
Download Full-text
Understanding and Comparing the Capabilities of On-Chip Voltage Sensors against Remote Power Attacks on FPGAs
2020 IEEE 63rd International Midwest Symposium on Circuits and Systems (MWSCAS)
◽
10.1109/mwscas48704.2020.9184683
◽
2020
◽
Author(s):
Shayan Moini
◽
Xiang Li
◽
Peter Stanwicks
◽
George Provelengios
◽
Wayne Burleson
◽
...
Keyword(s):
Voltage Sensors
◽
Power Attacks
◽
On Chip
Download Full-text
Improved Distinguishers on Stream Ciphers With Certain Weak Feedback Polynomials
IEEE Transactions on Information Theory
◽
10.1109/tit.2012.2202212
◽
2012
◽
Vol 58
(9)
◽
pp. 6183-6193
◽
Cited By ~ 2
Author(s):
Martin Hell
◽
Thomas Johansson
◽
Lennart Brynielsson
◽
Håkan Englund
Keyword(s):
Stream Ciphers
Download Full-text
Combining algebraic and side channel attacks on stream ciphers
2017 International Conference on Communication Technologies (ComTech)
◽
10.1109/comtech.2017.8065763
◽
2017
◽
Cited By ~ 4
Author(s):
Asif Raza Kazmi
◽
Mehreen Afzal
◽
Muhammad Faisal Amjad
◽
Adnan Rashdi
Keyword(s):
Stream Ciphers
◽
Side Channel
◽
Side Channel Attacks
Download Full-text
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
2010 International Conference on Multimedia Information Networking and Security
◽
10.1109/mines.2010.91
◽
2010
◽
Author(s):
Chang N. Zhang
◽
Qian Yu
◽
Xiao Wei Liu
Keyword(s):
Fault Tolerant
◽
Stream Ciphers
Download Full-text
The Stream Ciphers and the Keystream Generator Based on Inverse Permutation
IFAC Proceedings Volumes
◽
10.3182/20101006-2-pl-4019.00003
◽
2010
◽
Vol 43
(24)
◽
pp. 7-10
Author(s):
V. Scholtz
◽
J. Scholtzová
Keyword(s):
Stream Ciphers
Download Full-text
FPGA Implementations of 256-Bit SNOW Stream Ciphers for Postquantum Mobile Security
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
◽
10.1109/tvlsi.2021.3108430
◽
2021
◽
pp. 1-12
Author(s):
Milad Bahadori
◽
Kimmo Jarvinen
◽
Valtteri Niemi
Keyword(s):
Mobile Security
◽
Stream Ciphers
Download Full-text
Fuzzy Evaluation Scheme for KDF Based on Stream Ciphers
Advances in Intelligent Systems and Computing - Recent Advances on Soft Computing and Data Mining
◽
10.1007/978-3-319-72550-5_9
◽
2018
◽
pp. 82-94
◽
Cited By ~ 1
Author(s):
Hamijah Mohd. Rahman
◽
Nureize Arbaiy
◽
Chuah Chai Wen
Keyword(s):
Stream Ciphers
◽
Fuzzy Evaluation
◽
Evaluation Scheme
Download Full-text
Stream ciphers
Cryptography and Secure Communication
◽
10.1017/cbo9781139013673.008
◽
2014
◽
pp. 181-217
Author(s):
Richard E. Blahut
Keyword(s):
Stream Ciphers
Download Full-text
On the design of high speed self-synchronizing stream ciphers
[Proceedings] Singapore ICCS/ISITA `92
◽
10.1109/iccs.1992.254997
◽
2003
◽
Cited By ~ 1
Author(s):
J. Daemen
◽
R. Govaerts
◽
J. Vandewalle
Keyword(s):
High Speed
◽
Stream Ciphers
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close