نتایج جستجو برای: differential attack

تعداد نتایج: 363211  

Journal: :Iet Information Security 2022

The recent development of Internet Things (IoT) devices has increased related security issues. Because the rapid increase in use these devices, possibility accessing and hijacking cryptographic is increasing. Consequently, active research on technologies capable providing a safe environment even resource-constrained environments been undertaken. As result their physical accessibility, are becom...

1997
Robert W. Moses

Buffeting is an aeroelastic phenomenon which plagues high performance aircraft at high angles of attack. For the F/A-18 at high angles of attack, vortices emanating from wing/fuselage leading edge extensions burst, immersing the vertical tails in their turbulent wake. The resulting buffeting of the vertical tails is a concern from fatigue and inspection points of view. Previous flight and wind-...

2000
Manfred Aigner Elisabeth Oswald

Performing a Differential Power Analysis (DPA) attack requires knowledge in several fields; statistics and cryptography for the attack itself, programming skills and experience in instrumentation to build up an automatic measurement system and electronical skills to improve the results. This tutorial provides information on all these topics on basis of our experience.

Journal: :IACR Cryptology ePrint Archive 2016
Shahram Rasoolzadeh Håvard Raddum

We introduce a new technique for doing the key recovery part of an integral or higher order differential attack. This technique speeds up the key recovery phase significantly and can be applied to any block cipher with S-boxes. We show several properties of this technique, then apply it to PRINCE and report on the improvements in complexity from earlier integral and higher order differential at...

2008
Christophe De Cannière Özgül Küçük Bart Preneel

In this paper, we analyze the initialization algorithm of Grain, one of the eSTREAM candidates which made it to the third phase of the project. We point out the existence of a sliding property in the initialization algorithm of the Grain family, and show that it can be used to reduce by half the cost of exhaustive key search (currently the most efficient attack on both Grain v1 and Grain-128). ...

Journal: :IEICE Transactions 2005
Dong-Wook Lee Dong-Soo Har

Cryptosystems for smartcard are required to provide protection from Differential Power Analysis (DPA) attack. Self-timed circuit based cryptosystems demonstrate considerable resistance against DPA attack, but they take substantial circuit area. A novel approach offering up to 30% area reduction and maintaining DPA protection level close to DIMS scheme is proposed. key words: DPA, self-timed cir...

Journal: :IACR Cryptology ePrint Archive 2013
Yanfeng Wang Wenling Wu Zhiyuan Guo Xiaoli Yu

Abstract. Zorro is an AES-like lightweight block cipher proposed in CHES 2013, which only uses 4 S-boxes per round. The designers showed the resistance of the cipher against various attacks and concluded the cipher has a large security margin. Recently, Guo et. al [1] have given a key recovery attack on full-round Zorro by using the internal differential characteristics. However, the attack onl...

2009
Daniel Smith-Tone

Recently, the C∗− signature scheme has been completely broken by Dubois et al. [2, 3]. As a consequence, the security of SFLASH and other multivariate public key systems have been impaired. The attacks presented in [2, 3] rely on a symmetry of the differential of the encryption mapping. In [1], Ding et al. experimentally justify the use projection as a method of avoiding the new attack. In this...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید