Abstract—In this paper, we first demonstrate a new Dif-ferential Power Analysis (DPA) attack technique against the Grain family of stream ciphers (Grain v1 and Grain-128) by resynchronizing the cipher multiple times with the same value of the secret key and randomly generated different initialization vectors (IVs). Subsequently, we develop a combined side channel and fault analysis attack strategy targeting various fault attack countermeasures for the Grain cipher family. We considered clock glitch induced faults occurring in practice for a hardware implementation of the cipher to devise our novel attack technique. Our proposed combined attack strategy works well even if the useful ciphertexts are not available to the adversary. Further, th...
In today's world of ubiquitous connectivity, communications security is an ever-present concern. In ...
Grain [11] is a lightweight stream cipher proposed by M. Hell, T. Johansson, and W. Meier to the eST...
Abstract. In this short note we review the state-of-the-art of sidechannel attacks on implementation...
In this paper, we first demonstrate a new Differential Power Analysis (DPA) attack technique against...
Abstract. Side-channel attacks on block ciphers and public key algorithms have been discussed extens...
In this paper, we present fault attack on Grain family of stream ciphers, an eStream finalist. The e...
This paper deals with the phase-shift fault analysis of stream cipher Grain v1. We assume that the a...
Side Channel Analysis (SCA) is among the newly emerged threats to small scale devices performing a c...
v1 to the estream call for stream cipher proposals and it also became one estream finalists in the h...
Abstract. Very few differential fault attacks (DFA) were reported on Grain-128 so far. In this paper...
Side-channel attacks refer to a particular form of cryptanalysis in which sensitive data is revealed...
Abstract. In this paper we discuss power analysis of stream ciphers. In such attacks, one measures t...
In recent years, several kinds of attacks on cryptographic devices have been developed. The goal of ...
Cryptographic devices produce not only the output data but also some additional information like pow...
Abstract—Hardware based ciphers are most suitable for resource constrained environments to provide i...
In today's world of ubiquitous connectivity, communications security is an ever-present concern. In ...
Grain [11] is a lightweight stream cipher proposed by M. Hell, T. Johansson, and W. Meier to the eST...
Abstract. In this short note we review the state-of-the-art of sidechannel attacks on implementation...
In this paper, we first demonstrate a new Differential Power Analysis (DPA) attack technique against...
Abstract. Side-channel attacks on block ciphers and public key algorithms have been discussed extens...
In this paper, we present fault attack on Grain family of stream ciphers, an eStream finalist. The e...
This paper deals with the phase-shift fault analysis of stream cipher Grain v1. We assume that the a...
Side Channel Analysis (SCA) is among the newly emerged threats to small scale devices performing a c...
v1 to the estream call for stream cipher proposals and it also became one estream finalists in the h...
Abstract. Very few differential fault attacks (DFA) were reported on Grain-128 so far. In this paper...
Side-channel attacks refer to a particular form of cryptanalysis in which sensitive data is revealed...
Abstract. In this paper we discuss power analysis of stream ciphers. In such attacks, one measures t...
In recent years, several kinds of attacks on cryptographic devices have been developed. The goal of ...
Cryptographic devices produce not only the output data but also some additional information like pow...
Abstract—Hardware based ciphers are most suitable for resource constrained environments to provide i...
In today's world of ubiquitous connectivity, communications security is an ever-present concern. In ...
Grain [11] is a lightweight stream cipher proposed by M. Hell, T. Johansson, and W. Meier to the eST...
Abstract. In this short note we review the state-of-the-art of sidechannel attacks on implementation...