In this paper, we investigate the security of the KATAN family of block ciphers against differential fault attacks. KATAN consists of three variants with 32, 48 and 64-bit block sizes, called KATAN32,KATAN48 and KATAN64, respectively. All three variants have the same key length of 80 bits. We assume a single-bit fault injection model where the adversary is supposed to be able to corrupt a single random bit of the internal state of the cipher and this fault injection process can be repeated (by resetting the cipher); i.e., the faults are transient rather than permanent. First, we determine suitable rounds for effective fault injections by analyzing distributions of low-degree (mainly, linear and quadratic) polynomial equations obtainable usi...
Cryptanalysis methods can be classified as pure mathematical attacks, such as linear and differentia...
Cryptanalysis methods can be classified as pure mathematical attacks, such as linear and differentia...
In this paper we present a speed up of the existing fault attack [2] on the Advanced Encryption Stan...
This paper investigates the security of the KTANTAN block cipher against differential fault analysis...
This paper investigates the security of the KTANTAN block cipher against differential fault analysis...
This paper investigates the security of the KTANTAN block cipher against differential fault analysis...
This paper presents a new and more realistic model for fault attacks and statistical and algebraic t...
The design and analysis of lightweight block ciphers is gaining increasing popularity due to the gen...
Abstract. A few work has ever been performed in cryptanalysis of block ciphers using cube attacks. T...
International audienceWe present a framework that unifies several standard differ-ential techniques....
We present a framework that unifies several standard differential techniques. This unified view allo...
KATAN is a family of block ciphers published at CHES 2009. Based on the Mixed-integer linear program...
International audienceWe present a framework that unifies several standard differ-ential techniques....
We present a study of several fault attacks against the block cipher IDEA. Such a study is particula...
Piccolo is a 64-bit lightweight block cipher which is able to be implemented in constrained hardware...
Cryptanalysis methods can be classified as pure mathematical attacks, such as linear and differentia...
Cryptanalysis methods can be classified as pure mathematical attacks, such as linear and differentia...
In this paper we present a speed up of the existing fault attack [2] on the Advanced Encryption Stan...
This paper investigates the security of the KTANTAN block cipher against differential fault analysis...
This paper investigates the security of the KTANTAN block cipher against differential fault analysis...
This paper investigates the security of the KTANTAN block cipher against differential fault analysis...
This paper presents a new and more realistic model for fault attacks and statistical and algebraic t...
The design and analysis of lightweight block ciphers is gaining increasing popularity due to the gen...
Abstract. A few work has ever been performed in cryptanalysis of block ciphers using cube attacks. T...
International audienceWe present a framework that unifies several standard differ-ential techniques....
We present a framework that unifies several standard differential techniques. This unified view allo...
KATAN is a family of block ciphers published at CHES 2009. Based on the Mixed-integer linear program...
International audienceWe present a framework that unifies several standard differ-ential techniques....
We present a study of several fault attacks against the block cipher IDEA. Such a study is particula...
Piccolo is a 64-bit lightweight block cipher which is able to be implemented in constrained hardware...
Cryptanalysis methods can be classified as pure mathematical attacks, such as linear and differentia...
Cryptanalysis methods can be classified as pure mathematical attacks, such as linear and differentia...
In this paper we present a speed up of the existing fault attack [2] on the Advanced Encryption Stan...