© 2014 John Wiley & Sons, Ltd. Meet-in-the-Middle (MitM) fault analysis is a kind of powerful cryptanalytic approach suitable for various block ciphers. When applying the method to analyze the security of block ciphers, it is very crucial to find effective MitM characteristics based on some fault models. In this paper, we investigate the security of word-oriented substitution-permutation network (SPN) block ciphers by means of MitM fault analysis and observe that if the diffusion layers of the ciphers have some special properties, it is easy to derive effective MitM characteristics under the condition of single-word fault model, which can lead to efficient fault attacks on the ciphers. In order to demonstrate the effectiveness of our obse...
Fault attacks (FA) are one of the potent practical threats to modern cryptographic implementations. ...
Abstract. Deliberate injection of faults into cryptographic devices is an effec-tive cryptanalysis t...
The meet-in-the-middle (MITM) technique has led to many key-recovery attacks on block ciphers and pr...
In this paper we describe a differential fault attack technique working against Substitution-Permuta...
Abstract. In this paper we describe a differential fault attack technique working against Substituti...
In this paper, a new method for evaluating the integral property, truncated and impossible different...
Fault analysis is a powerful technique to retrieve secret keys by exploiting side-channel informatio...
We present a study of several fault attacks against the block cipher IDEA. Such a study is particula...
In this paper, we propose a practical algorithm that can be used to analyze the block cipher structu...
Characterizing the fault space of a cipher to filter out a set of faults potentially exploitable for...
A block cipher, in general, consist of several repetitions of a round transformation. A round transf...
Characterizing the fault space of a cipher to filter out a set of faults potentially exploitable for...
Abstract — In this paper, we investigate the application of inte-gral cryptanalysis to the Byte-orie...
Block ciphers are widely used building blocks for secure communication systems; their purpose is to...
Malicious exploitation of faults for extracting secrets is one of the most practical and potent thre...
Fault attacks (FA) are one of the potent practical threats to modern cryptographic implementations. ...
Abstract. Deliberate injection of faults into cryptographic devices is an effec-tive cryptanalysis t...
The meet-in-the-middle (MITM) technique has led to many key-recovery attacks on block ciphers and pr...
In this paper we describe a differential fault attack technique working against Substitution-Permuta...
Abstract. In this paper we describe a differential fault attack technique working against Substituti...
In this paper, a new method for evaluating the integral property, truncated and impossible different...
Fault analysis is a powerful technique to retrieve secret keys by exploiting side-channel informatio...
We present a study of several fault attacks against the block cipher IDEA. Such a study is particula...
In this paper, we propose a practical algorithm that can be used to analyze the block cipher structu...
Characterizing the fault space of a cipher to filter out a set of faults potentially exploitable for...
A block cipher, in general, consist of several repetitions of a round transformation. A round transf...
Characterizing the fault space of a cipher to filter out a set of faults potentially exploitable for...
Abstract — In this paper, we investigate the application of inte-gral cryptanalysis to the Byte-orie...
Block ciphers are widely used building blocks for secure communication systems; their purpose is to...
Malicious exploitation of faults for extracting secrets is one of the most practical and potent thre...
Fault attacks (FA) are one of the potent practical threats to modern cryptographic implementations. ...
Abstract. Deliberate injection of faults into cryptographic devices is an effec-tive cryptanalysis t...
The meet-in-the-middle (MITM) technique has led to many key-recovery attacks on block ciphers and pr...