This paper describes two different fault injection attacks on the authenticated encryption stream cipher Tiaoxin-346, a third round candidate in the CAESAR cryptographic competition. The first type of fault injection uses a bit-flipping fault model to conduct a forgery attack. The number of faulty bits required for this forgery attack is twice the number of bit modifications made in the input message. The second type of fault injection uses a random fault model in a differential fault attack to recover the secret key of the cipher. A successful attack can be performed with 36 random multi-byte faults and a computational complexity of 236. This second attack improves on the previous key recovery attack of Dey et. al., as the random fault mod...
NIST's PQC standardization process is in the third round, and a first final choice between one of th...
LEA is a symmetric block cipher proposed in 2014. It uses ARX design and its main advantage is the p...
Trivium is a hardware-oriented stream cipher designed in 2005 by de Canni`ere and Preneel for the Eu...
This paper describes two different fault injection attacks on the authenticated encryption stream ci...
We show that a particular class of stream ciphers - namely those in which the output function contai...
This paper investigates the application of fault attacks to the authenticated encryption stream ciph...
This paper investigates the application of fault attacks to the authenticated encryption stream ciph...
A differential fault attack framework for the Enocoro family of stream ciphers is presented. We only...
Since the first demonstration of fault attacks by Boneh et al. on RSA, a multitude of fault attack t...
We present a study of several fault attacks against the block cipher IDEA. Such a study is particula...
© Springer International Publishing AG, part of Springer Nature 2018. We present a fault analysis st...
Implementations of cryptographic algorithms continue to proliferate in consumer products due to the ...
International audienceImplementations of cryptographic algorithms continue to proliferate in consume...
In this paper we describe two differential fault attack techniques against Advanced Encryption Stand...
International audienceSecurity is a key component for information technologies and communication and...
NIST's PQC standardization process is in the third round, and a first final choice between one of th...
LEA is a symmetric block cipher proposed in 2014. It uses ARX design and its main advantage is the p...
Trivium is a hardware-oriented stream cipher designed in 2005 by de Canni`ere and Preneel for the Eu...
This paper describes two different fault injection attacks on the authenticated encryption stream ci...
We show that a particular class of stream ciphers - namely those in which the output function contai...
This paper investigates the application of fault attacks to the authenticated encryption stream ciph...
This paper investigates the application of fault attacks to the authenticated encryption stream ciph...
A differential fault attack framework for the Enocoro family of stream ciphers is presented. We only...
Since the first demonstration of fault attacks by Boneh et al. on RSA, a multitude of fault attack t...
We present a study of several fault attacks against the block cipher IDEA. Such a study is particula...
© Springer International Publishing AG, part of Springer Nature 2018. We present a fault analysis st...
Implementations of cryptographic algorithms continue to proliferate in consumer products due to the ...
International audienceImplementations of cryptographic algorithms continue to proliferate in consume...
In this paper we describe two differential fault attack techniques against Advanced Encryption Stand...
International audienceSecurity is a key component for information technologies and communication and...
NIST's PQC standardization process is in the third round, and a first final choice between one of th...
LEA is a symmetric block cipher proposed in 2014. It uses ARX design and its main advantage is the p...
Trivium is a hardware-oriented stream cipher designed in 2005 by de Canni`ere and Preneel for the Eu...