LEA is a symmetric block cipher proposed in 2014. It uses ARX design and its main advantage is the possibility of a fast software implementation on common computing platforms. In this paper we propose a Differential Fault Analysis attack on LEA. By injecting random bit faults in the last round and in the penultimate round, we were able to recover the secret key by using 258 faulty encryptions in average. If the position of faults is known, then only 62 faulty encryptions are needed in order to recover the key which surpasses the results achieved so far.Accepted Versio
Since its first introduction, differential fault analysis has proved to be one of the most effective...
This paper describes a differential fault analysis (DFA) on AES with 192 and 256-bit keys. We show a...
In this paper we propose a new differential fault analysis (DFA) on CLEFIA of 128-bit key. The propo...
Part 9: CryptographyInternational audienceLEA is a symmetric block cipher proposed in 2014. It uses ...
Part 7: Security Attacks and Measures (Short Papers)International audienceIn this paper we present a...
In this paper we describe two differential fault attack techniques against Advanced Encryption Stand...
Differential Fault Analysis (DFA) is considered as the most popular fault analysis method. While the...
Abstract. Previously proposed differential fault analysis (DFA) tech-niques against iterated block c...
This paper proposes two Differential Fault Attacks on the lightweight block cipher KLEIN. Variant on...
International audienceSince the early work of Piret and Quisquater on fault attacks against AES at C...
Abstract. Differential Fault Analysis (DFA) attack is a powerful cryptanalytic technique that could ...
We present a study of several fault attacks against the block cipher IDEA. Such a study is particula...
Abstract—This paper introduces Multi-Stage Fault Attacks, which allow Differential Fault Analysis of...
We show that a particular class of stream ciphers - namely those in which the output function contai...
Differential Fault Analysis (DFA) finds the key of a block cipher using differential information bet...
Since its first introduction, differential fault analysis has proved to be one of the most effective...
This paper describes a differential fault analysis (DFA) on AES with 192 and 256-bit keys. We show a...
In this paper we propose a new differential fault analysis (DFA) on CLEFIA of 128-bit key. The propo...
Part 9: CryptographyInternational audienceLEA is a symmetric block cipher proposed in 2014. It uses ...
Part 7: Security Attacks and Measures (Short Papers)International audienceIn this paper we present a...
In this paper we describe two differential fault attack techniques against Advanced Encryption Stand...
Differential Fault Analysis (DFA) is considered as the most popular fault analysis method. While the...
Abstract. Previously proposed differential fault analysis (DFA) tech-niques against iterated block c...
This paper proposes two Differential Fault Attacks on the lightweight block cipher KLEIN. Variant on...
International audienceSince the early work of Piret and Quisquater on fault attacks against AES at C...
Abstract. Differential Fault Analysis (DFA) attack is a powerful cryptanalytic technique that could ...
We present a study of several fault attacks against the block cipher IDEA. Such a study is particula...
Abstract—This paper introduces Multi-Stage Fault Attacks, which allow Differential Fault Analysis of...
We show that a particular class of stream ciphers - namely those in which the output function contai...
Differential Fault Analysis (DFA) finds the key of a block cipher using differential information bet...
Since its first introduction, differential fault analysis has proved to be one of the most effective...
This paper describes a differential fault analysis (DFA) on AES with 192 and 256-bit keys. We show a...
In this paper we propose a new differential fault analysis (DFA) on CLEFIA of 128-bit key. The propo...