This paper investigates the application of fault attacks to the authenticated encryption stream cipher algorithm MORUS. We propose fault attacks on MORUS with two different goals: one to breach the confidentiality component, and the other to breach the integrity component. For the fault attack on the confidentiality component of MORUS, we propose two different types of key recovery. The first type is a partial key recovery using a permanent fault model, except for one of the variants of MORUS where the full key is recovered with this model. The second type is a full key recovery using a transient fault model, at the cost of a higher number of faults compared to the permanent fault model. Finally, we describe a fault attack on the integrity ...
In a fault attack, errors are induced during the computation of a cryptographic primitive, and the f...
Abstract:- LILI-128 is a clock controlled stream cipher based on two LFSRs with one clock control fu...
An authenticated cipher is a symmetric key cryptographic primitive which protects the confidentialit...
This paper investigates the application of fault attacks to the authenticated encryption stream ciph...
We show that a particular class of stream ciphers - namely those in which the output function contai...
This paper describes two different fault injection attacks on the authenticated encryption stream ci...
\u3cp\u3eMORUS is a high-performance authenticated encryption algorithm submitted to the CAESAR comp...
We investigated the application of cube attacks to MORUS, a candidate in the CAESAR competition. We ...
© Springer International Publishing AG, part of Springer Nature 2018. We present a fault analysis st...
Since the first demonstration of fault attacks by Boneh et al. on RSA, a multitude of fault attack t...
Fault attack is referred to as an attack that targets mainly on cryptographic algorithms of a smart ...
This paper presents the first practical fault attack on the ChaCha family of addition-rotation-XOR (...
Memory fault attacks, inducing errors in computations, have been an ever-evolving threat to cryptogr...
Persistence is an intrinsic nature for many errors yet has not been caught enough attractions for ye...
International audienceFault attacks are attacks in which an adversary with physical access to a cryp...
In a fault attack, errors are induced during the computation of a cryptographic primitive, and the f...
Abstract:- LILI-128 is a clock controlled stream cipher based on two LFSRs with one clock control fu...
An authenticated cipher is a symmetric key cryptographic primitive which protects the confidentialit...
This paper investigates the application of fault attacks to the authenticated encryption stream ciph...
We show that a particular class of stream ciphers - namely those in which the output function contai...
This paper describes two different fault injection attacks on the authenticated encryption stream ci...
\u3cp\u3eMORUS is a high-performance authenticated encryption algorithm submitted to the CAESAR comp...
We investigated the application of cube attacks to MORUS, a candidate in the CAESAR competition. We ...
© Springer International Publishing AG, part of Springer Nature 2018. We present a fault analysis st...
Since the first demonstration of fault attacks by Boneh et al. on RSA, a multitude of fault attack t...
Fault attack is referred to as an attack that targets mainly on cryptographic algorithms of a smart ...
This paper presents the first practical fault attack on the ChaCha family of addition-rotation-XOR (...
Memory fault attacks, inducing errors in computations, have been an ever-evolving threat to cryptogr...
Persistence is an intrinsic nature for many errors yet has not been caught enough attractions for ye...
International audienceFault attacks are attacks in which an adversary with physical access to a cryp...
In a fault attack, errors are induced during the computation of a cryptographic primitive, and the f...
Abstract:- LILI-128 is a clock controlled stream cipher based on two LFSRs with one clock control fu...
An authenticated cipher is a symmetric key cryptographic primitive which protects the confidentialit...