This paper deals with the phase-shift fault analysis of stream cipher Grain v1. We assume that the attacker is able to desynchronize the linear and nonlinear registers of the cipher during the keystream generation phase by either forcing one of the registers to clock one more time, while the other register is not clocked, or by preventing one of the registers from clocking, while the other register is clocked. Using this technique, we are able to obtain the full inner state of the cipher in reasonable time (under 12 hours on a single PC) by using 150 bits of unfaulted keystream, 600 bits of faulted keystreams and by correctly guessing 28 bits of the linear register
In this paper, we study the security of Grain-like small state stream ciphers by fast correlation at...
This paper analyses the resistance of certain keystream generators against algebraic attacks, namely...
Abstract—Hardware based ciphers are most suitable for resource constrained environments to provide i...
This paper deals with the phase-shift fault analysisof stream cipher Grain v1. We assume that the at...
Abstract—In this paper, we first demonstrate a new Dif-ferential Power Analysis (DPA) attack techniq...
In this paper, we present fault attack on Grain family of stream ciphers, an eStream finalist. The e...
Grain [11] is a lightweight stream cipher proposed by M. Hell, T. Johansson, and W. Meier to the eST...
In this paper, we first demonstrate a new Differential Power Analysis (DPA) attack technique against...
v1 to the estream call for stream cipher proposals and it also became one estream finalists in the h...
Abstract — A common approach to protect confidential infor-mation is to use a stream cipher which co...
A new stream cipher, Grain, is proposed. The design targets hardware environments where gate count, ...
A new stream cipher, Grain, is proposed. The design targets hardware environments where gate count, ...
Abstract. Side-channel attacks on block ciphers and public key algorithms have been discussed extens...
Abstract. Very few differential fault attacks (DFA) were reported on Grain-128 so far. In this paper...
We present an algebraic attack approach to a family of irregularly clock-controlled bit-based linear...
In this paper, we study the security of Grain-like small state stream ciphers by fast correlation at...
This paper analyses the resistance of certain keystream generators against algebraic attacks, namely...
Abstract—Hardware based ciphers are most suitable for resource constrained environments to provide i...
This paper deals with the phase-shift fault analysisof stream cipher Grain v1. We assume that the at...
Abstract—In this paper, we first demonstrate a new Dif-ferential Power Analysis (DPA) attack techniq...
In this paper, we present fault attack on Grain family of stream ciphers, an eStream finalist. The e...
Grain [11] is a lightweight stream cipher proposed by M. Hell, T. Johansson, and W. Meier to the eST...
In this paper, we first demonstrate a new Differential Power Analysis (DPA) attack technique against...
v1 to the estream call for stream cipher proposals and it also became one estream finalists in the h...
Abstract — A common approach to protect confidential infor-mation is to use a stream cipher which co...
A new stream cipher, Grain, is proposed. The design targets hardware environments where gate count, ...
A new stream cipher, Grain, is proposed. The design targets hardware environments where gate count, ...
Abstract. Side-channel attacks on block ciphers and public key algorithms have been discussed extens...
Abstract. Very few differential fault attacks (DFA) were reported on Grain-128 so far. In this paper...
We present an algebraic attack approach to a family of irregularly clock-controlled bit-based linear...
In this paper, we study the security of Grain-like small state stream ciphers by fast correlation at...
This paper analyses the resistance of certain keystream generators against algebraic attacks, namely...
Abstract—Hardware based ciphers are most suitable for resource constrained environments to provide i...