In this paper we describe several ideas related to Differential Fault Attack (DFA) on MICKEY 2.0, a stream cipher from eStream hardware profile. Using the standard assumptions for fault attacks, we first show that if the adversary can induce random single bit faults in the internal state of the cipher, then by injecting around $2^{16.7}$ faults and performing $2^{32.5}$ computations on an average, it is possible to recover the entire internal state of MICKEY at the beginning of the key-stream generation phase. We further consider the scenario where the fault may affect more than one (at most three) neighbouring bits and in that case we require around $2^{18.4}$ faults on an average to mount the DFA. We further show that if the attacker can ...
In an article from HOST 2018, which appears in extended form in the Cryptology ePrint Archive, Baksi...
In this paper we propose a new differential fault analysis (DFA) on CLEFIA of 128-bit key. The propo...
Fault analysis is a powerful technique to retrieve secret keys by exploiting side-channel informatio...
This paper presents differential fault analysis of the MICKEY family of stream ciphers, one of the w...
In this paper we propose Differential Fault Attack (DFA) on two Fully Homomorphic Encryption (FHE) f...
Differential Fault Attack (DFA) is presently a very well known technique to evaluate security of a s...
Since the advent of side channel attacks, at the end of the 90's, classical cryptanalysis is no long...
We show that a particular class of stream ciphers - namely those in which the output function contai...
Very few differential fault attacks (DFA) were reported on {\em Grain-128} so far. In this paper we ...
A differential fault attack framework for the Enocoro family of stream ciphers is presented. We only...
In this paper we present a speed up of the existing fault attack [2] on the Advanced Encryption Stan...
In this paper, we first demonstrate a new Differential Power Analysis (DPA) attack technique against...
The $32$-bit MAC of Grain-128a is a linear combination of the first 64 and then the alternative keys...
LEA is a symmetric block cipher proposed in 2014. It uses ARX design and its main advantage is the p...
Abstract. In this paper we present improvements to the differential fault analysis (DFA) of the stre...
In an article from HOST 2018, which appears in extended form in the Cryptology ePrint Archive, Baksi...
In this paper we propose a new differential fault analysis (DFA) on CLEFIA of 128-bit key. The propo...
Fault analysis is a powerful technique to retrieve secret keys by exploiting side-channel informatio...
This paper presents differential fault analysis of the MICKEY family of stream ciphers, one of the w...
In this paper we propose Differential Fault Attack (DFA) on two Fully Homomorphic Encryption (FHE) f...
Differential Fault Attack (DFA) is presently a very well known technique to evaluate security of a s...
Since the advent of side channel attacks, at the end of the 90's, classical cryptanalysis is no long...
We show that a particular class of stream ciphers - namely those in which the output function contai...
Very few differential fault attacks (DFA) were reported on {\em Grain-128} so far. In this paper we ...
A differential fault attack framework for the Enocoro family of stream ciphers is presented. We only...
In this paper we present a speed up of the existing fault attack [2] on the Advanced Encryption Stan...
In this paper, we first demonstrate a new Differential Power Analysis (DPA) attack technique against...
The $32$-bit MAC of Grain-128a is a linear combination of the first 64 and then the alternative keys...
LEA is a symmetric block cipher proposed in 2014. It uses ARX design and its main advantage is the p...
Abstract. In this paper we present improvements to the differential fault analysis (DFA) of the stre...
In an article from HOST 2018, which appears in extended form in the Cryptology ePrint Archive, Baksi...
In this paper we propose a new differential fault analysis (DFA) on CLEFIA of 128-bit key. The propo...
Fault analysis is a powerful technique to retrieve secret keys by exploiting side-channel informatio...