Fault analysis of grain-128 by targeting NFSR
From MaRDI portal
Publication:3011920
DOI10.1007/978-3-642-21969-6_19zbMATH Open1280.94074OpenAlexW338310075MaRDI QIDQ3011920FDOQ3011920
Authors: Sandip Karmakar, Dipanwita Roy Chowdhury
Publication date: 29 June 2011
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-21969-6_19
Recommendations
- A differential fault attack on the grain family of stream ciphers
- A Differential Fault Attack on the Grain Family under Reasonable Assumptions
- A differential fault attack on Grain-128a using macs
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Differential Fault Attack on Grain v1, ACORN v3 and Lizard
Cites Work
- Title not available (Why is that?)
- Breaking Grain-128 with dynamic cube attacks
- Computer Aided Verification
- Title not available (Why is that?)
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Differential Fault Analysis of Trivium
- Differential fault analysis of Rabbit
- Scan Based Side Channel Attacks on Stream Ciphers and Their Counter-Measures
Cited In (5)
- A differential fault attack on Grain-128a using macs
- A differential fault attack on the grain family of stream ciphers
- Construction of RSBFs with improved cryptographic properties to resist differential fault attack on grain family of stream ciphers
- A Differential Fault Attack on the Grain Family under Reasonable Assumptions
- Algebraic cryptanalysis of stream ciphers using decomposition of Boolean function
Uses Software
This page was built for publication: Fault analysis of grain-128 by targeting NFSR
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3011920)