Toward reverse engineering on secret S-boxes in block ciphers
From MaRDI portal
Publication:893703
DOI10.1007/S11432-013-5053-9zbMATH Open1357.94076OpenAlexW2152497256WikidataQ122923055 ScholiaQ122923055MaRDI QIDQ893703FDOQ893703
Authors: Ming Tang, Zhenlong Qiu, Hongbo Peng, Mu Yi, Huanguo Zhang, Xiaobo (Sharon) Hu
Publication date: 20 November 2015
Published in: Science China Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11432-013-5053-9
Recommendations
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Cryptanalysis of PRESENT-like ciphers with secret S-boxes
- Cryptanalysis of C2
- Topics in Cryptology – CT-RSA 2004
- Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms
- Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems
- SCARE of Secret Ciphers with SPN Structures
- Defeating any secret cryptography with SCARE attacks
- SCARE of the DES
- Applied Cryptography and Network Security
- Dual-rail transition logic: A logic style for counteracting power analysis attacks
Cited In (3)
This page was built for publication: Toward reverse engineering on secret \(S\)-boxes in block ciphers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q893703)