搜索结果: 1-5 共查到“differential fault attacks”相关记录5条 . 查询时间(0.062 秒)
On Misuse of Nonce-Misuse Resistance: Adapting Differential Fault Attacks on (few) CAESAR Winners
Fault Attacks DFA SPNs
2019/5/31
In this paper, we study DFA attacks on some of the CAESAR competition winners. We study the challenges imposed by the design of these modes, such as masking of the ciphertext. We also show that a very...
Differential Fault Attacks on Deterministic Lattice Signatures
differential fault attacks post-quantum cryptography lattice-based cryptography
2018/4/19
In this paper, we extend the applicability of differential fault attacks to lattice-based cryptography. We show how two deterministic lattice-based signature schemes, Dilithium and qTESLA, are vulnera...
Protecting Block Ciphers against Differential Fault Attacks without Re-keying (Extended Version)
fault attacks block ciphers protection
2018/1/27
In this article, we propose a new method to protect block cipher implementations against Differential Fault Attacks (DFA). Our strategy, so-called ``Tweak-in-Plaintext'', ensures that an uncontrolled ...
Differential Fault Attacks on Deterministic Signatures
Public-key algorithms Elliptic curve cryptography Digital signatures
2017/10/9
Deterministic signature schemes are becoming more popular, as illustrated by the deterministic variant of ECDSA and the popular EdDSA scheme, since eliminating the need for high-quality randomness mig...
Further Improved Differential Fault Attacks on Camellia by Exploring Fault Width and Depth
Differential fault analysis Feistel structure SPN structure
2010/2/1
This paper presents several further improved attacks on Camellia. In Jan 2009, ZHOU Yongbin proposes a DFA attack on Camellia by injecting 1 byte fault into the rth round left register to recover 1 Kr...