The differential fault analysis on block cipher KLEIN-96

Journal of Information Security and Applications - Tập 67 - Trang 103205 - 2022
Haiyan Xiao1,2, Lifang Wang1
1School of Computer Science, Northwestern Polytechnical University, Xi'An, 710055, P.R. China
2Engineering University of PAP, Xi'An, 710055, P.R. China

Tài liệu tham khảo

Chang, 2021, Secure network coding from secure proof of retrievability, Sci China Inform Sci, 64, 10.1007/s11432-020-2997-0 Chang, 2020, RKA security for identity-based signature scheme, IEEE Access, 8, 17833, 10.1109/ACCESS.2020.2967904 Wang, 2022, Toward usable cloud storage auditing, revisited, IEEE Syst J Y. Chen, J. Chang, “Identity-based proof of retrievability meets with identity-based network coding,” in Clust Comput, early access, DOI: 10.1007/s10586-022-03545-y, 2022. Liu, 2018, Secure video streaming with lightweight cipher PRESENT in an SDN testbed, CMC-Comput Mater Continua, 57, 353, 10.32604/cmc.2018.04142 Li, 2018, SFN: a new lightweight block cipher, Microprocess Microsyst, 60, 138, 10.1016/j.micpro.2018.04.009 Sadhukhan, 2017, An evaluation of lightweight block ciphers for resource-constrained applications: area, performance, and security, J Hardw Syst Secur, 4, 1 Laamkuche, 2020, CSL: FPGA implementation of lightweight block cipher for power-constrained devices, Int J Inf Comput Secur, 12, 349 Huang, 2016, Improvement and Evaluation for algebraic fault attacks on PRESENT, J Commun, 37, 144 Z. Gong, S. Nikova, Y. Law, “KLEIN: a new family of lightweight block ciphers,” in RFIDSec’11, Amherst, USA, pp. 1-18, 2011. Gruber, 2019, Differential fault attacks on KLEIN, 80 Long, 2020, An improved differential fault analysis on block cipher KLEIN-64, CMC-Comput Mater Continua, 65, 1425, 10.32604/cmc.2020.011116 F, 2015, A differential fault analysis method for KLEIN cipher, Comput Applic Softw, 32 Zhang, 2019, A novel differential fault analysis using two bytes fault model on AES key schedule, IET Circu. Dev Syst, 13, 661, 10.1049/iet-cds.2018.5428 Takahashi, 2007, DFA mechanism on the AES key schedule, 62 Floissac, 2010, From AES-128 to AES-192 and AES-256, how to adapt differential fault analysis attacks, Cryptol ePrint Arch Ji, 2022, Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property, Clust Comput, 25, 337, 10.1007/s10586-021-03408-y Boneh, 1997, On the importance of checking cryptographic protocols for faults, 37 E. Biham, A. Shamir, “Differential fault analysis of secret key cryptosystems,” in CRYPTO'97, Springer Berlin Heidelberg, pp. 513-525, 1997. Ali, 2013, Differential fault analysis of AES: towards reaching its limits, J Cryptogr Eng, 3, 73, 10.1007/s13389-012-0046-y Wang, 2019, Differential fault attack on lightweight block cipher LBlock, J Cryptolog Res, 6, 18 Wei, 2018, Differential fault attacks on lightweight cipher LBlock, Fundamenta Informaticae, 157, 125, 10.3233/FI-2018-1621 Cnudde, 2017, Securing the PRESENT block cipher against combined side-channel analysis and fault attack, 25, 3291