A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
DAPA: Differential Analysis aided Power Attack on (Non-) Linear Feedback Shift Registers
2020
Transactions on Cryptographic Hardware and Embedded Systems
In this work, we generalise their methodology and combine with differential analysis, we called it differential analysis aided power attack (DAPA), to uncover more bit relations and take into account the ...
LFSRs or NLFSRs). ...
Acknowledgements The authors would like to thank Mostafa Taha for the meaningful discussion and comment on the analysis of LR-Keymill. ...
doi:10.46586/tches.v2021.i1.169-191
fatcat:r5ghuaeg6veedcvfi2wktcnjvi
Towards Low Energy Stream Ciphers
2018
IACR Transactions on Symmetric Cryptology
At Asiacrypt 2015, Banik et al. presented the block cipher family Midori which was designed to optimize the energy consumed per encryption and which reduces the energy consumption by more than 30% compared ...
Energy optimization is an important design aspect of lightweight cryptography. ...
However in [CMM14] , it was shown that Galois registers are more vulnerable to power attacks than Fibonacci registers: They were able to find the initial state of the Galois register using approximately ...
doi:10.46586/tosc.v2018.i2.1-19
fatcat:tvg7peii2je6hjlkwqa65fxehe
Towards Low Energy Stream Ciphers
2018
IACR Transactions on Symmetric Cryptology
At Asiacrypt 2015, Banik et al. presented the block cipher family Midori which was designed to optimize the energy consumed per encryption and which reduces the energy consumption by more than 30% compared ...
Energy optimization is an important design aspect of lightweight cryptography. ...
However in [CMM14] , it was shown that Galois registers are more vulnerable to power attacks than Fibonacci registers: They were able to find the initial state of the Galois register using approximately ...
doi:10.13154/tosc.v2018.i2.1-19
dblp:journals/tosc/BanikMAIMBWR18
fatcat:bt5bgtlyfvenvljijf7u3ejajq
Security Analysis of Industrial Test Compression Schemes
2013
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
Test compression is widely used for reducing test time and cost of a VLSI circuit. It is also claimed to provide security against scan based side-channel attacks. ...
Finally, a suitable countermeasure is proposed and compared to the previously proposed countermeasures. ...
An implementation based on Fibonacci and Galois Ring Oscillators is presented in [26] . ...
doi:10.1109/tcad.2013.2274619
fatcat:gdate6muyjg7zizi7vjydr2ajq
A Secure, Low Power and Low Hardware Digital Watermarking System for Real-time Surveillance Video Authentication
[article]
2013
The system was also assessed based on different recognized watermarking attacks and the proposed threat model to provide evidence for the achievement of the security goals. ...
Real-time video authentication is a major concern for surveillance video cameras. ...
Their encouragement and effort provided me the opportunity to develop my knowledge and research skills. ...
doi:10.11575/prism/25003
fatcat:s2qvmtkjvfbavlyzvtqjfeltbm