Filters








5 Hits in 5.5 sec

DAPA: Differential Analysis aided Power Attack on (Non-) Linear Feedback Shift Registers

Siang Meng Sim, Dirmanto Jap, Shivam Bhasin
2020 Transactions on Cryptographic Hardware and Embedded Systems  
In this work, we generalise their methodology and combine with differential analysis, we called it differential analysis aided power attack (DAPA), to uncover more bit relations and take into account the  ...  LFSRs or NLFSRs).  ...  Acknowledgements The authors would like to thank Mostafa Taha for the meaningful discussion and comment on the analysis of LR-Keymill.  ... 
doi:10.46586/tches.v2021.i1.169-191 fatcat:r5ghuaeg6veedcvfi2wktcnjvi

Towards Low Energy Stream Ciphers

Subhadeep Banik, Vasily Mikhalev, Frederik Armknecht, Takanori Isobe, Willi Meier, Andrey Bogdanov, Yuhei Watanabe, Francesco Regazzoni
2018 IACR Transactions on Symmetric Cryptology  
At Asiacrypt 2015, Banik et al. presented the block cipher family Midori which was designed to optimize the energy consumed per encryption and which reduces the energy consumption by more than 30% compared  ...  Energy optimization is an important design aspect of lightweight cryptography.  ...  However in [CMM14] , it was shown that Galois registers are more vulnerable to power attacks than Fibonacci registers: They were able to find the initial state of the Galois register using approximately  ... 
doi:10.46586/tosc.v2018.i2.1-19 fatcat:tvg7peii2je6hjlkwqa65fxehe

Towards Low Energy Stream Ciphers

Subhadeep Banik, Vasily Mikhalev, Frederik Armknecht, Takanori Isobe, Willi Meier, Andrey Bogdanov, Yuhei Watanabe, Francesco Regazzoni
2018 IACR Transactions on Symmetric Cryptology  
At Asiacrypt 2015, Banik et al. presented the block cipher family Midori which was designed to optimize the energy consumed per encryption and which reduces the energy consumption by more than 30% compared  ...  Energy optimization is an important design aspect of lightweight cryptography.  ...  However in [CMM14] , it was shown that Galois registers are more vulnerable to power attacks than Fibonacci registers: They were able to find the initial state of the Galois register using approximately  ... 
doi:10.13154/tosc.v2018.i2.1-19 dblp:journals/tosc/BanikMAIMBWR18 fatcat:bt5bgtlyfvenvljijf7u3ejajq

Security Analysis of Industrial Test Compression Schemes

Amitabh Das, Baris Ege, Santosh Ghosh, Lejla Batina, Ingrid Verbauwhede
2013 IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems  
Test compression is widely used for reducing test time and cost of a VLSI circuit. It is also claimed to provide security against scan based side-channel attacks.  ...  Finally, a suitable countermeasure is proposed and compared to the previously proposed countermeasures.  ...  An implementation based on Fibonacci and Galois Ring Oscillators is presented in [26] .  ... 
doi:10.1109/tcad.2013.2274619 fatcat:gdate6muyjg7zizi7vjydr2ajq

A Secure, Low Power and Low Hardware Digital Watermarking System for Real-time Surveillance Video Authentication [article]

Sonjoy Deb Roy, University Of Calgary, University Of Calgary, Orly Yadid-Pecht, Michael John Jacobson
2013
The system was also assessed based on different recognized watermarking attacks and the proposed threat model to provide evidence for the achievement of the security goals.  ...  Real-time video authentication is a major concern for surveillance video cameras.  ...  Their encouragement and effort provided me the opportunity to develop my knowledge and research skills.  ... 
doi:10.11575/prism/25003 fatcat:s2qvmtkjvfbavlyzvtqjfeltbm