Correlation power analysis (CPA) attack on synchronous stream cipher devices

被引:0
|
作者
Institute of Computing Technology, Chinese Acad. of Sci., Beijing 100190, China [1 ]
不详 [2 ]
不详 [3 ]
机构
来源
Gaojishu Tongxin | 2009年 / 11卷 / 1142-1147期
关键词
D O I
10.3772/j.issn.1002-0470.2009.11.008
中图分类号
学科分类号
摘要
引用
收藏
页码:1142 / 1147
相关论文
共 50 条
  • [21] Hierarchical power analysis attack for falsification detection cipher
    Yoshikawa, Masaya
    Nozaki, Yusuke
    2017 IEEE 7TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE IEEE CCWC-2017, 2017,
  • [22] Slide attack on modified Trivium stream cipher
    Guan, Jie
    Ding, Lin
    Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2012, 46 (06): : 926 - 930
  • [23] The Boomerang Attack on ChaCha Stream Cipher Permutation
    Ghafoori, Nasratullah
    Miyaji, Atsuko
    2024 6TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND THE INTERNET, ICCCI 2024, 2024, : 18 - 23
  • [24] Fault attack on Enocoro stream cipher family
    Rostami, Saeed
    Orumiehchiha, Mohammad Ali
    Shakour, Elham
    Alizadeh, Sadegh
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2025, 15 (01)
  • [25] Algebraic cube attack on Sfinks stream cipher
    Li, Shunbo
    Hu, Yupu
    Zhao, Yongbin
    Wang, Yan
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (10): : 4295 - 4302
  • [26] THEORETICAL SIMPLE POWER ANALYSIS OF THE GRAIN STREAM CIPHER
    Zadeh, A. A.
    Heys, Howard M.
    2013 26TH ANNUAL IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2013, : 845 - 849
  • [27] Correlation Power Analysis Attack on the PingPong-128 Key Stream Generator
    Kang, Young-Jin
    Kim, Hyun Ho
    Bruce, Ndibanje
    Park, YoungGoo
    Lee, HoonJae
    2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (IEEE AINA 2015), 2015, : 506 - 509
  • [28] Alamout: A New Synchronous Stream Cipher with Authentication
    Atani, Reza Ebrahimi
    Mirzakuchaki, Sattar
    Atani, Shahabaddin Ebrahimi
    2009 1ST INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION, VEHICULAR TECHNOLOGY, INFORMATION THEORY AND AEROSPACE & ELECTRONIC SYSTEMS TECHNOLOGY, VOLS 1 AND 2, 2009, : 806 - +
  • [29] Improved Related-Cipher Attack on Salsa20 Stream Cipher
    Ding, Lin
    IEEE ACCESS, 2019, 7 : 30197 - 30202
  • [30] A complete divide and conquer attack on the alphal stream cipher
    Chen, K
    Simpson, L
    Henricksen, M
    Millan, W
    Dawson, E
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 418 - 431