Cryptography Reference
In-Depth Information
3. Dusart, P., Letourneux, G., Vivolo, O.: Differential Fault Analysis on A.E.S., Cryp-
tology eprint Archive Report 2003/010 (2003), http://www.iacr.org/
4. Piret, G., Quisquater, J.J.: A Differential Fault Attack Technique Against SPN
Structures, with Application to the AES and Khazad . In: Walter, C.D., Koc, ΒΈ.K.,
Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 77-88. Springer, Heidelberg (2003)
5. Chen, C.-N., Yen, S.-M.: Differential Fault Analysis on AES Key Schedule and
Some Countermeasures. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS,
vol. 2727, pp. 118-129. Springer, Heidelberg (2003)
6. Chen, H., Wu, W., Feng, D.: Differential Fault Analysis on CLEFIA. In: Qing, S.,
Imai, H., Wang, G. (eds.) ICICS 2007. LNCS, vol. 4861, pp. 284-295. Springer,
Heidelberg (2007)
7. Takahashi, J., Fukunaga, T.: Improved Differential Fault Analysis on CLEFIA. In:
FDTC 2008, pp. 25-39. IEEE-CS, Los Alamitos (2008)
8. Takahashi, J., Fukunaga, T.: Differential Fault Analysis on CLEFIA with 128, 192,
and 256-Bit Keys. IEICE Transactions on Fundamentals of Electronics, Commu-
nications and Computer Sciences E93-A(1), 136-143 (2010)
9. Biham, E., Granboulan, L., Nguyen, P.Q.: Impossible Fault Analysis of RC4 and
Differential Fault Analysis of RC4. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005.
LNCS, vol. 3557, pp. 359-367. Springer, Heidelberg (2005)
10. Hoch, J.J., Shamir, A.: Fault Analysis of Stream Ciphers. In: Joye, M., Quisquater,
J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 240-253. Springer, Heidelberg (2004)
11. Debraize, B., Corbella, I.M.: Fault Analysis of the Stream Cipher Snow 3G. In:
FDTC 2009, pp. 103-110. IEEE-CS, Los Alamitos (2009)
12. Hojsik, M., Rudolf, B.: Differential Fault Analysis of Trivium. In: Nyberg, K. (ed.)
FSE 2008. LNCS, vol. 5086, pp. 158-172. Springer, Heidelberg (2008)
13. Berzati, A., Canovas, C., Castagnos, G., Debraize, B., Goubin, L., Gouget, A.,
Paillier, P., Salgado, S.: Fault Analysis of GRAIN-128. In: Proc. of the 2009 IEEE
International Workshop on Hardware-Oriented Security and Trust, pp. 7-14. IEEE-
CS, Los Alamitos (2009)
14. Kircanski, A., Youssef, A.M.: Differential Fault Analysis of Rabbit. In: Jacobson
Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol. 5867, pp.
197-214. Springer, Heidelberg (2009)
15. Berzati, A., Canovas-Dumas, C., Goubin, L.: Fault Analysis of Rabbit: Toward a
Secret Key Leakage. In: Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. LNCS,
vol. 5922, pp. 72-87. Springer, Heidelberg (2009)
16. Watanabe, D., Furuya, S., Yoshida, H., Takaragi, K., Preneel, B.: A New Keystream
Generator MUGI. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365,
pp. 179-194. Springer, Heidelberg (2002)
17. MUGI Pseudorandom Number Generator Specification Ver. 1.2, Hitachi, Ltd.
(2001), This document is available at,
http://www.sdl.hitachi.co.jp/crypto/mugi/index-e.html
18. Daemen, J., Clapp, C.: Fast Hashing and Stream Encryption with PANAMA. In:
Vaudenay, S. (ed.) FSE 1998. LNCS, vol. 1372, pp. 60-74. Springer, Heidelberg
(1998)
19. MUGI Pseudorandom Number Generator Self-Evaluation Report Ver. 1.1, Hitachi,
Ltd. (2001), This document is available at
http://www.sdl.hitachi.co.jp/crypto/mugi/index-e.html
20. Dawson, E., Carter, G., Gustafson, H., Henricksen, M., Millan, W., Simpson, L.:
Evaluation of the MUGI Psuedo-Random Number Generator, Technical report,
CRYPTREC, Information Technology Promotion Agency (IPA), Tokyo Japan
(2002)
Search WWH ::




Custom Search