248
Views
16
CrossRef citations to date
0
Altmetric
Original Articles

Improved differential fault analysis on PRESENT-80/128

, , &
Pages 2553-2563 | Received 20 Jul 2012, Accepted 13 Dec 2012, Published online: 19 Mar 2013

References

  • M. Albrecht and C. Cid, Algebraic techniques in differential cryptanalysis, in Fast Software Encryption, 16th International Workshop, FSE 2009, LNCS 5665, O. Dunkelman, ed., Springer, Berlin, 2009, pp. 193–208.
  • E. Biham and A. Shamir, Differential cryptanalysis of DES-like cryptosystem, J. Cryptol. 4(1) (1991), pp. 3–72. doi: 10.1007/BF00630563
  • E. Biham and A. Shamir, Differential fault analysis of secret key cryptosystems, in Advances in Cryptology – CRYPTO ’97, 17th Annual International Cryptology Conference, LNCS 1294, B.S. Kaliski Jr. ed., Springer, Berlin, 1997, pp. 513–525.
  • A. Bogdanov, L. Knudsen, G. Leander, and C. Paar, PRESENT: An ultra-lightweight block cipher, in Cryptographic Hardware and Embedded Systems – CHES 2007, 9th International Workshop, LNCS 4727, P. Paillier and I. Verbauwhede, eds., Springer, Berlin, 2007, pp. 450–466.
  • J. Cho, Linear cryptanalysis of reduced-round PRESENT, in Topics in Cryptology – CT-RSA 2010, The Cryptographers’ Track at the RSA Conference 2010, LNCS 5985, J. Pieprzyk, ed., Springer, Berlin, 2010, pp. 302–317.
  • K. Jeong and C. Lee, Differential fault analysis on block cipher LED-64, in The 6th International Symposium on Digital Forensics and Information Security (DFIS-12), LNEE 164, J.J. (Jong Hyuk) Park, V.C.M. Leung, C.-L Wang, and T. Shon, eds., Springer, Berlin, 2012, pp. 747–755.
  • K. Jeong, Y. Lee, J. Sung, and S. Hong, Differential fault analysis on block cipher SEED, Math. Comput. Model. 55(1–2) (2012), pp. 26–34. doi: 10.1016/j.mcm.2011.01.008
  • C. Khedhiri, M. Karmani, B. Hamdi, and K. Man, Concurrent error detection adder based on two path output computation, J. Convergence 2(1) (2011), pp. 17–22.
  • C. Kim, Differential Fault Analysis of AES: Toward Reducing Number of Faults, Cryptology ePrint Archive, 2011/178, 2011. Available at: http://eprint.iacr.org/2011/178.pdf.
  • J. Li and D. Gu, Differential Fault Analysis on PRESENT, Chninacrypt 2009 (in chinese), 2009, pp. 3–13.
  • W. Li, D. Gu, and J. Li, Differential fault analysis on the ARIA algorithm, Inform. Sci. 178(19) (2008), pp. 3727–3737. doi: 10.1016/j.ins.2008.05.031
  • M. Matsui, Linear cryptanalysis method for DES cipher, in Advances in Cryptology – EUROCRYPT ’93, Workshop on the Theory and Application of Cryptographic Techniques, LNCS 765, T. Helleseth, ed., Springer, Berlin, 1994, pp. 386–397.
  • S. Silas, K. Ezra, and E. Rajsingh, A novel fault tolerant service selection framework for pervasive computing, Human-centric Comput. Inform. Sci. 2 (2012), p. 5. Available at: http://www.hcis-journal.com/content/2/1/5.
  • J. Takahashi and T. Fukunaga, Improved differential fault analysis on CLEFIA, in Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008, FDTC 2008, L. Breveglieri, S. Gueron, I. Koren, D. Naccache, J.-P. Seifert, eds., IEEE Computer Society, Los Alamitos, CA, USA, 2008, pp. 25–34.
  • G. Wang and S. Wang, Differential fault analysis on PRESENT key schedule, in International Conference on Computational Intelligence and Security (CIS), 2010, Y. Wang and G. Ping, eds., IEEE Computer Society Conference Publishing Services, Los Alamitos, CA, USA, 2010, pp. 362–366.
  • X. Zhao, T. Wang, and S. Guo, Fault Propagate Pattern Based DFA on SPN Structure Block Ciphers using Bitwise Permutation, with Application to PRESENT and PRINTcipher, Cryptology ePrint Archive, 2011/086, 2011. Available at: http://eprint.iacr.org/2011/086.pdf.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.