Sciweavers

53 search results - page 3 / 11
» Evolution Cipher against Differential Power Attack
Sort
View
FSE
2000
Springer
153views Cryptology» more  FSE 2000»
14 years 2 months ago
Bitslice Ciphers and Power Analysis Attacks
In this paper, we present techniques to protect bitslice block ciphers against power analysis attacks. We analyze and extend a technique proposed in [14]. We apply the technique to...
Joan Daemen, Michael Peeters, Gilles Van Assche
CORR
2010
Springer
112views Education» more  CORR 2010»
13 years 11 months ago
Doubly Perfect Nonlinear Boolean Permutations
Due to implementation constraints the XOR operation is widely used in order to combine plaintext and key bit-strings in secretkey block ciphers. This choice directly induces the cl...
Laurent Poinsot
ASIACRYPT
2008
Springer
14 years 26 days ago
An Improved Impossible Differential Attack on MISTY1
MISTY1 is a Feistel block cipher that received a great deal of cryptographic attention. Its recursive structure, as well as the added FL layers, have been successful in thwarting v...
Orr Dunkelman, Nathan Keller
ASIACRYPT
2000
Springer
14 years 2 months ago
Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis
In this paper we introduce a structure iterated by the rule A of Skipjack and show that this structure is provably resistant against differential or linear attacks. It is the main ...
Jaechul Sung, Sangjin Lee, Jong In Lim, Seokhie Ho...
DATE
2010
IEEE
132views Hardware» more  DATE 2010»
13 years 9 months ago
Differential Power Analysis enhancement with statistical preprocessing
—Differential Power Analysis (DPA) is a powerful Side-Channel Attack (SCA) targeting as well symmetric as asymmetric ciphers. Its principle is based on a statistical treatment of...
Victor Lomné, Amine Dehbaoui, Philippe Maur...