Research of Hamming weight-based algebraic side-channel attack on LED

被引:0
|
作者
Ji, Ke-Ke [1 ]
Wang, Tao [1 ]
Guo, Shi-Ze [2 ]
Zhao, Xin-Jie [1 ]
Liu, Hui-Ying [1 ]
机构
[1] Department of Information Engineering, Ordnance Engineering College, Shijiazhuang 050003, China
[2] The Institute of North Electronic Equipment, Beijing 100083, China
来源
Tongxin Xuebao/Journal on Communications | 2013年 / 34卷 / 07期
关键词
23;
D O I
10.3969/j.issn.1000-436x.2013.07.015
中图分类号
学科分类号
摘要
引用
收藏
页码:134 / 142
相关论文
共 50 条
  • [1] Efficient Hamming weight-based side-channel cube attacks on PRESENT
    Zhao, Xinjie
    Guo, Shize
    Zhang, Fan
    Wang, Tao
    Shi, Zhijie
    Liu, Huiying
    Ji, Keke
    Huang, Jing
    JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (03) : 728 - 743
  • [2] Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model
    Oren, Yossef
    Renauld, Mathieu
    Standaert, Francois-Xavier
    Wool, Avishai
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2012, 2012, 7428 : 140 - 154
  • [3] Improved algebraic side-channel attack on AES
    Mohamed, Mohamed Saied Emam
    Bulygin, Stanislav
    Zohner, Michael
    Heuser, Annelie
    Walter, Michael
    Buchmann, Johannes
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (03) : 139 - 156
  • [4] A Complete Tolerant Algebraic Side-Channel Attack for AES with CP
    Liu, Fanghui
    Cruz, Waldemar
    Michel, Laurent
    PRINCIPLES AND PRACTICE OF CONSTRAINT PROGRAMMING, 2018, 11008 : 259 - 275
  • [5] A Tolerant Algebraic Side-Channel Attack on AES Using CP
    Liu, Fanghui
    Cruz, Waldemar
    Ma, Chujiao
    Johnson, Greg
    Michel, Laurent
    PRINCIPLES AND PRACTICE OF CONSTRAINT PROGRAMMING (CP 2017), 2017, 10416 : 189 - 205
  • [6] Research on Side-channel Attack Based on Stochastic Model with Lower Leakage
    Liu, Zixin
    Zhu, Ting
    5TH ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2020), 2020, 1575
  • [7] Algebraic Side-Channel Attacks
    Renauld, Mathieu
    Standaert, Francois-Xavier
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 393 - 410
  • [8] Side-channel attack pitfalls
    Tiri, Kris
    2007 44TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, VOLS 1 AND 2, 2007, : 15 - 20
  • [9] Scan-Based Side-Channel Attack on the LED Block Cipher Using Scan Signatures
    Fujishiro, Mika
    Yanagisawa, Masao
    Togawa, Nozomu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2014, E97A (12): : 2434 - 2442
  • [10] Analysis of Side-Channel Attack Based on Information Theory
    Mizuno, Hiroaki
    Iwai, Keisuke
    Tanaka, Hidema
    Kurokawa, Takakazu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2014, E97A (07) : 1523 - 1532