Correlation power analysis (CPA) attack on synchronous stream cipher devices

被引:0
|
作者
Institute of Computing Technology, Chinese Acad. of Sci., Beijing 100190, China [1 ]
不详 [2 ]
不详 [3 ]
机构
来源
Gaojishu Tongxin | 2009年 / 11卷 / 1142-1147期
关键词
D O I
10.3772/j.issn.1002-0470.2009.11.008
中图分类号
学科分类号
摘要
引用
收藏
页码:1142 / 1147
相关论文
共 50 条
  • [1] Correlation power analysis attack on software implementation of TRIVIUM stream cipher
    De Silva, Rangana
    Navarathna, Iranga
    Kumarasiri, Malitha
    Chuah, Chai Wen
    Alawatugoda, Janaka
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 19 (3-4) : 379 - 401
  • [2] Correlation Power Analysis Attack against Synchronous Stream Ciphers
    Wu, Keke
    Li, Huiyun
    Peng, Bo
    Yu, Fengqi
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2067 - +
  • [3] Simulated Leakage Power Analysis Attack of the Trivium Stream Cipher
    Palma, Kenneth
    Moll, Francesc
    PROCEEDINGS OF THE 37TH CONFERENCE ON DESIGN OF CIRCUITS AND INTEGRATED SYSTEMS (DCIS 2022), 2022, : 191 - 196
  • [4] Security Analysis of Quantum Noise Stream Cipher under Fast Correlation Attack
    Zhang, Mingrui
    Li, Yajie
    Song, Haokun
    Wang, Bo
    Mao, Yongli
    Mang, Jie
    2021 OPTICAL FIBER COMMUNICATIONS CONFERENCE AND EXPOSITION (OFC), 2021,
  • [5] Security analysis of a QAM modulated quantum noise stream cipher under a correlation attack
    Zhang, Mingrui
    LI, Yajie
    Song, Haokun
    Zhu, Kongni
    Zhao, Yongli
    Zhang, Jie
    OPTICS EXPRESS, 2022, 30 (22) : 40645 - 40656
  • [6] Fast correlation attack on stream cipher ABC v3
    Zhang HaiNa
    Lin, Li
    Wang XiaoYun
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2008, 51 (07): : 936 - 947
  • [7] Fast correlation attack on stream cipher ABC v3
    HaiNa Zhang
    Lin Li
    XiaoYun Wang
    Science in China Series F: Information Sciences, 2008, 51 : 936 - 947
  • [8] Distinguishing attack on the stream cipher Sosemanuk
    Li, Shunbo
    Hu, Yupu
    Wang, Yan
    Harbin Gongcheng Daxue Xuebao/Journal of Harbin Engineering University, 2012, 33 (02): : 259 - 262
  • [9] A New Attack on the LEX Stream Cipher
    Dunkelman, Orr
    Keller, Nathan
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2008, 2008, 5350 : 539 - +
  • [10] Improved Attack on WG Stream Cipher
    Mirzaei, Arash
    Dakhilalian, Mohammad
    Modarres-Hashemi, Mahmoud
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (04): : 45 - 52