2017 18th International Symposium on Quality Electronic Design (ISQED) 2017
DOI: 10.1109/isqed.2017.7918332
|View full text |Cite
|
Sign up to set email alerts
|

Chosen-input side-channel analysis on unrolled light-weight cryptographic hardware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(16 citation statements)
references
References 12 publications
0
16
0
Order By: Relevance
“…CPA‐ and DPA‐based power analysis methods for PRINCE ciphers with an unrolled architecture have been proposed 13–16 . The analyses was performed as a known plaintext attacks 13,14 or as chosen plaintext attacks 15,16 . It has been found that a chosen plaintext attack is easier to analyze than a known plaintext attack 15 …”
Section: Preparationmentioning
confidence: 99%
See 1 more Smart Citation
“…CPA‐ and DPA‐based power analysis methods for PRINCE ciphers with an unrolled architecture have been proposed 13–16 . The analyses was performed as a known plaintext attacks 13,14 or as chosen plaintext attacks 15,16 . It has been found that a chosen plaintext attack is easier to analyze than a known plaintext attack 15 …”
Section: Preparationmentioning
confidence: 99%
“…The analyses was performed as a known plaintext attacks 13,14 or as chosen plaintext attacks 15,16 . It has been found that a chosen plaintext attack is easier to analyze than a known plaintext attack 15 …”
Section: Preparationmentioning
confidence: 99%
“…12 CPA-and DPA-based power analysis methods for PRINCE ciphers with an unrolled architecture have been proposed. [13][14][15][16] The analyses was performed as a known plaintext attacks 13,14 or as chosen plaintext attacks. 15,16 It has been found that a chosen plaintext attack is easier to analyze than a known plaintext attack.…”
Section: Power Analysis Attacks On Princementioning
confidence: 99%
“…[13][14][15][16] The analyses was performed as a known plaintext attacks 13,14 or as chosen plaintext attacks. 15,16 It has been found that a chosen plaintext attack is easier to analyze than a known plaintext attack. 15 When analyzing chosen plaintext attacks, we focus on the S-layer, which is a nonlinear process in the PRINCE architecture, and guess the value of the 128-bit secret key k by two-stage analysis.…”
Section: Power Analysis Attacks On Princementioning
confidence: 99%
See 1 more Smart Citation