2010
DOI: 10.1007/978-3-642-12678-9_16
|View full text |Cite
|
Sign up to set email alerts
|

Differential Fault Analysis of HC-128

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(7 citation statements)
references
References 7 publications
0
7
0
Order By: Relevance
“…The eSTREAM [65] Portfolio (revision 1 in September 2008) contains the stream cipher HC-128 [224] in Profile 1 (SW). Several research works exist on the cryptanalysis of HC-128 [126,143,148,178,202], however none of them pose a security threat to the cipher. The HC-128 cipher description in briefly sketched from [224].…”
Section: Cracken's Memory Bankmentioning
confidence: 99%
“…The eSTREAM [65] Portfolio (revision 1 in September 2008) contains the stream cipher HC-128 [224] in Profile 1 (SW). Several research works exist on the cryptanalysis of HC-128 [126,143,148,178,202], however none of them pose a security threat to the cipher. The HC-128 cipher description in briefly sketched from [224].…”
Section: Cracken's Memory Bankmentioning
confidence: 99%
“…No significant cryptanalytic advances have been reported on HC , and the cipher is considered safe. Its authors estimate a keystream period larger than 2256 bits.…”
Section: Stream Cipher In Lwcmentioning
confidence: 99%
“…E0 and SNOW 2.0). More recently, many winners of the stream ciphers from eSTREAM project, such as Trivium, Rabbit, HC-128, were also shown to be suffered from fault attacks [7,20,21,25,26].…”
Section: Related Workmentioning
confidence: 99%